Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 19:53
Static task
static1
Behavioral task
behavioral1
Sample
2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe
Resource
win10v2004-20240508-en
General
-
Target
2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe
-
Size
2.6MB
-
MD5
411a3af6ac95d7f3f0308f29bb40fffd
-
SHA1
bd87d2b0d738afe5ac4af9d5b17d58a73446f7a4
-
SHA256
2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a
-
SHA512
fb95f50b3188d87b1ee87073e4c3cf976dbe43fce311d4976be2055f813a85c53cb7a695bf36bcd49a5d4b1d3168055713c34780d406b05d6c9802216dd7c088
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBeB/bS:sxX7QnxrloE5dpUpVb
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxbod.exe 2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe -
Executes dropped EXE 2 IoCs
Processes:
sysxbod.exeaoptiloc.exepid process 2328 sysxbod.exe 3064 aoptiloc.exe -
Loads dropped DLL 2 IoCs
Processes:
2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exepid process 2188 2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe 2188 2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesGF\\aoptiloc.exe" 2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Vid77\\dobaec.exe" 2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exesysxbod.exeaoptiloc.exepid process 2188 2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe 2188 2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe 2328 sysxbod.exe 3064 aoptiloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exedescription pid process target process PID 2188 wrote to memory of 2328 2188 2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe sysxbod.exe PID 2188 wrote to memory of 2328 2188 2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe sysxbod.exe PID 2188 wrote to memory of 2328 2188 2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe sysxbod.exe PID 2188 wrote to memory of 2328 2188 2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe sysxbod.exe PID 2188 wrote to memory of 3064 2188 2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe aoptiloc.exe PID 2188 wrote to memory of 3064 2188 2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe aoptiloc.exe PID 2188 wrote to memory of 3064 2188 2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe aoptiloc.exe PID 2188 wrote to memory of 3064 2188 2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe aoptiloc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe"C:\Users\Admin\AppData\Local\Temp\2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxbod.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2328
-
-
C:\FilesGF\aoptiloc.exeC:\FilesGF\aoptiloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5dd8b226dc6f859c29d8769954f6952bb
SHA1f4c3bad0619de4f794f56c206ea5a9e6810f6f6f
SHA2563d6eca275c601ef050491859bd1cfd4c31493f9d66f4bf1d85fe088be648b917
SHA5127eae31fe010d96e7f5dd9e2c7c3b52a978050129d6b1124b4c526e574ccd04d25a971ff7ebcfa9989b56bb8e8d32abfe1d6c782be6aec003c2e8872ccfd58932
-
Filesize
167B
MD5cef325acf14160e0e8fccefc916c2919
SHA15c69de49cdd7cf3efcd9066234fabda03143fa72
SHA25691427ec5a8d3508797554ed806389ffad8f795201f748e831f193673d5708494
SHA51224d8cbb1efef5d0d5a9c221450ac8522013cbd9f5b1e68a1d6c64389013b6a059a7ba33f11334a62286bdb957ebfe4039b1c5f10efabdc9719f6e267391208ce
-
Filesize
199B
MD5cdcda40e9ad1c316e9e699aa44ddedf0
SHA12e8ea6f32894703b2556d6eec2754fa63f55a0c8
SHA25629628148aee6dbefcce9f2ba6b747427860dfc84859b7bd2cdbbeed87d54b7ab
SHA5128f7bd596dfc184568befff5227e6a77434c914208c336ff94514421c277a884dadc540057a757c258d2bdc02e52d75fe2c41052a1d4327dc209932799caa288f
-
Filesize
2.6MB
MD5d59b88a8b79b1f99bf518a50a96443e9
SHA1deb95e13132d6c00ffb80ff8cb071bd9f684ec57
SHA256852b94c6612b02c35b63d7e8ec5561499484c70b402e9b394c4b0461dea002a5
SHA512bff50a0af427e0691b72efdf362b84b8a47c074a8babab44872730e6925e0c717434cc47e3397213351499d6b952febec08285c53b44283c5505f9b767ea6ae0
-
Filesize
2.6MB
MD50779c2418c28a22f01bee15309169593
SHA11009d7c73c4bc5ed48429cc085514de268920e01
SHA2566dfccdb6bed325dbeb3cf26089f03e906d8e36c0bdfae3fb43e84c4efa50dbc2
SHA512e9bd272f199d890b2da089f890296c0a4c5758202ad5f644ee8c310460756736a56fa059e70833f75c4ec644646d6da0e6b2c829fc31d0613047127b7ae97d40