Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 20:33
Static task
static1
Behavioral task
behavioral1
Sample
3f4224de34fe2467178159f48be64f390021b76ef9992d08c989d5fdb7a38866.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3f4224de34fe2467178159f48be64f390021b76ef9992d08c989d5fdb7a38866.exe
Resource
win10v2004-20240802-en
General
-
Target
3f4224de34fe2467178159f48be64f390021b76ef9992d08c989d5fdb7a38866.exe
-
Size
2.6MB
-
MD5
0109acd74f7a6b696072ead4792639c9
-
SHA1
305da870277ac94018e4cb00664ce794da37eaf7
-
SHA256
3f4224de34fe2467178159f48be64f390021b76ef9992d08c989d5fdb7a38866
-
SHA512
c0b62b3877dc143f2101718361ebe52e505203b6f03dfbce6652f2d89c1d1d43c9a6a9bd2fd621b344e52c570563032e29fca3db0dc2877c2217c398d6a507bb
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBQB/bS:sxX7QnxrloE5dpUpbb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevopti.exe 3f4224de34fe2467178159f48be64f390021b76ef9992d08c989d5fdb7a38866.exe -
Executes dropped EXE 2 IoCs
pid Process 220 sysdevopti.exe 60 adobsys.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvXR\\adobsys.exe" 3f4224de34fe2467178159f48be64f390021b76ef9992d08c989d5fdb7a38866.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidUP\\bodaec.exe" 3f4224de34fe2467178159f48be64f390021b76ef9992d08c989d5fdb7a38866.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f4224de34fe2467178159f48be64f390021b76ef9992d08c989d5fdb7a38866.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysdevopti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4496 3f4224de34fe2467178159f48be64f390021b76ef9992d08c989d5fdb7a38866.exe 4496 3f4224de34fe2467178159f48be64f390021b76ef9992d08c989d5fdb7a38866.exe 4496 3f4224de34fe2467178159f48be64f390021b76ef9992d08c989d5fdb7a38866.exe 4496 3f4224de34fe2467178159f48be64f390021b76ef9992d08c989d5fdb7a38866.exe 220 sysdevopti.exe 220 sysdevopti.exe 60 adobsys.exe 60 adobsys.exe 220 sysdevopti.exe 220 sysdevopti.exe 60 adobsys.exe 60 adobsys.exe 220 sysdevopti.exe 220 sysdevopti.exe 60 adobsys.exe 60 adobsys.exe 220 sysdevopti.exe 220 sysdevopti.exe 60 adobsys.exe 60 adobsys.exe 220 sysdevopti.exe 220 sysdevopti.exe 60 adobsys.exe 60 adobsys.exe 220 sysdevopti.exe 220 sysdevopti.exe 60 adobsys.exe 60 adobsys.exe 220 sysdevopti.exe 220 sysdevopti.exe 60 adobsys.exe 60 adobsys.exe 220 sysdevopti.exe 220 sysdevopti.exe 60 adobsys.exe 60 adobsys.exe 220 sysdevopti.exe 220 sysdevopti.exe 60 adobsys.exe 60 adobsys.exe 220 sysdevopti.exe 220 sysdevopti.exe 60 adobsys.exe 60 adobsys.exe 220 sysdevopti.exe 220 sysdevopti.exe 60 adobsys.exe 60 adobsys.exe 220 sysdevopti.exe 220 sysdevopti.exe 60 adobsys.exe 60 adobsys.exe 220 sysdevopti.exe 220 sysdevopti.exe 60 adobsys.exe 60 adobsys.exe 220 sysdevopti.exe 220 sysdevopti.exe 60 adobsys.exe 60 adobsys.exe 220 sysdevopti.exe 220 sysdevopti.exe 60 adobsys.exe 60 adobsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4496 wrote to memory of 