Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 04:55
Static task
static1
Behavioral task
behavioral1
Sample
f6aa24ee9bc6ce1cfef66cb1f9eb6a642f61d3bd2bcf39fa8cdc82d651c07a77.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f6aa24ee9bc6ce1cfef66cb1f9eb6a642f61d3bd2bcf39fa8cdc82d651c07a77.exe
Resource
win10v2004-20240508-en
General
-
Target
f6aa24ee9bc6ce1cfef66cb1f9eb6a642f61d3bd2bcf39fa8cdc82d651c07a77.exe
-
Size
2.6MB
-
MD5
390e29af2b4614796e51b4c8fa0c6e4e
-
SHA1
c0b2484999903c36571889ad8a6f4ca0440c6909
-
SHA256
f6aa24ee9bc6ce1cfef66cb1f9eb6a642f61d3bd2bcf39fa8cdc82d651c07a77
-
SHA512
a8e6f1cc61146cdddf8622b9fa9d186b0709209c9451d4e1a887d89860ffe8148cf916c1442bc59651cb47671d08466f936478b250dc5e350aa314e85e48061e
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBNB/bS:sxX7QnxrloE5dpUpub
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe f6aa24ee9bc6ce1cfef66cb1f9eb6a642f61d3bd2bcf39fa8cdc82d651c07a77.exe -
Executes dropped EXE 2 IoCs
pid Process 2996 locxopti.exe 2636 adobloc.exe -
Loads dropped DLL 2 IoCs
pid Process 2952 f6aa24ee9bc6ce1cfef66cb1f9eb6a642f61d3bd2bcf39fa8cdc82d651c07a77.exe 2952 f6aa24ee9bc6ce1cfef66cb1f9eb6a642f61d3bd2bcf39fa8cdc82d651c07a77.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Intelproc6Z\\adobloc.exe" f6aa24ee9bc6ce1cfef66cb1f9eb6a642f61d3bd2bcf39fa8cdc82d651c07a77.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxIV\\boddevsys.exe" f6aa24ee9bc6ce1cfef66cb1f9eb6a642f61d3bd2bcf39fa8cdc82d651c07a77.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2952 f6aa24ee9bc6ce1cfef66cb1f9eb6a642f61d3bd2bcf39fa8cdc82d651c07a77.exe 2952 f6aa24ee9bc6ce1cfef66cb1f9eb6a642f61d3bd2bcf39fa8cdc82d651c07a77.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe 2996 locxopti.exe 2636 adobloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2996 2952 f6aa24ee9bc6ce1cfef66cb1f9eb6a642f61d3bd2bcf39fa8cdc82d651c07a77.exe 28 PID 2952 wrote to memory of 2996 2952 f6aa24ee9bc6ce1cfef66cb1f9eb6a642f61d3bd2bcf39fa8cdc82d651c07a77.exe 28 PID 2952 wrote to memory of 2996 2952 f6aa24ee9bc6ce1cfef66cb1f9eb6a642f61d3bd2bcf39fa8cdc82d651c07a77.exe 28 PID 2952 wrote to memory of 2996 2952 f6aa24ee9bc6ce1cfef66cb1f9eb6a642f61d3bd2bcf39fa8cdc82d651c07a77.exe 28 PID 2952 wrote to memory of 2636 2952 f6aa24ee9bc6ce1cfef66cb1f9eb6a642f61d3bd2bcf39fa8cdc82d651c07a77.exe 29 PID 2952 wrote to memory of 2636 2952 f6aa24ee9bc6ce1cfef66cb1f9eb6a642f61d3bd2bcf39fa8cdc82d651c07a77.exe 29 PID 2952 wrote to memory of 2636 2952 f6aa24ee9bc6ce1cfef66cb1f9eb6a642f61d3bd2bcf39fa8cdc82d651c07a77.exe 29 PID 2952 wrote to memory of 2636 2952 f6aa24ee9bc6ce1cfef66cb1f9eb6a642f61d3bd2bcf39fa8cdc82d651c07a77.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6aa24ee9bc6ce1cfef66cb1f9eb6a642f61d3bd2bcf39fa8cdc82d651c07a77.exe"C:\Users\Admin\AppData\Local\Temp\f6aa24ee9bc6ce1cfef66cb1f9eb6a642f61d3bd2bcf39fa8cdc82d651c07a77.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2996
-
-
C:\Intelproc6Z\adobloc.exeC:\Intelproc6Z\adobloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5e8f1d78ba2b3ffb20d568a905e952dc9
SHA1c56b11fef5a66ea58ac24ac28665f5fe289d2bd9
SHA256050650d4b92fe7480ec511c28cdcb197921babf14c7913ce379deb20e113b56c
SHA51221d740dc119845f80d0add49b05999c633b3eed716acb5cbecde906741cf40edc93b55e7e9cf0642bee79193996fab14ba8ecb89cd724e83e7bb54c4f6f04740
-
Filesize
2.6MB
MD54c9ecdf1e45057ab28b79d6e1eef539d
SHA13c6f0ba388ecda93005bcce7564b81d74e5b7a0b
SHA2561c66a0c47cd4bf2cf194fee66b2d50ae740b3d30f4ec90473d83cb9e35df743c
SHA5122901b0e977c4b560bf441769a61e0dd1c59bd85502b4967d46af6f71f4dc16778e23809e630f988419a36c1bbc5c898b9e215be253e3857a070d30081970180d
-
Filesize
2.6MB
MD52f864d645a1cc750ee6f9962a4d4b2e4
SHA11ce2226b057fb1d574360e0affc4ba843b89732d
SHA2564afd3aa8676578ce654efaf61c29b08f89ddb641df35c8c5aab7d7e34ac83fdf
SHA51250dd44b853abb29f4948c5620a0325f554dcdaa4dd251388e8645b037d7897646194764e287da467bf900ed6255c8a3f871c6ccccd7f027404bc0dc31b01effc
-
Filesize
176B
MD5e85a2fc2782b28b5734ccd2d12e47c30
SHA180082d84203c16ad3aebcc4e73833d3bbdf3b007
SHA256e90218d10f8eb23974a71ce91a280694a2fdab5dc155bbbb20a0cc369ed69173
SHA512287b4afa90781b105f5036bb9d4b36e026ef72eb2764025f554031fbbd36d319c44df4522dcaacaad9bcd50fd938646f848d8b2e6180241dde2e33111e2eabc4
-
Filesize
208B
MD5b7f9f14d583f853ad055f0a6b7d4565d
SHA1080f2543451363dbdc89db4b299bbfeb56d1eede
SHA25631e967f33fdc2c4a77da1f4c6d036357813b969c7e5e936c3d4194db7b5985fa
SHA51295d39b4243b26b1e32b9e588a689351e48eab136160444c68fda2d5d9e69d5224c8dceef7caf59987e34d222f28709b4e23f009f17d396f991aaffbedf475a78
-
Filesize
2.6MB
MD51da42bebb1b1cb20ad5461e66f93141c
SHA1ebfd97d4c9feef71f5ebd94e37dbaaf2af08966c
SHA256df7abd3ca590cdbf87b58217c95c266b53d2d1940261eff5dc848a269d6b77e4
SHA51234b34bff12af157172ed3e5a6b40b43379d7316e53bedfbf95a42a14f68366762ad2cb3ae11e722732a1a01f7187aba20852bffd5313b9db1210395aae4f9a43