Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 21:10
Static task
static1
Behavioral task
behavioral1
Sample
4668470d372f917d2a4d188c734f1a480b3e17d1af551c7ebee91b93ff442afe.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4668470d372f917d2a4d188c734f1a480b3e17d1af551c7ebee91b93ff442afe.exe
Resource
win10v2004-20240426-en
General
-
Target
4668470d372f917d2a4d188c734f1a480b3e17d1af551c7ebee91b93ff442afe.exe
-
Size
3.1MB
-
MD5
432cecdbedae53868e0630af844f1117
-
SHA1
447638357e4d19e379b13ab347eb08160ac35393
-
SHA256
4668470d372f917d2a4d188c734f1a480b3e17d1af551c7ebee91b93ff442afe
-
SHA512
123e6a83ed996e24421cadd24fc4fe9d45e8c3a0a04ed21241e6799879f36787a9d5f18cea2d8dd8b91fb829687669422a88976aaedd934c22a6b22f4d08da03
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBBB/bSqz8:sxX7QnxrloE5dpUpObVz8
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
4668470d372f917d2a4d188c734f1a480b3e17d1af551c7ebee91b93ff442afe.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevopti.exe 4668470d372f917d2a4d188c734f1a480b3e17d1af551c7ebee91b93ff442afe.exe -
Executes dropped EXE 2 IoCs
Processes:
sysdevopti.exexdobloc.exepid process 2856 sysdevopti.exe 4076 xdobloc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
4668470d372f917d2a4d188c734f1a480b3e17d1af551c7ebee91b93ff442afe.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Intelproc6T\\xdobloc.exe" 4668470d372f917d2a4d188c734f1a480b3e17d1af551c7ebee91b93ff442afe.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Vid14\\boddevloc.exe" 4668470d372f917d2a4d188c734f1a480b3e17d1af551c7ebee91b93ff442afe.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4668470d372f917d2a4d188c734f1a480b3e17d1af551c7ebee91b93ff442afe.exesysdevopti.exexdobloc.exepid process 3268 4668470d372f917d2a4d188c734f1a480b3e17d1af551c7ebee91b93ff442afe.exe 3268 4668470d372f917d2a4d188c734f1a480b3e17d1af551c7ebee91b93ff442afe.exe 3268 4668470d372f917d2a4d188c734f1a480b3e17d1af551c7ebee91b93ff442afe.exe 3268 4668470d372f917d2a4d188c734f1a480b3e17d1af551c7ebee91b93ff442afe.exe 2856 sysdevopti.exe 2856 sysdevopti.exe 4076 xdobloc.exe 4076 xdobloc.exe 2856 sysdevopti.exe 2856 sysdevopti.exe 4076 xdobloc.exe 4076 xdobloc.exe 2856 sysdevopti.exe 2856 sysdevopti.exe 4076 xdobloc.exe 4076 xdobloc.exe 2856 sysdevopti.exe 2856 sysdevopti.exe 4076 xdobloc.exe 4076 xdobloc.exe 2856 sysdevopti.exe 2856 sysdevopti.exe 4076 xdobloc.exe 4076 xdobloc.exe 2856 sysdevopti.exe 2856 sysdevopti.exe 4076 xdobloc.exe 4076 xdobloc.exe 2856 sysdevopti.exe 2856 sysdevopti.exe 4076 xdobloc.exe 4076 xdobloc.exe 2856 sysdevopti.exe 2856 sysdevopti.exe 4076 xdobloc.exe 4076 xdobloc.exe 2856 sysdevopti.exe 2856 sysdevopti.exe 4076 xdobloc.exe 4076 xdobloc.exe 2856 sysdevopti.exe 2856 sysdevopti.exe 4076 xdobloc.exe 4076 xdobloc.exe 2856 sysdevopti.exe 2856 sysdevopti.exe 4076 xdobloc.exe 4076 xdobloc.exe 2856 sysdevopti.exe 2856 sysdevopti.exe 4076 xdobloc.exe 4076 xdobloc.exe 2856 sysdevopti.exe 2856 sysdevopti.exe 4076 xdobloc.exe 4076 xdobloc.exe 2856 sysdevopti.exe 2856 sysdevopti.exe 4076 xdobloc.exe 4076 xdobloc.exe 2856 sysdevopti.exe 2856 sysdevopti.exe 4076 xdobloc.exe 4076 xdobloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
