Analysis
-
max time kernel
120s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 21:23
Static task
static1
Behavioral task
behavioral1
Sample
0ae3b651b121d7f05c7ed77c7e0f3c60N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0ae3b651b121d7f05c7ed77c7e0f3c60N.exe
Resource
win10v2004-20240802-en
General
-
Target
0ae3b651b121d7f05c7ed77c7e0f3c60N.exe
-
Size
3.2MB
-
MD5
0ae3b651b121d7f05c7ed77c7e0f3c60
-
SHA1
2a0a58e3aec3f0a76e89208c9ea4eb03ba0bfb5e
-
SHA256
583dea6150a0e5ff28180e09457487016555e1574bc2fc4f1f0a62cb9564452b
-
SHA512
595ce596cca6bc18e6364697ecaddc2800050c196e76ace0e81d81db98d827f591ff9693cc61ea8baa5196494ff993f0314bd05809bf380cd5b145f8148c4764
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBVB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUpmbVz8eLFcz
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe 0ae3b651b121d7f05c7ed77c7e0f3c60N.exe -
Executes dropped EXE 2 IoCs
pid Process 1372 sysadob.exe 5104 aoptisys.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotC2\\aoptisys.exe" 0ae3b651b121d7f05c7ed77c7e0f3c60N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidWG\\boddevloc.exe" 0ae3b651b121d7f05c7ed77c7e0f3c60N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ae3b651b121d7f05c7ed77c7e0f3c60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysadob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aoptisys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3340 0ae3b651b121d7f05c7ed77c7e0f3c60N.exe 3340 0ae3b651b121d7f05c7ed77c7e0f3c60N.exe 3340 0ae3b651b121d7f05c7ed77c7e0f3c60N.exe 3340 0ae3b651b121d7f05c7ed77c7e0f3c60N.exe 1372 sysadob.exe 1372 sysadob.exe 5104 aoptisys.exe 5104 aoptisys.exe 1372 sysadob.exe 1372 sysadob.exe 5104 aoptisys.exe 5104 aoptisys.exe 1372 sysadob.exe 1372 sysadob.exe 5104 aoptisys.exe 5104 aoptisys.exe 1372 sysadob.exe 1372 sysadob.exe 5104 aoptisys.exe 5104 aoptisys.exe 1372 sysadob.exe 1372 sysadob.exe 5104 aoptisys.exe 5104 aoptisys.exe 1372 sysadob.exe 1372 sysadob.exe 5104 aoptisys.exe 5104 aoptisys.exe 1372 sysadob.exe 1372 sysadob.exe 5104 aoptisys.exe 5104 aoptisys.exe 1372 sysadob.exe 1372 sysadob.exe 5104 aoptisys.exe 5104 aoptisys.exe 1372 sysadob.exe 1372 sysadob.exe 5104 aoptisys.exe 5104 aoptisys.exe 1372 sysadob.exe 1372 sysadob.exe 5104 aoptisys.exe 5104 aoptisys.exe 1372 sysadob.exe 1372 sysadob.exe 5104 aoptisys.exe 5104 aoptisys.exe 1372 sysadob.exe 1372 sysadob.exe 5104 aoptisys.exe 5104 aoptisys.exe 1372 sysadob.exe 1372 sysadob.exe 5104 aoptisys.exe 5104 aoptisys.exe 1372 sysadob.exe 1372 sysadob.exe 5104 aoptisys.exe 5104 aoptisys.exe 1372 sysadob.exe 1372 sysadob.exe 5104 aoptisys.exe 5104 aoptisys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3340 wrote to memory of 1372 3340 0ae3b651b121d7f05c7ed77c7e0f3c60N.exe 86 PID 3340 wrote to memory