Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 05:33
Static task
static1
Behavioral task
behavioral1
Sample
f715b76a3f5a9af6f08f68f1e337b9ad88944449a73d47152519c7bde3832d1c.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
f715b76a3f5a9af6f08f68f1e337b9ad88944449a73d47152519c7bde3832d1c.exe
Resource
win10v2004-20240508-en
General
-
Target
f715b76a3f5a9af6f08f68f1e337b9ad88944449a73d47152519c7bde3832d1c.exe
-
Size
3.1MB
-
MD5
f93989fe91432ab483ed3edda3d84814
-
SHA1
c193cdc726c8d6a5eb1ff0fd626a988626f0a90b
-
SHA256
f715b76a3f5a9af6f08f68f1e337b9ad88944449a73d47152519c7bde3832d1c
-
SHA512
0664cccb61106b4481bfdfdf3e07ccfb0d8cc70e77e7ce80a13a7120eefb22bbc9a4297de6dadb8ff5a2dfdee647989bdb13b2dcc0937287398bd3ce229bebdd
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LByB/bSqz8b6LNXJqI:sxX7QnxrloE5dpUpJbVz8eLFc
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevopti.exe f715b76a3f5a9af6f08f68f1e337b9ad88944449a73d47152519c7bde3832d1c.exe -
Executes dropped EXE 2 IoCs
pid Process 2912 sysdevopti.exe 2396 xdobec.exe -
Loads dropped DLL 2 IoCs
pid Process 1856 f715b76a3f5a9af6f08f68f1e337b9ad88944449a73d47152519c7bde3832d1c.exe 1856 f715b76a3f5a9af6f08f68f1e337b9ad88944449a73d47152519c7bde3832d1c.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrv4W\\xdobec.exe" f715b76a3f5a9af6f08f68f1e337b9ad88944449a73d47152519c7bde3832d1c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxAR\\optialoc.exe" f715b76a3f5a9af6f08f68f1e337b9ad88944449a73d47152519c7bde3832d1c.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1856 f715b76a3f5a9af6f08f68f1e337b9ad88944449a73d47152519c7bde3832d1c.exe 1856 f715b76a3f5a9af6f08f68f1e337b9ad88944449a73d47152519c7bde3832d1c.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe 2912 sysdevopti.exe 2396 xdobec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1856 wrote to memory of 2912 1856 f715b76a3f5a9af6f08f68f1e337b9ad88944449a73d47152519c7bde3832d1c.exe 28 PID 1856 wrote to memory of 2912 1856 f715b76a3f5a9af6f08f68f1e337b9ad88944449a73d47152519c7bde3832d1c.exe 28 PID 1856 wrote to memory of 2912 1856 f715b76a3f5a9af6f08f68f1e337b9ad88944449a73d47152519c7bde3832d1c.exe 28 PID 1856 wrote to memory of 2912 1856 f715b76a3f5a9af6f08f68f1e337b9ad88944449a73d47152519c7bde3832d1c.exe 28 PID 1856 wrote to memory of 2396 1856 f715b76a3f5a9af6f08f68f1e337b9ad88944449a73d47152519c7bde3832d1c.exe 29 PID 1856 wrote to memory of 2396 1856 f715b76a3f5a9af6f08f68f1e337b9ad88944449a73d47152519c7bde3832d1c.exe 29 PID 1856 wrote to memory of 2396 1856 f715b76a3f5a9af6f08f68f1e337b9ad88944449a73d47152519c7bde3832d1c.exe 29 PID 1856 wrote to memory of 2396 1856 f715b76a3f5a9af6f08f68f1e337b9ad88944449a73d47152519c7bde3832d1c.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f715b76a3f5a9af6f08f68f1e337b9ad88944449a73d47152519c7bde3832d1c.exe"C:\Users\Admin\AppData\Local\Temp\f715b76a3f5a9af6f08f68f1e337b9ad88944449a73d47152519c7bde3832d1c.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevopti.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2912
-
-
C:\SysDrv4W\xdobec.exeC:\SysDrv4W\xdobec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5f0f3cfdead12ea22fd06b637b119c597
SHA130bb952c8bc0acd987af6da88eb4295cde25a8c1
SHA256e29c6f284c02bd530d6739899a9fc7ce519717efca2f0f78c62c8a183e99b1e7
SHA51247dc05429a26d9c5ff518ab630df1a2d449f963da0d751d96ea778d095455d176474744045b32b60022a7955402eacbd487c5ab112b655c58135c6a4a881e0c7
-
Filesize
340KB
MD5a30922e1b63b3d1bdf468b6eb193f7cf
SHA12ed28e53cd89b577015a82ecb7a4b4ffcb60eb9d
SHA25677fd262e4f16e273a668c7b247ef512be2b9eab79f381ab975538e1d11c87004
SHA51243c766838336747a0a0d0252b4e8fb55cec3e96d6824b77553570539facc06ca2e6255b0e6faa8311dfee8706dc07d0f4929b7e74008ea4c0021ad51eedf09d6
-
Filesize
3.1MB
MD57cfb29ac44f805a505610f7dd04cda38
SHA1e5ca55814539adc1f761093ba9949fa8e2e41a1e
SHA256c7f89ae0024e0384303ec50c611818a4c5929785623208ee09dc43dc01277cf5
SHA51218abfcb57f2b837b737ca5daa472016c2dc33f2a65d1f5acf0664df208418defd7f928b33ed1c02ef722760fe6db182b745cdd66c13041b02eb754cfb4638278
-
Filesize
173B
MD57cda6fe3cb987156bc668aa262a6753b
SHA1562f4185f3035235af9af127844fd4dd6470df0b
SHA256a6cb1dd9d79b8032392833fe432ea3c44bfe0fe3daab680b2e73ec738367d38d
SHA512a400c0e3918ff31934ba4f16a671a27f10b681e0070321d96de1243c7fe5ec4af5026eebf18653bc4084e766abed87dafba3f29af6ff155be54a9b920028ab47
-
Filesize
205B
MD5104a9d7d23633c47910ebc05c881b2cd
SHA13c665d890698c6028ffb0226ac8870f7c0b7975d
SHA25698865abc878a7aa4d5d817de3fdef39c2582d3ebe05c651ee2c99cb012fc8216
SHA51237a7761a56060768df186270b7e88d61f1e43335d5fc333eb19b954d10d8f71f205f646d0dcd98d753f6d12e12c0e0ffd90e3dfcf718f0b3144dad3f276c4d1f
-
Filesize
3.1MB
MD514a7dc28dbd12d0079cdc07fa941458f
SHA15cb5913fbb2ef5512ffeb6a6b6c408e2d47115be
SHA256ee3021ab617e3fce60207ef6e33a1dff7679d63e2aa7b10b860071f618e35c6e
SHA512ee38972af181ad053b3854dd10bc3c7ee02de4f29f73e1c694b11130c1aeca71ef6da770f12e9b38ef1537a7ab8d73d0210c1a974d9a7b1cb7d3acf3d68de3f2