Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-06-2024 23:27
Static task
static1
Behavioral task
behavioral1
Sample
5223518afbdf5211e2132427b839364d0f83b02e4a3c1256947c99feacb11da2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5223518afbdf5211e2132427b839364d0f83b02e4a3c1256947c99feacb11da2.exe
Resource
win10v2004-20240226-en
General
-
Target
5223518afbdf5211e2132427b839364d0f83b02e4a3c1256947c99feacb11da2.exe
-
Size
4.0MB
-
MD5
4118f91d13a805a48ed5c5d03ff52054
-
SHA1
194ea8ee61af70fc98afece3f350e5440169f94c
-
SHA256
5223518afbdf5211e2132427b839364d0f83b02e4a3c1256947c99feacb11da2
-
SHA512
8dcab827000a488caf2691e504426a562e5f2b5846a8d81371bae99caa9d24f5c101ecdace81bf514cc4e6587406c50b86d1aeda5f25b35912fff4a7a1b94f71
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBpB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUpCbVz8eLFcz
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevdob.exe 5223518afbdf5211e2132427b839364d0f83b02e4a3c1256947c99feacb11da2.exe -
Executes dropped EXE 2 IoCs
pid Process 2248 sysdevdob.exe 4732 devoptisys.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotYR\\devoptisys.exe" 5223518afbdf5211e2132427b839364d0f83b02e4a3c1256947c99feacb11da2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxWX\\dobxec.exe" 5223518afbdf5211e2132427b839364d0f83b02e4a3c1256947c99feacb11da2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2576 5223518afbdf5211e2132427b839364d0f83b02e4a3c1256947c99feacb11da2.exe 2576 5223518afbdf5211e2132427b839364d0f83b02e4a3c1256947c99feacb11da2.exe 2576 5223518afbdf5211e2132427b839364d0f83b02e4a3c1256947c99feacb11da2.exe 2576 5223518afbdf5211e2132427b839364d0f83b02e4a3c1256947c99feacb11da2.exe 2248 sysdevdob.exe 2248 sysdevdob.exe 2248 sysdevdob.exe 2248 sysdevdob.exe 4732 devoptisys.exe 4732 devoptisys.exe 2248 sysdevdob.exe 2248 sysdevdob.exe 4732 devoptisys.exe 4732 devoptisys.exe 2248 sysdevdob.exe 2248 sysdevdob.exe 4732 devoptisys.exe 4732 devoptisys.exe 2248 sysdevdob.exe 2248 sysdevdob.exe 4732 devoptisys.exe 4732 devoptisys.exe 2248 sysdevdob.exe 2248 sysdevdob.exe 4732 devoptisys.exe 4732 devoptisys.exe 2248 sysdevdob.exe 2248 sysdevdob.exe 4732 devoptisys.exe 4732 devoptisys.exe 2248 sysdevdob.exe 2248 sysdevdob.exe 4732 devoptisys.exe 4732 devoptisys.exe 2248 sysdevdob.exe 2248 sysdevdob.exe 4732 devoptisys.exe 4732 devoptisys.exe 2248 sysdevdob.exe 2248 sysdevdob.exe 4732 devoptisys.exe 4732 devoptisys.exe 2248 sysdevdob.exe 2248 sysdevdob.exe 4732 devoptisys.exe 4732 devoptisys.exe 2248 sysdevdob.exe 2248 sysdevdob.exe 4732 devoptisys.exe 4732 devoptisys.exe 2248 sysdevdob.exe 2248 sysdevdob.exe 4732 devoptisys.exe 4732 devoptisys.exe 2248 sysdevdob.exe 2248 sysdevdob.exe 4732 devoptisys.exe 4732 devoptisys.exe 2248 sysdevdob.exe 2248 sysdevdob.exe 4732 devoptisys.exe 4732 devoptisys.exe 2248 sysdevdob.exe 2248 sysdevdob.