of 1372 3340 0ae3b651b121d7f05c7ed77c7e0f3c60N.exe 86 PID 3340 wrote to memory of 1372 3340 0ae3b651b121d7f05c7ed77c7e0f3c60N.exe 86 PID 3340 wrote to memory of 5104 3340 0ae3b651b121d7f05c7ed77c7e0f3c60N.exe 87 PID 3340 wrote to memory of 5104 3340 0ae3b651b121d7f05c7ed77c7e0f3c60N.exe 87 PID 3340 wrote to memory of 5104 3340 0ae3b651b121d7f05c7ed77c7e0f3c60N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ae3b651b121d7f05c7ed77c7e0f3c60N.exe"C:\Users\Admin\AppData\Local\Temp\0ae3b651b121d7f05c7ed77c7e0f3c60N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1372
-
-
C:\UserDotC2\aoptisys.exeC:\UserDotC2\aoptisys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304KB
MD5399379eb21d4d1a237313b121affb187
SHA146027502073bd42582ab093745ee5b3ab3993c89
SHA256b18f78c6135e89a0439c9731828e771b0d7bf7336debc3e55a78b2166892ed80
SHA51209e11abc2424080d4e6ada9fe09aec728bd0c2d8fab5c85e8070fd138dfbdd9d5a2754d96dc1bcc04b953b9a898167434c88d13f980ebe1dd67598d93441bfa9
-
Filesize
3.2MB
MD5736f8ca84f7d102c62ac49cd5c7c9d5d
SHA1f7289b454f4c2b8dd89f3b17f63de0a7f019fae4
SHA2560ece297311651c87246c38987e9af7ed8e208e49c68e2df81777080e613cf001
SHA51236bbfd955a6e160a10a5ce568bd6ee2d48e126ce0ba45540e63438077126226991039f1aebe3c5530f3939c39c4bdff357f34e0b3a54c1c64dc523bd28f75d2d
-
Filesize
204B
MD5690132f1787a014e19ca00362cf39555
SHA1c40af9785fb3a0aafa912fb0ed4f9858a1776a1f
SHA2568cdfc30f72878ada55748d8914f42b6e1b97d27b0c81e6bbeaedd369eaf8fc53
SHA512ca9ca980b0ac13f71440c3750216107a46048cf9f2b9b289dcaacf578990e0020251fd7b42bf370fb80ebb6502da967c7b3aeb7ae44699092f0d970411708abb
-
Filesize
172B
MD5d39122d66ca51373a08b2c403099d811
SHA166c41688e68e08d7f2fe6cc5bdaf964bc699388e
SHA256ee888c616dd4c8850835bcc8271e1a82885d0548aa10cc13e2ce903a53605b8b
SHA5129d30d3e01f5ff5e4164f16abab6e4e6d8fc27fa6ebe66ffd83a2590a191749534aa63d7af640e7357ae12b70eccae4bd09dda6e43e9794d934bcce6bb1ffa012
-
Filesize
3.2MB
MD56cfcee4dcc9c342263edbfe0e0d7b7ac
SHA11f8ae1d2821f40926ca1093aabd9e4977ea2dd98
SHA256e59a4392d6662093e985ba0e75add632a55d02fe7784915f7f1ef1d801174a1f
SHA512e4b4f7e0c35cc37fb19c33a91d2daffa50b2e23fef9a211931f0204b78b99230c330d0204f3ba6fb02663013b6e0c10b8a50625edbbcf384bf60bc4ec8fc0dca
-
Filesize
440KB
MD5a163b1d5f9c728bf6fb50fe973f47185
SHA12a5e96d1c8c2a734133429ea8071d9876b3ec7f5
SHA25620f59aac1973c1539362ac0b4e5cde2197c7722b4096925545cf604ae2207cea
SHA512c1983133aa7a0e033e878e1f2cf2c08ac7dcd1d27a77686a05c78d36abb7240d8d45727ef0b68bbf1abdf9c09a1422018a51acb4def8d7a8877e460d5fe62339
-
Filesize
387KB
MD5fda58b82866fcea2f90a0fb1334c0535
SHA119f9e0a783a9e34304c9dcf8e5c9eb9163ec5d14
SHA256c057a517763e52d64808ee5d6b6a585fbede01ff91f109e1bc5023c25ff87a0b
SHA51264aad126ada3e9d780a001e8745769684d66b1833040060ddc0dbb3b849a00943934d50295be0c48f06f1af46bf388cfae1cdc0d073b5c582730929e22b2b906