Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 18:54

General

  • Target

    c49441f4f9c7593eec62001337f6c0a0N.exe

  • Size

    2.6MB

  • MD5

    c49441f4f9c7593eec62001337f6c0a0

  • SHA1

    a1bd029957bec6e2481a66ca09147240fe3fd2a1

  • SHA256

    4d9425f1d299292fa3bb48af8f8e24e0df5b9412683df7bb8ce372db6f9f9f99

  • SHA512

    711658ac8908c6e15cc6bcf9b575e73ffa6ba2e050ca7da7e02479a7d6a6fb9a33228a06c314df9daa09d312791ca744db89107509ed7c7f1f90d74c39203377

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBxB/bS:sxX7QnxrloE5dpUpKb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c49441f4f9c7593eec62001337f6c0a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\c49441f4f9c7593eec62001337f6c0a0N.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1508
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxopti.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxopti.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2804
    • C:\AdobeFX\adobsys.exe
      C:\AdobeFX\adobsys.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2708

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\AdobeFX\adobsys.exe

          Filesize

          2.6MB

          MD5

          56792e45b2b0e1fb6c2cf466ee62de07

          SHA1

          d172732cf0627bbeb23330e2892b22cf7619f2d6

          SHA256

          18f63c9bdada7c2341d00e743c6faa2f22475ae499b6f27d9fce3e65c9ea9acd

          SHA512

          b04df3f0652cfcbeee5a6974e23c6e40199e99183a52e6e4885e626efa0f10c756d55d0a671c5dbc6d14662adb43f50325d6818fc17fdc3d86fde70bf25cad2f

        • C:\KaVB1N\optidevsys.exe

          Filesize

          2.6MB

          MD5

          d89ded574a06c3fa08ddb8969c98ced2

          SHA1

          57a5f52e4cd971c06ee9ec3b2206fcfdfbb25815

          SHA256

          e0f71fd76299907a2d186c5876e5185dd83b9e3b31d38d453d39eaea527bf691

          SHA512

          5f9f92a31c4a78dbeaa00f071a1017753800ef0bec425942e1039d610dd64778ae5f20a57ab5634b669a808c76aa256cbb6aee53857a7b4be6685d950b768940

        • C:\KaVB1N\optidevsys.exe

          Filesize

          2.6MB

          MD5

          efdc34d6b77bb69ee923ca962afd9d49

          SHA1

          e2bcba9ac969ae2c01afa90237f996b1c35b6c63

          SHA256

          0de31dde640fbeef692e176dcac3dcc04a88fa0692628ca207f5797e6b7b9f70

          SHA512

          1e7c350a57bae0f505a150cf5569d1e80ec4fb438fc0381606959a32833fad4ebe73931cd915344e2aa3449862c84eb861ccb0c052515d87f97fa6b55a41ab60

        • C:\Users\Admin\253086396416_6.1_Admin.ini

          Filesize

          172B

          MD5

          b2ef51a0280d09e8e6b99e3553ddf9b5

          SHA1

          4d8a2f8568ad8f632232b9f1d13b0b28a34f6848

          SHA256

          c046c753fab74ac456bf63cea87671827cf35b00fefc82e381d5df1cdf69723b

          SHA512

          f4bd23ed05e0a22c4706480bed119f7b67b8ea161f95edcea52495d17cf99b6dcef72a4f254cb5b0bf9728b2ea294a434b4488941e8bbd63bc1ebcf40451921c

        • C:\Users\Admin\253086396416_6.1_Admin.ini

          Filesize

          204B

          MD5

          02543d26c2ca354fc2f510f9b6a4e5df

          SHA1

          fb8d061160bf36dd59cb6dcfd77be28f9d736aac

          SHA256

          7ac68ded57c5a855ee7c7ce3ea79a4b2a8c7ae8aadf2b2ee6d57db111c03e6ad

          SHA512

          e82ac77319a938e6efea4e65aaf48c2826019a6c69f211260103f8772c680690529ac946968095862611160badd0c61c2e3443e19a26278b16044870db7fbaa7

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxopti.exe

          Filesize

          2.6MB

          MD5

          365dea60d211ee845684d1c7bcda5341

          SHA1

          1e551fae6bee7ab9510c876b893714c6cdcafa51

          SHA256

          33984e48d80eaebe7ffbdf9390342bb47305771bc28a5530000c1cb4ad2b614a

          SHA512

          abd9839176bd874b309c87e695c982bcddf20e0661800e0df249275fab96e7985d1a1b36897322431d16074dc06306794ebaed09d9f10d92b0da0015695f51d5