Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-08-2024 20:33

General

  • Target

    3f4224de34fe2467178159f48be64f390021b76ef9992d08c989d5fdb7a38866.exe

  • Size

    2.6MB

  • MD5

    0109acd74f7a6b696072ead4792639c9

  • SHA1

    305da870277ac94018e4cb00664ce794da37eaf7

  • SHA256

    3f4224de34fe2467178159f48be64f390021b76ef9992d08c989d5fdb7a38866

  • SHA512

    c0b62b3877dc143f2101718361ebe52e505203b6f03dfbce6652f2d89c1d1d43c9a6a9bd2fd621b344e52c570563032e29fca3db0dc2877c2217c398d6a507bb

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBQB/bS:sxX7QnxrloE5dpUpbb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f4224de34fe2467178159f48be64f390021b76ef9992d08c989d5fdb7a38866.exe
    "C:\Users\Admin\AppData\Local\Temp\3f4224de34fe2467178159f48be64f390021b76ef9992d08c989d5fdb7a38866.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4496
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevopti.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevopti.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:220
    • C:\SysDrvXR\adobsys.exe
      C:\SysDrvXR\adobsys.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:60

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\SysDrvXR\adobsys.exe

    Filesize

    2.6MB

    MD5

    b57a127993febdce432457ebdf7a2788

    SHA1

    40cddf40e818d61bb515bc5a39450b5546dc0ae8

    SHA256

    938a07d62a75e0c3a7a737d33b20aa81e5abcfb286a2165f232032a246904266

    SHA512

    9c3cafff6a3df7d47d7acf4b411455c59890cd11a642ab1096d7dafeee2d0c160a233d7029b0227ca5e31468cacec6f3e8d9bf6f7d3fcce8c48912b29fcddfc0

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    202B

    MD5

    e65abe9a9e63bf07677c3a3826d9c615

    SHA1

    899ae64fd14198d7202b2c4ed15c7d42b2913b55

    SHA256

    fdef7542fc54cb70452032965f6fb1146b65e907233527c69a77827524a36e35

    SHA512

    8e18798279424c68718faa3629d25d2c2037dc49a52e6bfb541989ad5950d9cbf7defb0fe549751e09dc46c4ccffb26946379eff44031c1fbd046fd5b76b23bc

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    170B

    MD5

    66b04b44a92d6918b06abfb11be9bc2a

    SHA1

    087e4b7777e375ff172d5cf2bfe21b2cc53da145

    SHA256

    b6d472f373a01a104854b003275074dc7da8c14ae9dc3045f0956c3d1a950ca2

    SHA512

    42465af00fb39e14e851d8d5b5193c40cf745504d45385c18236e859109d7a31bc0b5541f0e947588af3d45397d6839beeb0d36e75e199f0f9f294f5a6d57ac6

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevopti.exe

    Filesize

    2.6MB

    MD5

    272d485c1ff614440bdd8e627993f104

    SHA1

    cc6897a88a6a4e6355f2a41812ba0d159dcb9fb9

    SHA256

    f907ca605e79ea079928346fdfabb2e523dbda302806e70b51ef43b2f246ab28

    SHA512

    b74441a0307e2b71f2ada46c6cacf54d36033a60e63ec5f769f9ce349d864a010d40c4e352b704f26ce4427ee9d43c3ab2111a600b9a4c942f0e36719bd37a3a

  • C:\VidUP\bodaec.exe

    Filesize

    2.6MB

    MD5

    ce0e6cf5389c8262180606d80b8c8112

    SHA1

    524243dccf2805504e390d4971170a5c9a17e2ce

    SHA256

    76f6d9c984a5528312566adc0a05922b3bb86af2e058cf29cda1cf6dbdf3f22c

    SHA512

    9df7b54c0f4b379e23428d377986cd5cec5a61b8a5e5b3571b4155af715506ecc624193c67797520db99550571a93819f126e2e861fee8d3bc1ed91c6c411b42

  • C:\VidUP\bodaec.exe

    Filesize

    12KB

    MD5

    5ce46de9d1c8ab23eeb8a98bb0b2232e

    SHA1

    eb2b026ffaf5a7802065fa5971c5c4495fa6763a

    SHA256

    0f99b7bc2b192971b8bed8dbf4f50389b59e62d5cae4d0fbbb58657c2730a6b0

    SHA512

    173969eb6ea4e493f9c0d1c1df5c1080fb72fc38f0fc13e5eaffdd7eeae658b9464603a66d0a918d3f86bca65b97dccfd201cd7d66c1758e452476026a290712