Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 14:19
Static task
static1
Behavioral task
behavioral1
Sample
e168c7a7d468af821f3e4a83652821a0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
e168c7a7d468af821f3e4a83652821a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
e168c7a7d468af821f3e4a83652821a0N.exe
-
Size
3.9MB
-
MD5
e168c7a7d468af821f3e4a83652821a0
-
SHA1
97ec49a8722228f24d650d8e0ae325e34360e182
-
SHA256
6d8e5a5b5948fd18d00e4a6bc9594f933820903545b3f8e5840c85a24596cc8e
-
SHA512
716d20e1908ac36ec3635558ad511e78bab753b761caaeaabca8a255433770420d078247866ffe4c24234e9b76d72572c56b4d66b0fac1be1a607ddaf5622bb8
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBEB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUpfbVz8eLFcz
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe e168c7a7d468af821f3e4a83652821a0N.exe -
Executes dropped EXE 2 IoCs
pid Process 2388 locxopti.exe 1044 adobsys.exe -
Loads dropped DLL 2 IoCs
pid Process 2408 e168c7a7d468af821f3e4a83652821a0N.exe 2408 e168c7a7d468af821f3e4a83652821a0N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvTJ\\adobsys.exe" e168c7a7d468af821f3e4a83652821a0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBS5\\optidevloc.exe" e168c7a7d468af821f3e4a83652821a0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e168c7a7d468af821f3e4a83652821a0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locxopti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2408 e168c7a7d468af821f3e4a83652821a0N.exe 2408 e168c7a7d468af821f3e4a83652821a0N.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe 2388 locxopti.exe 1044 adobsys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2388 2408 e168c7a7d468af821f3e4a83652821a0N.exe 28 PID 2408 wrote to memory of 2388 2408 e168c7a7d468af821f3e4a83652821a0N.exe 28 PID 2408 wrote to memory of 2388 2408 e168c7a7d468af821f3e4a83652821a0N.exe 28 PID 2408 wrote to memory of 2388 2408 e168c7a7d468af821f3e4a83652821a0N.exe 28 PID 2408 wrote to memory of 1044 2408 e168c7a7d468af821f3e4a83652821a0N.exe 29 PID 2408 wrote to memory of 1044 2408 e168c7a7d468af821f3e4a83652821a0N.exe 29 PID 2408 wrote to memory of 1044 2408 e168c7a7d468af821f3e4a83652821a0N.exe 29 PID 2408 wrote to memory of 1044 2408 e168c7a7d468af821f3e4a83652821a0N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e168c7a7d468af821f3e4a83652821a0N.exe"C:\Users\Admin\AppData\Local\Temp\e168c7a7d468af821f3e4a83652821a0N.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2388
-
-
C:\SysDrvTJ\adobsys.exeC:\SysDrvTJ\adobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD50c9a84de9a5a050433cdc5dd4dd67b63
SHA18ff870da5f5074b60634dbd593a8e4ad5fa2c6d1
SHA25675ec845f49bb4fa3d1d7e71fba6920ba5ed73bb5e08cf575fc2bb9d20f09d5c8
SHA512265f6ee925a2d2d3f008772d42b362bd2f2c285ba2637d240334f7dd1bc61c269f093cff965d8bec334bf7022d9b404c57a0ba3dfcc097f306cd0f16c83777f2
-
Filesize
3.9MB
MD54c161844fbc5e411fb4ac23bf7ede18d
SHA16a3e364e224436d33462c529742793bd440a3e75
SHA256e2f108492e7ffd912e496e411cdac06474b408fbeb7622a2fc046f6dad8d302c
SHA5127cb7bc77a419e55b0160a11311ab24625529eecc1f929031ffdbdaf0dca26cfa3ccadd01ac81e8a530df8088b305a8830f32dc5ee5d3919a4ad6c78c652ca28c
-
Filesize
3.9MB
MD555d0d997c6899e4501e7ed018d74929c
SHA1619b21dea01d51d6ddac1ab3bf50e2e4e8cc44dd
SHA25623314cad35c75a13b531647b2f034409abfd146be739bd4a39a793efe4775c8d
SHA512dde213f7a9ab9417e9b8327726566b012b0f376f732fa70c800fc5bb1186676f87a1e35da512dc152937c1d85380e027867938a466fcba666aff19824ff71e96
-
Filesize
173B
MD527e6dfca51b3962653c7eef91a2f2bba
SHA108479a7fbee89c770cff6783192cf5101d14418d
SHA25653b0655dce0850a50155f5d982906ba3f7a437312ca880bb5c06df4b8bc0e99a
SHA5123d4e973a6f38846960c42a3d0f1bc75eb600f240c141056662a6f08b5df906a8a897aa4d18aa2feefbe581ff54d2791a29d36d87948690ba323fd8ad8f63c2ca
-
Filesize
205B
MD5ed366dd3d05164116c029da4db301d56
SHA19fe9a67848bfcef4443b51d677e6c0ae8aa95dbd
SHA256f043a72a58836d3eadb404615b3683f21f48dfa349d5ae13642e967b4461845c
SHA512e91f83e29d614bf029c46268c5dfa4cc05d7a50e481ebe90cd3b7ae5af8ef77013a542dd4fa7d725f1d31279f5d4ef0a1f0b0d0254fbf254a917932790a8b3eb
-
Filesize
3.9MB
MD5e991a78504416583ade53c7e0e00c1a7
SHA122ced7c05bf8a31cb62447bcc8a8dfeb141ae15b
SHA256f990e93a2eabf1205a56deff7032dbcbbbe573abcc4a0c42f0b651305827707e
SHA5125a742f3e579e0b424063822ed7fd9db801ccbd5d932d7391e4708bb69c25e8d2b914141308e43a3ad5d4096caf64bd10bec2ebaa51b52412e0fca77543d44b6c