Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 22:51
Static task
static1
Behavioral task
behavioral1
Sample
1c0f12b16600e9c7bca238aa73f42be0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1c0f12b16600e9c7bca238aa73f42be0N.exe
Resource
win10v2004-20240802-en
General
-
Target
1c0f12b16600e9c7bca238aa73f42be0N.exe
-
Size
4.0MB
-
MD5
1c0f12b16600e9c7bca238aa73f42be0
-
SHA1
bdb41f2be44bbaf4d3cfd26bc15fb73a6e26e9eb
-
SHA256
b82ee40d34fe9e409401531175d2890699ba9ac5fbe8a45b17c35f2d32650348
-
SHA512
ad5882b3812813814295d698db9976b0d7b2c10fec1fa59b42a78b5e7039e08425d48d6b7cc27ddcb05b8227e1f5dd19dd0952b4c7529894dc6062126f41d026
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBSB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUp1bVz8eLFcz
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe 1c0f12b16600e9c7bca238aa73f42be0N.exe -
Executes dropped EXE 2 IoCs
pid Process 1692 sysadob.exe 2508 aoptiec.exe -
Loads dropped DLL 2 IoCs
pid Process 1952 1c0f12b16600e9c7bca238aa73f42be0N.exe 1952 1c0f12b16600e9c7bca238aa73f42be0N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDot21\\aoptiec.exe" 1c0f12b16600e9c7bca238aa73f42be0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBIV\\dobdevloc.exe" 1c0f12b16600e9c7bca238aa73f42be0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aoptiec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c0f12b16600e9c7bca238aa73f42be0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysadob.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1952 1c0f12b16600e9c7bca238aa73f42be0N.exe 1952 1c0f12b16600e9c7bca238aa73f42be0N.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe 1692 sysadob.exe 2508 aoptiec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1952 wrote to memory of 1692 1952 1c0f12b16600e9c7bca238aa73f42be0N.exe 30 PID 1952 wrote to memory of 1692 1952 1c0f12b16600e9c7bca238aa73f42be0N.exe 30 PID 1952 wrote to memory of 1692 1952 1c0f12b16600e9c7bca238aa73f42be0N.exe 30 PID 1952 wrote to memory of 1692 1952 1c0f12b16600e9c7bca238aa73f42be0N.exe 30 PID 1952 wrote to memory of 2508 1952 1c0f12b16600e9c7bca238aa73f42be0N.exe 31 PID 1952 wrote to memory of 2508 1952 1c0f12b16600e9c7bca238aa73f42be0N.exe 31 PID 1952 wrote to memory of 2508 1952 1c0f12b16600e9c7bca238aa73f42be0N.exe 31 PID 1952 wrote to memory of 2508 1952 1c0f12b16600e9c7bca238aa73f42be0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c0f12b16600e9c7bca238aa73f42be0N.exe"C:\Users\Admin\AppData\Local\Temp\1c0f12b16600e9c7bca238aa73f42be0N.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1692
-
-
C:\UserDot21\aoptiec.exeC:\UserDot21\aoptiec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD54b89ff54ec33db405de70292bf343c95
SHA12da1b9a5c4204690754bc7d09577e7e0ecdeda38
SHA256bb2bad8c6e99f1d6f00bfc6deb47407be7853e6395c55a8f4ef4f04d9ae08593
SHA51274e9f1f24df1ded281228aa3aae1388ac65ae11706e83c61b2f10e9e54f25af590481c6e74a5341f635a68c2868ea2c283a189b8948e71763fdf63995bb913a3
-
Filesize
4.0MB
MD5350b47ca1874078e8eea456a7ed5afc4
SHA1d6699f3680cbef0d82f6fa959648b3927f3c63b3
SHA256af81292459c7696c08b453e8ad425ebddd491a5bc0e871848d587385f95ba6a0
SHA512ad9335ad50f8cb3b9e81f129e2323ac89f429a5849c07f2bfc9f13b8ead55445724d2a6da95b693dab36f1aade4356d73836f634dca660f42dd19d9523a7ee03
-
Filesize
4.0MB
MD559430b7ddbe40b3e734712953c865722
SHA1e9d42bc2bbe5e2c32370c5d15f3b7443fdc43660
SHA256a94d6214a9131ccab783759419095f8126709301a4ea7598a0694f64b0298882
SHA5129c31578fb525cd4584253febbdd26743c478b8b55f3cebe902116f6650a7e74bff26ae580cb6df977361ae3b08203e36d9e79b4c1adc85e8715e838b1c627cb6
-
Filesize
172B
MD5f4e29b57c47628f3f06dec72980ccc52
SHA1e141895cc0f83ddbd42baf0c5c3d0566e2ab2f32
SHA256c31f2c8ffe0174940b12acf210579894762806c8786cf8791ee67cc1a55faad7
SHA512c053a4253861620286693a2d8fa61aaa94c03ca327d2b00f50598559f07e512bb595c04ccc3c7dd5b668b4ba6fbb3d16da9693daa8e91e1ef4e9b6b72a50c312
-
Filesize
204B
MD51c608fcbae698d8dff39f89004a04bff
SHA175588059be68c6df0464d87dbf5ac712473e86c7
SHA2562bb691c38b7e1b4a6fab1f4c855cb2be7548c5ff71c4ded5f5fb334a4effdb06
SHA512a364c63601ae29fe758a743d5b1993315c7e8dd1d7446515cd3e0d4a64f67b06623056974d430a83c75822c77190dd746b08bc1474d2ce665a8a6b3700447508
-
Filesize
4.0MB
MD5b224e19ff9904b122083f728e132723d
SHA1d4eccafafb02ebdf83c75bd1c1df856901c3e9a8
SHA256f58d60aff2fedf2f11c41a6df5a9652c7701fc333a125604bad61e79ffcaa6e6
SHA512f64836c252c842cfc7a85e8029b8998a4cb19057ba58d8e374dcc64b3ef7d2c56419a6af0e5331db2f74f755cfd84396808416928a28718a6e2e5fbfa59f7aa7