Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 18:51
Static task
static1
Behavioral task
behavioral1
Sample
12e6cd12afeb90eb49a83a97bded8848d5a9e838009656e7312d868af7cec569.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
12e6cd12afeb90eb49a83a97bded8848d5a9e838009656e7312d868af7cec569.exe
Resource
win10v2004-20240226-en
General
-
Target
12e6cd12afeb90eb49a83a97bded8848d5a9e838009656e7312d868af7cec569.exe
-
Size
3.0MB
-
MD5
0d25425ed53c5a0f1d81abac488d4e9f
-
SHA1
215499048aca81000e98a40fb05e3e76aed30203
-
SHA256
12e6cd12afeb90eb49a83a97bded8848d5a9e838009656e7312d868af7cec569
-
SHA512
8fb9436d552ce40ee8608688253605cc45340d51a7179216c39093cf23107bb7ddb0bbc137dcf5341c2f9e1d39f31ae226e3ec43763a913baa4be22489f053b4
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBPB/bSqz8b6LNX:sxX7QnxrloE5dpUpsbVz8eLF
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
12e6cd12afeb90eb49a83a97bded8848d5a9e838009656e7312d868af7cec569.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxopti.exe 12e6cd12afeb90eb49a83a97bded8848d5a9e838009656e7312d868af7cec569.exe -
Executes dropped EXE 2 IoCs
Processes:
sysxopti.exexdobsys.exepid process 2632 sysxopti.exe 2064 xdobsys.exe -
Loads dropped DLL 2 IoCs
Processes:
12e6cd12afeb90eb49a83a97bded8848d5a9e838009656e7312d868af7cec569.exepid process 2756 12e6cd12afeb90eb49a83a97bded8848d5a9e838009656e7312d868af7cec569.exe 2756 12e6cd12afeb90eb49a83a97bded8848d5a9e838009656e7312d868af7cec569.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
12e6cd12afeb90eb49a83a97bded8848d5a9e838009656e7312d868af7cec569.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Files2X\\xdobsys.exe" 12e6cd12afeb90eb49a83a97bded8848d5a9e838009656e7312d868af7cec569.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintX6\\bodasys.exe" 12e6cd12afeb90eb49a83a97bded8848d5a9e838009656e7312d868af7cec569.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
12e6cd12afeb90eb49a83a97bded8848d5a9e838009656e7312d868af7cec569.exesysxopti.exexdobsys.exepid process 2756 12e6cd12afeb90eb49a83a97bded8848d5a9e838009656e7312d868af7cec569.exe 2756 12e6cd12afeb90eb49a83a97bded8848d5a9e838009656e7312d868af7cec569.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe 2632 sysxopti.exe 2064 xdobsys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
12e6cd12afeb90eb49a83a97bded8848d5a9e838009656e7312d868af7cec569.exedescription pid process target process PID 2756 wrote to memory of 2632 2756 12e6cd12afeb90eb49a83a97bded8848d5a9e838009656e7312d868af7cec569.exe sysxopti.exe PID 2756 wrote to memory of 2632 2756 12e6cd12afeb90eb49a83a97bded8848d5a9e838009656e7312d868af7cec569.exe sysxopti.exe PID 2756 wrote to memory of 2632 2756 12e6cd12afeb90eb49a83a97bded8848d5a9e838009656e7312d868af7cec569.exe sysxopti.exe PID 2756 wrote to memory of 2632 2756 12e6cd12afeb90eb49a83a97bded8848d5a9e838009656e7312d868af7cec569.exe sysxopti.exe PID 2756 wrote to memory of 2064 2756 12e6cd12afeb90eb49a83a97bded8848d5a9e838009656e7312d868af7cec569.exe xdobsys.exe PID 2756 wrote to memory of 2064 2756 12e6cd12afeb90eb49a83a97bded8848d5a9e838009656e7312d868af7cec569.exe xdobsys.exe PID 2756 wrote to memory of 2064 2756 12e6cd12afeb90eb49a83a97bded8848d5a9e838009656e7312d868af7cec569.exe xdobsys.exe PID 2756 wrote to memory of 2064 2756 12e6cd12afeb90eb49a83a97bded8848d5a9e838009656e7312d868af7cec569.exe xdobsys.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\12e6cd12afeb90eb49a83a97bded8848d5a9e838009656e7312d868af7cec569.exe"C:\Users\Admin\AppData\Local\Temp\12e6cd12afeb90eb49a83a97bded8848d5a9e838009656e7312d868af7cec569.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxopti.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2632 -
C:\Files2X\xdobsys.exeC:\Files2X\xdobsys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5482287deacfb271f1da8fe7b546d5b10
SHA1de0aa82df0ba626b0a6ef8a655bb5957d30d84b9
SHA25641f2da0f979f113abb352726f0650e8cdc318b53b59b54dfbfca0f91cf11e40d
SHA5123bb7261144b6c794c3087841f6a0eaa24b1b7e985fb73df2ef73fcee73f0139d281561c902fbd3842d0137f36c06c33264655352c19f3df4218ca6fa16e95067
-
Filesize
2.0MB
MD52456e825ceeedb20f71206165d49e947
SHA1890f9632fef2a6bf43a9dfd735746c09de658961
SHA256bed445e013cfb98c10918a7d597b299d1361eedd9c130606df15e64bf7cc7606
SHA512970e403d499e2e6ce89292e5e79ed790e0a90bd1db7ff84e7bb8662441954b77395552a9eff23069355d32fb3163ba55b4761c48c45bc8f4ad37465dad63e20e
-
Filesize
3.0MB
MD5f5c01f8af0e1bc5bf4176db9eda5131e
SHA164345ed27e057e3944efa562073cf48607a33942
SHA256d950b0f9303469410f566d10ae48f5944aaa2cfbbdad1fbb5210d53d946b4b26
SHA5123c457b2e97f0f137f0f521a4b5593af16724d6e4a31dc0be609855569ed2064b02eafea14089b145e60b32b44285aa554e59981ca57febf6299ff645bdf53b6c
-
Filesize
169B
MD59646fb6fd171914079a28bceab26d077
SHA17623ac9a5a344fb0a9ccf8319c83cd41aa046de7
SHA256985356b5da3290fe5255580078b9cbdffbfd62d39494195e3ea42e78329e1111
SHA512148db41e618f67e79de2ecd1b028701f78885137542d805f8073e3864061433d65ef45859ce5f828776ccc3d31614a6f42c13f473fa224314bbe282bac1a5c4a
-
Filesize
201B
MD548dab163c6c1175875a595ddfd621317
SHA16ab051e5d8bbcd34af60b27e7f79803c14cebd1b
SHA256d7eaeac8624e5625c81a7d793731970cc5d998f04fb035568d1da525a23cd4d2
SHA5127499198ff734f2212b9c411595283fcb60cbbb538739bda6c276f2fc89a34a6d76b8e5a3feb1f07c14e902a5d8a867c2db3b33e849e5e0989033602e44bc5d20
-
Filesize
3.0MB
MD5e1aca2f8a7eb3e5d33757b3f20e6ac1b
SHA1037a048b0341df35b90680d6d641a5881527f6aa
SHA2567fbd57c9a3d250d4cc4020a68f3e02a816765aee6edb6f956584ae32e285a823
SHA512fbb4edf34c9a89e9cafecfd2d686177870e8ad7c0acb714c26c7dde98b767bc23464fe634d1728c86c91e1e67b2abf230df021f35a1d51bd849b88e990abc2e1