4668470d372f917d2a4d188c734f1a480b3e17d1af551c7ebee91b93ff442afe.exedescription pid process target process PID 3268 wrote to memory of 2856 3268 4668470d372f917d2a4d188c734f1a480b3e17d1af551c7ebee91b93ff442afe.exe sysdevopti.exe PID 3268 wrote to memory of 2856 3268 4668470d372f917d2a4d188c734f1a480b3e17d1af551c7ebee91b93ff442afe.exe sysdevopti.exe PID 3268 wrote to memory of 2856 3268 4668470d372f917d2a4d188c734f1a480b3e17d1af551c7ebee91b93ff442afe.exe sysdevopti.exe PID 3268 wrote to memory of 4076 3268 4668470d372f917d2a4d188c734f1a480b3e17d1af551c7ebee91b93ff442afe.exe xdobloc.exe PID 3268 wrote to memory of 4076 3268 4668470d372f917d2a4d188c734f1a480b3e17d1af551c7ebee91b93ff442afe.exe xdobloc.exe PID 3268 wrote to memory of 4076 3268 4668470d372f917d2a4d188c734f1a480b3e17d1af551c7ebee91b93ff442afe.exe xdobloc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4668470d372f917d2a4d188c734f1a480b3e17d1af551c7ebee91b93ff442afe.exe"C:\Users\Admin\AppData\Local\Temp\4668470d372f917d2a4d188c734f1a480b3e17d1af551c7ebee91b93ff442afe.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevopti.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Intelproc6T\xdobloc.exeC:\Intelproc6T\xdobloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Intelproc6T\xdobloc.exeFilesize
3.1MB
MD5d6d4bdaa76908e6416e38dfd5474476e
SHA1cc2bfba704edfa569e289ab355a5dffe98d4fefb
SHA2562860b3614ba6134ce65c4f5bd4e7bbb2a17257e2b163012d2558e0c0722c81f9
SHA5129ee5f7a0a682a867af207b62d6e3fafc513981d47b3dbb60bd53441418bb62249d66e8e41cdfdfd10be79bd81a308955bcbf971a858fa7c2eff1a348229ff856
-
C:\Users\Admin\253086396416_10.0_Admin.iniFilesize
208B
MD5472853cfdd1f29a5ea641e95bc21e1cc
SHA1c3a65719d2bdbfda03ed9e08f06a2af21c69b150
SHA256e7728c87389167f9b0b9d82c8215818b13ff59f15a9bc7d8d6ee4b671a85a8e2
SHA512fdc317502cc28e3f10e58e4cdace6ea25f283f02da29b9bf6faa0bc985145864f20995a3301a67899f55087bed4300ba8ffac15d2dab128f8330bd19c6c70a48
-
C:\Users\Admin\253086396416_10.0_Admin.iniFilesize
176B
MD5f6e4f179dd53bae5fe74e6ce002e07a4
SHA104a5e92bbacc766d4ec6fa994e66cd377b0bfa41
SHA25636270514fcd3dbeb00d5e0d768db23a029f516abafb9e65c5e794f8c6387674f
SHA512920185723d022b377d5acaa640d84c148fdd4aad90bb556f0c10f037033cffea76d022721443b13584d6db7e4359713f8600f9ac1e3add4b3143415de53d2f86
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevopti.exeFilesize
3.1MB
MD516fa94aa38f85c396e5552a0aaee6a46
SHA1b218927a155096dab8a1f2217958e0f8faf49577
SHA2563c5d5e91fe4617a1472775a3d8903179636c5227ed87c255da8bc5317119259d
SHA51297c391c765ec867de33e1466d70eeb792332a7b3eadfbbc2b054f2d62e7f13a5bf34f352a7b1a25e15336179589528699a1f3e79c3fe6ad8a6d5f0d6d5e45a1d
-
C:\Vid14\boddevloc.exeFilesize
1.2MB
MD582e5c3f0916f0c3d419b59c389d9d501
SHA1cb63dc4330e7feb52d38f1e3f4f3def39389a137
SHA25656fc6d29dfd532bfb41d224bed921ade1f0a1aef2ce50cfcdb5c438f54802167
SHA5123b2f0ce914967b3f3959e68aee79d38fd18701ef969a07f346cbf41e99e50fe90e12d85bb4ff0c1bb4fa34af687755784c513edbbadade84ee87d3755b484dd4
-
C:\Vid14\boddevloc.exeFilesize
3.1MB
MD59c0fe4dcc6bfd682af0f2ffa9c82ce45
SHA110e1b49fef2080bbf6a0fe258bfe0e8ac8997a5f
SHA2566880458f9a761ad4e400995fc9f57f2e632869e13bb1430613e21c15564794b8
SHA512a7281f00e242bc306a5f27d083782558712072e23cc5b823588e7d79c237dbb65f7be81bd43cb7344f2dae137e142e949c5ec86a21f19991f7681aab848da78f