Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 18:54
Static task
static1
Behavioral task
behavioral1
Sample
c49441f4f9c7593eec62001337f6c0a0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c49441f4f9c7593eec62001337f6c0a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
c49441f4f9c7593eec62001337f6c0a0N.exe
-
Size
2.6MB
-
MD5
c49441f4f9c7593eec62001337f6c0a0
-
SHA1
a1bd029957bec6e2481a66ca09147240fe3fd2a1
-
SHA256
4d9425f1d299292fa3bb48af8f8e24e0df5b9412683df7bb8ce372db6f9f9f99
-
SHA512
711658ac8908c6e15cc6bcf9b575e73ffa6ba2e050ca7da7e02479a7d6a6fb9a33228a06c314df9daa09d312791ca744db89107509ed7c7f1f90d74c39203377
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBxB/bS:sxX7QnxrloE5dpUpKb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxopti.exe c49441f4f9c7593eec62001337f6c0a0N.exe -
Executes dropped EXE 2 IoCs
pid Process 2804 sysxopti.exe 2708 adobsys.exe -
Loads dropped DLL 2 IoCs
pid Process 1508 c49441f4f9c7593eec62001337f6c0a0N.exe 1508 c49441f4f9c7593eec62001337f6c0a0N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVB1N\\optidevsys.exe" c49441f4f9c7593eec62001337f6c0a0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeFX\\adobsys.exe" c49441f4f9c7593eec62001337f6c0a0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysxopti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobsys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c49441f4f9c7593eec62001337f6c0a0N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1508 c49441f4f9c7593eec62001337f6c0a0N.exe 1508 c49441f4f9c7593eec62001337f6c0a0N.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe 2804 sysxopti.exe 2708 adobsys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2804 1508 c49441f4f9c7593eec62001337f6c0a0N.exe 30 PID 1508 wrote to memory of 2804 1508 c49441f4f9c7593eec62001337f6c0a0N.exe 30 PID 1508 wrote to memory of 2804 1508 c49441f4f9c7593eec62001337f6c0a0N.exe 30 PID 1508 wrote to memory of 2804 1508 c49441f4f9c7593eec62001337f6c0a0N.exe 30 PID 1508 wrote to memory of 2708 1508 c49441f4f9c7593eec62001337f6c0a0N.exe 31 PID 1508 wrote to memory of 2708 1508 c49441f4f9c7593eec62001337f6c0a0N.exe 31 PID 1508 wrote to memory of 2708 1508 c49441f4f9c7593eec62001337f6c0a0N.exe 31 PID 1508 wrote to memory of 2708 1508 c49441f4f9c7593eec62001337f6c0a0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c49441f4f9c7593eec62001337f6c0a0N.exe"C:\Users\Admin\AppData\Local\Temp\c49441f4f9c7593eec62001337f6c0a0N.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxopti.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2804
-
-
C:\AdobeFX\adobsys.exeC:\AdobeFX\adobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD556792e45b2b0e1fb6c2cf466ee62de07
SHA1d172732cf0627bbeb23330e2892b22cf7619f2d6
SHA25618f63c9bdada7c2341d00e743c6faa2f22475ae499b6f27d9fce3e65c9ea9acd
SHA512b04df3f0652cfcbeee5a6974e23c6e40199e99183a52e6e4885e626efa0f10c756d55d0a671c5dbc6d14662adb43f50325d6818fc17fdc3d86fde70bf25cad2f
-
Filesize
2.6MB
MD5d89ded574a06c3fa08ddb8969c98ced2
SHA157a5f52e4cd971c06ee9ec3b2206fcfdfbb25815
SHA256e0f71fd76299907a2d186c5876e5185dd83b9e3b31d38d453d39eaea527bf691
SHA5125f9f92a31c4a78dbeaa00f071a1017753800ef0bec425942e1039d610dd64778ae5f20a57ab5634b669a808c76aa256cbb6aee53857a7b4be6685d950b768940
-
Filesize
2.6MB
MD5efdc34d6b77bb69ee923ca962afd9d49
SHA1e2bcba9ac969ae2c01afa90237f996b1c35b6c63
SHA2560de31dde640fbeef692e176dcac3dcc04a88fa0692628ca207f5797e6b7b9f70
SHA5121e7c350a57bae0f505a150cf5569d1e80ec4fb438fc0381606959a32833fad4ebe73931cd915344e2aa3449862c84eb861ccb0c052515d87f97fa6b55a41ab60
-
Filesize
172B
MD5b2ef51a0280d09e8e6b99e3553ddf9b5
SHA14d8a2f8568ad8f632232b9f1d13b0b28a34f6848
SHA256c046c753fab74ac456bf63cea87671827cf35b00fefc82e381d5df1cdf69723b
SHA512f4bd23ed05e0a22c4706480bed119f7b67b8ea161f95edcea52495d17cf99b6dcef72a4f254cb5b0bf9728b2ea294a434b4488941e8bbd63bc1ebcf40451921c
-
Filesize
204B
MD502543d26c2ca354fc2f510f9b6a4e5df
SHA1fb8d061160bf36dd59cb6dcfd77be28f9d736aac
SHA2567ac68ded57c5a855ee7c7ce3ea79a4b2a8c7ae8aadf2b2ee6d57db111c03e6ad
SHA512e82ac77319a938e6efea4e65aaf48c2826019a6c69f211260103f8772c680690529ac946968095862611160badd0c61c2e3443e19a26278b16044870db7fbaa7
-
Filesize
2.6MB
MD5365dea60d211ee845684d1c7bcda5341
SHA11e551fae6bee7ab9510c876b893714c6cdcafa51
SHA25633984e48d80eaebe7ffbdf9390342bb47305771bc28a5530000c1cb4ad2b614a
SHA512abd9839176bd874b309c87e695c982bcddf20e0661800e0df249275fab96e7985d1a1b36897322431d16074dc06306794ebaed09d9f10d92b0da0015695f51d5