Analysis

  • max time kernel
    151s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-06-2024 23:27

General

  • Target

    5223518afbdf5211e2132427b839364d0f83b02e4a3c1256947c99feacb11da2.exe

  • Size

    4.0MB

  • MD5

    4118f91d13a805a48ed5c5d03ff52054

  • SHA1

    194ea8ee61af70fc98afece3f350e5440169f94c

  • SHA256

    5223518afbdf5211e2132427b839364d0f83b02e4a3c1256947c99feacb11da2

  • SHA512

    8dcab827000a488caf2691e504426a562e5f2b5846a8d81371bae99caa9d24f5c101ecdace81bf514cc4e6587406c50b86d1aeda5f25b35912fff4a7a1b94f71

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBpB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUpCbVz8eLFcz

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5223518afbdf5211e2132427b839364d0f83b02e4a3c1256947c99feacb11da2.exe
    "C:\Users\Admin\AppData\Local\Temp\5223518afbdf5211e2132427b839364d0f83b02e4a3c1256947c99feacb11da2.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2576
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevdob.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevdob.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2248
    • C:\UserDotYR\devoptisys.exe
      C:\UserDotYR\devoptisys.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:4732
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4156 --field-trial-handle=2180,i,12780723798465539942,12010519452607841069,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2572

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\GalaxWX\dobxec.exe

      Filesize

      1.8MB

      MD5

      357203e966ef85eda8be001d861a6d68

      SHA1

      96e58bae3849d441c8fac69d0a5c513e3bbccfbb

      SHA256

      eeffd441b1f8a139b381f154269963527bf8c996ef6820d782d65d1ecfbfe672

      SHA512

      61aef4a6b192bdab721b25fea0d6e346ab34a7fe7a35db2531be263d0896cb5ab46b39c2f377109cf434b8355fcc057d5972f354cf5e632364ba37e9da301be5

    • C:\GalaxWX\dobxec.exe

      Filesize

      4.0MB

      MD5

      f8b6b904ee3b8e382c279dbe04417b4d

      SHA1

      03602cf876f66d71c08e65fd9f189b0a58b2e614

      SHA256

      8b901dfb36413cb5e0c8c4417d27e4bba20b5ac42e0b8de962a001f44d8dedf1

      SHA512

      4ecf45d5b45fc7c9d144da0de089753691ddf9e7681e6df278c7c45f4bc7e9c7c4207e2c313e36368a21f7f6bfb6ad744c4fea74d464b83cbbc43fd585d71dea

    • C:\UserDotYR\devoptisys.exe

      Filesize

      2.8MB

      MD5

      74085dd95c003bf7276f982d2417264a

      SHA1

      366a9b75a96da5eaac7c5212d0a9d712703a350f

      SHA256

      26a5c5dfd62ed76914659b1b895943d7624b69cb3096362324842a12b81b09ce

      SHA512

      2230e0d8e14cf94afb001cf93e5c8390a5f5fee5d46e0dc0ed6c5b86617c209af22f1a565c3a8a2069fd9c34c4d61eb34d79a24bbdad6d04c7168d3a932ddcd8

    • C:\UserDotYR\devoptisys.exe

      Filesize

      4.0MB

      MD5

      a7845bf5c400700c8aec67da7f68ce87

      SHA1

      3e2f0b94daba871a8b3414f344b6c18dd31c98a6

      SHA256

      a70da9f5e38e02e0300c17facffbcdc31425eea24b19067a1ec3057be5244126

      SHA512

      698cdd0ef9bb4880da92ea8cb73f691eed04a23af2d48c943a2c6cdfbb2558ac0d8ca6a93be32fc0bb1c38900fdb91093373e9079a6688bed3f99c9739c51b93

    • C:\Users\Admin\253086396416_10.0_Admin.ini

      Filesize

      207B

      MD5

      9ae695a2a61af89efadc00bfd9890a5e

      SHA1

      a1353d5a7a723104b5c95e35ed628bfc425a1110

      SHA256

      0b1980600492fa46908ea6004494088c26c6d9a57d1221d1ae8bf7bb06ff9b4c

      SHA512

      6d811d222e35a2f2953503d3fcad0350265a4aecb5a968fa69e2cf4d507d46affa17d5217fe4513c2c9846988aae318e117e0d89221e417540a39e9043bcf1f5

    • C:\Users\Admin\253086396416_10.0_Admin.ini

      Filesize

      175B

      MD5

      e558d324e0d20da8aeeab2c8887eee87

      SHA1

      054a3cda040a3dfa053dc84f2a6183f47b9b4dda

      SHA256

      719d03689e5232a0dc97c68b5daf397eeeb430b1a5d70b0791da741b8f11282f

      SHA512

      d26f53061c87b77955e9ee0b848138886255fc83c7c5e153928a4cf040c49aa1efc7e4dcc9adfb7d62cf1cc1f76baa4aededbcab562022192f0964a375e7ca6c

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevdob.exe

      Filesize

      4.0MB

      MD5

      f28cae36d56dd0f822da241931c3ce2e

      SHA1

      73740745c4e08997c32ca55c008b4edcbfcd5bf2

      SHA256

      92cb85e60b4fec764e8fd12a640b581004275816b87cacccc80ef20f6bf3d4a3

      SHA512

      43668969b6c85a79a3668ea50ac65e0fc5ca7a2590d29906604abf2fa9e0c01ed7d7562292ff174a499f622bd60851b3ec7a37fbe5e6a71ac9018e114f87d557