Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 03:13
Static task
static1
Behavioral task
behavioral1
Sample
d4cb8ef2fcb3d604aa5a102e0d246980N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d4cb8ef2fcb3d604aa5a102e0d246980N.exe
Resource
win10v2004-20240802-en
General
-
Target
d4cb8ef2fcb3d604aa5a102e0d246980N.exe
-
Size
3.0MB
-
MD5
d4cb8ef2fcb3d604aa5a102e0d246980
-
SHA1
feac828ecdf31f973d51d82c027f57f417ea5caa
-
SHA256
527cba82bf592fb3283fb16497875e9f8d0365d0ae6c52244f23f63e97f3095f
-
SHA512
95534187bada8a56bcc6111197cd36da8a2697a880ed4ba2580e25f769ba4fe27596411bf849d753bbad023e354e371e0f90afc8dff2d8fd11c42f21214cc259
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBKB/bSqz8:sxX7QnxrloE5dpUpFbVz8
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxdob.exe d4cb8ef2fcb3d604aa5a102e0d246980N.exe -
Executes dropped EXE 2 IoCs
pid Process 4084 sysxdob.exe 1800 devbodloc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidM6\\boddevsys.exe" d4cb8ef2fcb3d604aa5a102e0d246980N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeFW\\devbodloc.exe" d4cb8ef2fcb3d604aa5a102e0d246980N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4cb8ef2fcb3d604aa5a102e0d246980N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysxdob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devbodloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1368 d4cb8ef2fcb3d604aa5a102e0d246980N.exe 1368 d4cb8ef2fcb3d604aa5a102e0d246980N.exe 1368 d4cb8ef2fcb3d604aa5a102e0d246980N.exe 1368 d4cb8ef2fcb3d604aa5a102e0d246980N.exe 4084 sysxdob.exe 4084 sysxdob.exe 1800 devbodloc.exe 1800 devbodloc.exe 4084 sysxdob.exe 4084 sysxdob.exe 1800 devbodloc.exe 1800 devbodloc.exe 4084 sysxdob.exe 4084 sysxdob.exe 1800 devbodloc.exe 1800 devbodloc.exe 4084 sysxdob.exe 4084 sysxdob.exe 1800 devbodloc.exe 1800 devbodloc.exe 4084 sysxdob.exe 4084 sysxdob.exe 1800 devbodloc.exe 1800 devbodloc.exe 4084 sysxdob.exe 4084 sysxdob.exe 1800 devbodloc.exe 1800 devbodloc.exe 4084 sysxdob.exe 4084 sysxdob.exe 1800 devbodloc.exe 1800 devbodloc.exe 4084 sysxdob.exe 4084 sysxdob.exe 1800 devbodloc.exe 1800 devbodloc.exe 4084 sysxdob.exe 4084 sysxdob.exe 1800 devbodloc.exe 1800 devbodloc.exe 4084 sysxdob.exe 4084 sysxdob.exe 1800 devbodloc.exe 1800 devbodloc.exe 4084 sysxdob.exe 4084 sysxdob.exe 1800 devbodloc.exe 1800 devbodloc.exe 4084 sysxdob.exe 4084 sysxdob.exe 1800 devbodloc.exe 1800 devbodloc.exe 4084 sysxdob.exe 4084 sysxdob.exe 1800 devbodloc.exe 1800 devbodloc.exe 4084 sysxdob.exe 4084 sysxdob.exe 1800 devbodloc.exe 1800 devbodloc.exe 4084 sysxdob.exe 4084 sysxdob.exe 1800 devbodloc.exe 1800 devbodloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1368 wrote to memory of 4084 1368 d4cb8ef2fcb3d604aa5a102e0d246980N.exe 91 PID 1368 wrote to memory of 4084 1368 d4cb8ef2fcb3d604aa5a102e0d246980N.exe 91 PID 1368 wrote to memory of 4084 1368 d4cb8ef2fcb3d604aa5a102e0d246980N.exe 91 PID 1368 wrote to memory of 1800 1368 d4cb8ef2fcb3d604aa5a102e0d246980N.exe 93 PID 1368 wrote to memory of 1800 1368 d4cb8ef2fcb3d604aa5a102e0d246980N.exe 93 PID 1368 wrote to memory of 1800 1368 d4cb8ef2fcb3d604aa5a102e0d246980N.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4cb8ef2fcb3d604aa5a102e0d246980N.exe"C:\Users\Admin\AppData\Local\Temp\d4cb8ef2fcb3d604aa5a102e0d246980N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxdob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxdob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4084
-
-
C:\AdobeFW\devbodloc.exeC:\AdobeFW\devbodloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD51beb23ec87370259c54091db2aaf1fb0
SHA117db2fbd87fca84ac1c99f627bd04bcbad042a32
SHA25654c4b747075effbb7d8937f52333aa53b98555bbc90d608e719a6a1fafbc1341
SHA5122ae478617df801ba030572895ada8a93b43167b22709b42ff31f0f25e4f0a53445ce766b8c04304c5042503f693a0693abf1135d33e2de28c32265c09ca563c2
-
Filesize
203B
MD5c930286aed1318f6162bcafec492d493
SHA15b060ba3bc70169ff6aa706b72fe57d41fd404ee
SHA256b74a0afb3bd4aab9f7e8cbb01f97ad6bc667a401ce6851aba93ea6bf191a72d7
SHA512f5accaece1ce37dcf548d4e06e4f04d80dfe050e14eb2a9053ee89ea5187aed9f5ff98e5d9593fad6172e8aa8770f31cef8c1b00a5ebf14272da43f9745f31c0
-
Filesize
171B
MD53990583dc6e6622506dd15cef58f786f
SHA1e30f10b48ddf2ae8ce15ce29b20d9395a8d7ec2f
SHA256af1ab1493dc863212116fcb519cc9ea66a83ef25d6a341d1443fce951917e7f9
SHA512bc6e050b36a3d965a3feeb91630b1973bcaa5d51fdc63c272cf8d83a8833b95145e9d37fc2d8c42da8bcf96f4c10a9e05eabe9b2db7194308bf061d4c83b2546
-
Filesize
3.0MB
MD517bb510e564f16d3e7dec11aac4bb5f0
SHA105fb3b7b99516cb970ae0b58602eb49bbfaf87c8
SHA2566d6fd76ddaa37c162b4fb5080f0e56462c1693ec864d14572c0bf6e277b2e529
SHA5121f723c7d52d1e6e10f3877b7bea1d666a0bdad33aa6fc5d9c1eb11e0ccd4c22eea14cbf0af6c67fc61f52ace7a4be43ee01552bd2159a8355a93c003c05dd101
-
Filesize
2.1MB
MD5995cb5deb58b8a04384e4c5590c283fc
SHA167ae55e9950e837fefa053df37c6dede9374dabc
SHA256156a483e281c788f66e65a7c1f56b7204207e460f1004f624be26ac37c815726
SHA512749041313a8b1b38787fb1bfedefd2d0fde800f8d581adf726789282eb07f129f33b839f307f6ced6172f04f2c906f21a62f33395a56f82f5bdead7c9506fd04
-
Filesize
3.0MB
MD51d6ed24079f5e7758739b4d483f357b9
SHA1e6ca2d8cdc7e99c2b56acbb5c9235ba88b4612da
SHA25659d675f6003383af0fd692446b75d2825929980b314a022c96396583673b35e6
SHA5128e1fe4f489b9437fa1b8e9d16442aa3b8952528324782df620fabacb21eb7f47bf5cc25b880c2d8b19c2cfe8b91bee163e180f99f400eab8ef8c2abbb4f10fe3