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2576 wrote to memory of 2248 2576 5223518afbdf5211e2132427b839364d0f83b02e4a3c1256947c99feacb11da2.exe 91 PID 2576 wrote to memory of 2248 2576 5223518afbdf5211e2132427b839364d0f83b02e4a3c1256947c99feacb11da2.exe 91 PID 2576 wrote to memory of 2248 2576 5223518afbdf5211e2132427b839364d0f83b02e4a3c1256947c99feacb11da2.exe 91 PID 2576 wrote to memory of 4732 2576 5223518afbdf5211e2132427b839364d0f83b02e4a3c1256947c99feacb11da2.exe 92 PID 2576 wrote to memory of 4732 2576 5223518afbdf5211e2132427b839364d0f83b02e4a3c1256947c99feacb11da2.exe 92 PID 2576 wrote to memory of 4732 2576 5223518afbdf5211e2132427b839364d0f83b02e4a3c1256947c99feacb11da2.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\5223518afbdf5211e2132427b839364d0f83b02e4a3c1256947c99feacb11da2.exe"C:\Users\Admin\AppData\Local\Temp\5223518afbdf5211e2132427b839364d0f83b02e4a3c1256947c99feacb11da2.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevdob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevdob.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2248
-
-
C:\UserDotYR\devoptisys.exeC:\UserDotYR\devoptisys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4156 --field-trial-handle=2180,i,12780723798465539942,12010519452607841069,262144 --variations-seed-version /prefetch:81⤵PID:2572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5357203e966ef85eda8be001d861a6d68
SHA196e58bae3849d441c8fac69d0a5c513e3bbccfbb
SHA256eeffd441b1f8a139b381f154269963527bf8c996ef6820d782d65d1ecfbfe672
SHA51261aef4a6b192bdab721b25fea0d6e346ab34a7fe7a35db2531be263d0896cb5ab46b39c2f377109cf434b8355fcc057d5972f354cf5e632364ba37e9da301be5
-
Filesize
4.0MB
MD5f8b6b904ee3b8e382c279dbe04417b4d
SHA103602cf876f66d71c08e65fd9f189b0a58b2e614
SHA2568b901dfb36413cb5e0c8c4417d27e4bba20b5ac42e0b8de962a001f44d8dedf1
SHA5124ecf45d5b45fc7c9d144da0de089753691ddf9e7681e6df278c7c45f4bc7e9c7c4207e2c313e36368a21f7f6bfb6ad744c4fea74d464b83cbbc43fd585d71dea
-
Filesize
2.8MB
MD574085dd95c003bf7276f982d2417264a
SHA1366a9b75a96da5eaac7c5212d0a9d712703a350f
SHA25626a5c5dfd62ed76914659b1b895943d7624b69cb3096362324842a12b81b09ce
SHA5122230e0d8e14cf94afb001cf93e5c8390a5f5fee5d46e0dc0ed6c5b86617c209af22f1a565c3a8a2069fd9c34c4d61eb34d79a24bbdad6d04c7168d3a932ddcd8
-
Filesize
4.0MB
MD5a7845bf5c400700c8aec67da7f68ce87
SHA13e2f0b94daba871a8b3414f344b6c18dd31c98a6
SHA256a70da9f5e38e02e0300c17facffbcdc31425eea24b19067a1ec3057be5244126
SHA512698cdd0ef9bb4880da92ea8cb73f691eed04a23af2d48c943a2c6cdfbb2558ac0d8ca6a93be32fc0bb1c38900fdb91093373e9079a6688bed3f99c9739c51b93
-
Filesize
207B
MD59ae695a2a61af89efadc00bfd9890a5e
SHA1a1353d5a7a723104b5c95e35ed628bfc425a1110
SHA2560b1980600492fa46908ea6004494088c26c6d9a57d1221d1ae8bf7bb06ff9b4c
SHA5126d811d222e35a2f2953503d3fcad0350265a4aecb5a968fa69e2cf4d507d46affa17d5217fe4513c2c9846988aae318e117e0d89221e417540a39e9043bcf1f5
-
Filesize
175B
MD5e558d324e0d20da8aeeab2c8887eee87
SHA1054a3cda040a3dfa053dc84f2a6183f47b9b4dda
SHA256719d03689e5232a0dc97c68b5daf397eeeb430b1a5d70b0791da741b8f11282f
SHA512d26f53061c87b77955e9ee0b848138886255fc83c7c5e153928a4cf040c49aa1efc7e4dcc9adfb7d62cf1cc1f76baa4aededbcab562022192f0964a375e7ca6c
-
Filesize
4.0MB
MD5f28cae36d56dd0f822da241931c3ce2e
SHA173740745c4e08997c32ca55c008b4edcbfcd5bf2
SHA25692cb85e60b4fec764e8fd12a640b581004275816b87cacccc80ef20f6bf3d4a3
SHA51243668969b6c85a79a3668ea50ac65e0fc5ca7a2590d29906604abf2fa9e0c01ed7d7562292ff174a499f622bd60851b3ec7a37fbe5e6a71ac9018e114f87d557