Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2024, 03:13

General

  • Target

    d4cb8ef2fcb3d604aa5a102e0d246980N.exe

  • Size

    3.0MB

  • MD5

    d4cb8ef2fcb3d604aa5a102e0d246980

  • SHA1

    feac828ecdf31f973d51d82c027f57f417ea5caa

  • SHA256

    527cba82bf592fb3283fb16497875e9f8d0365d0ae6c52244f23f63e97f3095f

  • SHA512

    95534187bada8a56bcc6111197cd36da8a2697a880ed4ba2580e25f769ba4fe27596411bf849d753bbad023e354e371e0f90afc8dff2d8fd11c42f21214cc259

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBKB/bSqz8:sxX7QnxrloE5dpUpFbVz8

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4cb8ef2fcb3d604aa5a102e0d246980N.exe
    "C:\Users\Admin\AppData\Local\Temp\d4cb8ef2fcb3d604aa5a102e0d246980N.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxdob.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxdob.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4084
    • C:\AdobeFW\devbodloc.exe
      C:\AdobeFW\devbodloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1800

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\AdobeFW\devbodloc.exe

          Filesize

          3.0MB

          MD5

          1beb23ec87370259c54091db2aaf1fb0

          SHA1

          17db2fbd87fca84ac1c99f627bd04bcbad042a32

          SHA256

          54c4b747075effbb7d8937f52333aa53b98555bbc90d608e719a6a1fafbc1341

          SHA512

          2ae478617df801ba030572895ada8a93b43167b22709b42ff31f0f25e4f0a53445ce766b8c04304c5042503f693a0693abf1135d33e2de28c32265c09ca563c2

        • C:\Users\Admin\253086396416_10.0_Admin.ini

          Filesize

          203B

          MD5

          c930286aed1318f6162bcafec492d493

          SHA1

          5b060ba3bc70169ff6aa706b72fe57d41fd404ee

          SHA256

          b74a0afb3bd4aab9f7e8cbb01f97ad6bc667a401ce6851aba93ea6bf191a72d7

          SHA512

          f5accaece1ce37dcf548d4e06e4f04d80dfe050e14eb2a9053ee89ea5187aed9f5ff98e5d9593fad6172e8aa8770f31cef8c1b00a5ebf14272da43f9745f31c0

        • C:\Users\Admin\253086396416_10.0_Admin.ini

          Filesize

          171B

          MD5

          3990583dc6e6622506dd15cef58f786f

          SHA1

          e30f10b48ddf2ae8ce15ce29b20d9395a8d7ec2f

          SHA256

          af1ab1493dc863212116fcb519cc9ea66a83ef25d6a341d1443fce951917e7f9

          SHA512

          bc6e050b36a3d965a3feeb91630b1973bcaa5d51fdc63c272cf8d83a8833b95145e9d37fc2d8c42da8bcf96f4c10a9e05eabe9b2db7194308bf061d4c83b2546

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxdob.exe

          Filesize

          3.0MB

          MD5

          17bb510e564f16d3e7dec11aac4bb5f0

          SHA1

          05fb3b7b99516cb970ae0b58602eb49bbfaf87c8

          SHA256

          6d6fd76ddaa37c162b4fb5080f0e56462c1693ec864d14572c0bf6e277b2e529

          SHA512

          1f723c7d52d1e6e10f3877b7bea1d666a0bdad33aa6fc5d9c1eb11e0ccd4c22eea14cbf0af6c67fc61f52ace7a4be43ee01552bd2159a8355a93c003c05dd101

        • C:\VidM6\boddevsys.exe

          Filesize

          2.1MB

          MD5

          995cb5deb58b8a04384e4c5590c283fc

          SHA1

          67ae55e9950e837fefa053df37c6dede9374dabc

          SHA256

          156a483e281c788f66e65a7c1f56b7204207e460f1004f624be26ac37c815726

          SHA512

          749041313a8b1b38787fb1bfedefd2d0fde800f8d581adf726789282eb07f129f33b839f307f6ced6172f04f2c906f21a62f33395a56f82f5bdead7c9506fd04

        • C:\VidM6\boddevsys.exe

          Filesize

          3.0MB

          MD5

          1d6ed24079f5e7758739b4d483f357b9

          SHA1

          e6ca2d8cdc7e99c2b56acbb5c9235ba88b4612da

          SHA256

          59d675f6003383af0fd692446b75d2825929980b314a022c96396583673b35e6

          SHA512

          8e1fe4f489b9437fa1b8e9d16442aa3b8952528324782df620fabacb21eb7f47bf5cc25b880c2d8b19c2cfe8b91bee163e180f99f400eab8ef8c2abbb4f10fe3