220 4496 3f4224de34fe2467178159f48be64f390021b76ef9992d08c989d5fdb7a38866.exe 87 PID 4496 wrote to memory of 220 4496 3f4224de34fe2467178159f48be64f390021b76ef9992d08c989d5fdb7a38866.exe 87 PID 4496 wrote to memory of 220 4496 3f4224de34fe2467178159f48be64f390021b76ef9992d08c989d5fdb7a38866.exe 87 PID 4496 wrote to memory of 60 4496 3f4224de34fe2467178159f48be64f390021b76ef9992d08c989d5fdb7a38866.exe 90 PID 4496 wrote to memory of 60 4496 3f4224de34fe2467178159f48be64f390021b76ef9992d08c989d5fdb7a38866.exe 90 PID 4496 wrote to memory of 60 4496 3f4224de34fe2467178159f48be64f390021b76ef9992d08c989d5fdb7a38866.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f4224de34fe2467178159f48be64f390021b76ef9992d08c989d5fdb7a38866.exe"C:\Users\Admin\AppData\Local\Temp\3f4224de34fe2467178159f48be64f390021b76ef9992d08c989d5fdb7a38866.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevopti.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:220
-
-
C:\SysDrvXR\adobsys.exeC:\SysDrvXR\adobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:60
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5b57a127993febdce432457ebdf7a2788
SHA140cddf40e818d61bb515bc5a39450b5546dc0ae8
SHA256938a07d62a75e0c3a7a737d33b20aa81e5abcfb286a2165f232032a246904266
SHA5129c3cafff6a3df7d47d7acf4b411455c59890cd11a642ab1096d7dafeee2d0c160a233d7029b0227ca5e31468cacec6f3e8d9bf6f7d3fcce8c48912b29fcddfc0
-
Filesize
202B
MD5e65abe9a9e63bf07677c3a3826d9c615
SHA1899ae64fd14198d7202b2c4ed15c7d42b2913b55
SHA256fdef7542fc54cb70452032965f6fb1146b65e907233527c69a77827524a36e35
SHA5128e18798279424c68718faa3629d25d2c2037dc49a52e6bfb541989ad5950d9cbf7defb0fe549751e09dc46c4ccffb26946379eff44031c1fbd046fd5b76b23bc
-
Filesize
170B
MD566b04b44a92d6918b06abfb11be9bc2a
SHA1087e4b7777e375ff172d5cf2bfe21b2cc53da145
SHA256b6d472f373a01a104854b003275074dc7da8c14ae9dc3045f0956c3d1a950ca2
SHA51242465af00fb39e14e851d8d5b5193c40cf745504d45385c18236e859109d7a31bc0b5541f0e947588af3d45397d6839beeb0d36e75e199f0f9f294f5a6d57ac6
-
Filesize
2.6MB
MD5272d485c1ff614440bdd8e627993f104
SHA1cc6897a88a6a4e6355f2a41812ba0d159dcb9fb9
SHA256f907ca605e79ea079928346fdfabb2e523dbda302806e70b51ef43b2f246ab28
SHA512b74441a0307e2b71f2ada46c6cacf54d36033a60e63ec5f769f9ce349d864a010d40c4e352b704f26ce4427ee9d43c3ab2111a600b9a4c942f0e36719bd37a3a
-
Filesize
2.6MB
MD5ce0e6cf5389c8262180606d80b8c8112
SHA1524243dccf2805504e390d4971170a5c9a17e2ce
SHA25676f6d9c984a5528312566adc0a05922b3bb86af2e058cf29cda1cf6dbdf3f22c
SHA5129df7b54c0f4b379e23428d377986cd5cec5a61b8a5e5b3571b4155af715506ecc624193c67797520db99550571a93819f126e2e861fee8d3bc1ed91c6c411b42
-
Filesize
12KB
MD55ce46de9d1c8ab23eeb8a98bb0b2232e
SHA1eb2b026ffaf5a7802065fa5971c5c4495fa6763a
SHA2560f99b7bc2b192971b8bed8dbf4f50389b59e62d5cae4d0fbbb58657c2730a6b0
SHA512173969eb6ea4e493f9c0d1c1df5c1080fb72fc38f0fc13e5eaffdd7eeae658b9464603a66d0a918d3f86bca65b97dccfd201cd7d66c1758e452476026a290712