Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 14:19

General

  • Target

    e168c7a7d468af821f3e4a83652821a0N.exe

  • Size

    3.9MB

  • MD5

    e168c7a7d468af821f3e4a83652821a0

  • SHA1

    97ec49a8722228f24d650d8e0ae325e34360e182

  • SHA256

    6d8e5a5b5948fd18d00e4a6bc9594f933820903545b3f8e5840c85a24596cc8e

  • SHA512

    716d20e1908ac36ec3635558ad511e78bab753b761caaeaabca8a255433770420d078247866ffe4c24234e9b76d72572c56b4d66b0fac1be1a607ddaf5622bb8

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBEB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUpfbVz8eLFcz

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e168c7a7d468af821f3e4a83652821a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\e168c7a7d468af821f3e4a83652821a0N.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2388
    • C:\SysDrvTJ\adobsys.exe
      C:\SysDrvTJ\adobsys.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\KaVBS5\optidevloc.exe

    Filesize

    3.9MB

    MD5

    0c9a84de9a5a050433cdc5dd4dd67b63

    SHA1

    8ff870da5f5074b60634dbd593a8e4ad5fa2c6d1

    SHA256

    75ec845f49bb4fa3d1d7e71fba6920ba5ed73bb5e08cf575fc2bb9d20f09d5c8

    SHA512

    265f6ee925a2d2d3f008772d42b362bd2f2c285ba2637d240334f7dd1bc61c269f093cff965d8bec334bf7022d9b404c57a0ba3dfcc097f306cd0f16c83777f2

  • C:\KaVBS5\optidevloc.exe

    Filesize

    3.9MB

    MD5

    4c161844fbc5e411fb4ac23bf7ede18d

    SHA1

    6a3e364e224436d33462c529742793bd440a3e75

    SHA256

    e2f108492e7ffd912e496e411cdac06474b408fbeb7622a2fc046f6dad8d302c

    SHA512

    7cb7bc77a419e55b0160a11311ab24625529eecc1f929031ffdbdaf0dca26cfa3ccadd01ac81e8a530df8088b305a8830f32dc5ee5d3919a4ad6c78c652ca28c

  • C:\SysDrvTJ\adobsys.exe

    Filesize

    3.9MB

    MD5

    55d0d997c6899e4501e7ed018d74929c

    SHA1

    619b21dea01d51d6ddac1ab3bf50e2e4e8cc44dd

    SHA256

    23314cad35c75a13b531647b2f034409abfd146be739bd4a39a793efe4775c8d

    SHA512

    dde213f7a9ab9417e9b8327726566b012b0f376f732fa70c800fc5bb1186676f87a1e35da512dc152937c1d85380e027867938a466fcba666aff19824ff71e96

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    173B

    MD5

    27e6dfca51b3962653c7eef91a2f2bba

    SHA1

    08479a7fbee89c770cff6783192cf5101d14418d

    SHA256

    53b0655dce0850a50155f5d982906ba3f7a437312ca880bb5c06df4b8bc0e99a

    SHA512

    3d4e973a6f38846960c42a3d0f1bc75eb600f240c141056662a6f08b5df906a8a897aa4d18aa2feefbe581ff54d2791a29d36d87948690ba323fd8ad8f63c2ca

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    205B

    MD5

    ed366dd3d05164116c029da4db301d56

    SHA1

    9fe9a67848bfcef4443b51d677e6c0ae8aa95dbd

    SHA256

    f043a72a58836d3eadb404615b3683f21f48dfa349d5ae13642e967b4461845c

    SHA512

    e91f83e29d614bf029c46268c5dfa4cc05d7a50e481ebe90cd3b7ae5af8ef77013a542dd4fa7d725f1d31279f5d4ef0a1f0b0d0254fbf254a917932790a8b3eb

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe

    Filesize

    3.9MB

    MD5

    e991a78504416583ade53c7e0e00c1a7

    SHA1

    22ced7c05bf8a31cb62447bcc8a8dfeb141ae15b

    SHA256

    f990e93a2eabf1205a56deff7032dbcbbbe573abcc4a0c42f0b651305827707e

    SHA512

    5a742f3e579e0b424063822ed7fd9db801ccbd5d932d7391e4708bb69c25e8d2b914141308e43a3ad5d4096caf64bd10bec2ebaa51b52412e0fca77543d44b6c