Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 18:09
Static task
static1
Behavioral task
behavioral1
Sample
b96389758a306664ea250dcd695713e0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b96389758a306664ea250dcd695713e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
b96389758a306664ea250dcd695713e0N.exe
-
Size
2.6MB
-
MD5
b96389758a306664ea250dcd695713e0
-
SHA1
295944fdf2f79898c3b78dc86d2a27f4d68893fb
-
SHA256
6125c0bc6e882c126e62e2e167ed7dbd95be7a657a28222b5c0adf441dfc5c97
-
SHA512
a8a0d35a72cd6946f1df07dfd97cfa4485e331157883a59bed4204abcc47edcd403bc07744b34c0dd60a5a84fb79eb402b15a39d6f9e68e09aa49956a971ec39
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB6B/bS:sxX7QnxrloE5dpUpxb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxdob.exe b96389758a306664ea250dcd695713e0N.exe -
Executes dropped EXE 2 IoCs
pid Process 3976 sysxdob.exe 4760 abodloc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotUN\\abodloc.exe" b96389758a306664ea250dcd695713e0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBC2\\bodasys.exe" b96389758a306664ea250dcd695713e0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b96389758a306664ea250dcd695713e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysxdob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abodloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1536 b96389758a306664ea250dcd695713e0N.exe 1536 b96389758a306664ea250dcd695713e0N.exe 1536 b96389758a306664ea250dcd695713e0N.exe 1536 b96389758a306664ea250dcd695713e0N.exe 3976 sysxdob.exe 3976 sysxdob.exe 4760 abodloc.exe 4760 abodloc.exe 3976 sysxdob.exe 3976 sysxdob.exe 4760 abodloc.exe 4760 abodloc.exe 3976 sysxdob.exe 3976 sysxdob.exe 4760 abodloc.exe 4760 abodloc.exe 3976 sysxdob.exe 3976 sysxdob.exe 4760 abodloc.exe 4760 abodloc.exe 3976 sysxdob.exe 3976 sysxdob.exe 4760 abodloc.exe 4760 abodloc.exe 3976 sysxdob.exe 3976 sysxdob.exe 4760 abodloc.exe 4760 abodloc.exe 3976 sysxdob.exe 3976 sysxdob.exe 4760 abodloc.exe 4760 abodloc.exe 3976 sysxdob.exe 3976 sysxdob.exe 4760 abodloc.exe 4760 abodloc.exe 3976 sysxdob.exe 3976 sysxdob.exe 4760 abodloc.exe 4760 abodloc.exe 3976 sysxdob.exe 3976 sysxdob.exe 4760 abodloc.exe 4760 abodloc.exe 3976 sysxdob.exe 3976 sysxdob.exe 4760 abodloc.exe 4760 abodloc.exe 3976 sysxdob.exe 3976 sysxdob.exe 4760 abodloc.exe 4760 abodloc.exe 3976 sysxdob.exe 3976 sysxdob.exe 4760 abodloc.exe 4760 abodloc.exe 3976 sysxdob.exe 3976 sysxdob.exe 4760 abodloc.exe 4760 abodloc.exe 3976 sysxdob.exe 3976 sysxdob.exe 4760 abodloc.exe 4760 abodloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1536 wrote to memory of 3976 1536 b96389758a306664ea250dcd695713e0N.exe 88 PID 1536 wrote to memory of 3976 1536 b96389758a306664ea250dcd695713e0N.exe 88 PID 1536 wrote to memory of 3976 1536 b96389758a306664ea250dcd695713e0N.exe 88 PID 1536 wrote to memory of 4760 1536 b96389758a306664ea250dcd695713e0N.exe 89 PID 1536 wrote to memory of 4760 1536 b96389758a306664ea250dcd695713e0N.exe 89 PID 1536 wrote to memory of 4760 1536 b96389758a306664ea250dcd695713e0N.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b96389758a306664ea250dcd695713e0N.exe"C:\Users\Admin\AppData\Local\Temp\b96389758a306664ea250dcd695713e0N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxdob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxdob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3976
-
-
C:\UserDotUN\abodloc.exeC:\UserDotUN\abodloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD538a1679154245bfc49bc0f6cbf0cfd38
SHA11067a109841129128736c38d6148d834d365af24
SHA256cf19c3238885b466ee0788ffaabffd4b7805a773e64baa329dfb0b651215624b
SHA512d0112a9c20d46d20746f64fc982d6de569d6c7384a13b8daf86078292e894e48fb246cc08280fd86d972e9e6dd6e7bebc2260c30c9c075a181437d0416446024
-
Filesize
1.2MB
MD5fd5a1f561508ea2dbeab37ccc413a453
SHA1b38bdce57eeafdd529f60e8a139e3cd421d98941
SHA256a933b32bc0a217ef427c6b8ef8c65cdeb13cbb27e8f35db01b59c75077d4ccbc
SHA5122977cea87775f83a7b58e5a892978e91abd6335bb8248a2ba8df3ff2769a6a0cf9820cd4c2102df0eb33df410846ab75f54fba78344c5d0f3a5504e0ae4142a6
-
Filesize
2.6MB
MD5a92c18d648d89239fbf0339525b27edf
SHA1770bf75d94cf2ad8c2ccc72c80181c3706e5c852
SHA2562cb967212b4b1987d7cf6df0b3260f03bfe65b91ed27e524d8402704ae3dd7a5
SHA512bde59aa250216fad1dc37e8573a248a4f65132af87224eb3745a5ecba8c7a1cdfc206d4bee529b7e4ad20ee97682910128401a9156b0b49f4c48173faaea1652
-
Filesize
202B
MD55365e14b5b0c2164576875d292e41e87
SHA122b8458883e9f305177406b300fbddc34a6bc0ea
SHA25693e7ee7bff28d092efad457c23029355b86c8ce89f515e70263e5eaee8ddafb4
SHA512398f7619e56ab60d73c3ad8fe6bcce30a5ad903d0d43b576cfb503f5a71f63166b9c1730d98d36e0fbfacb62ca2f0b5d03ef96027e9bd09b3ebc246418ef42ba
-
Filesize
170B
MD5496410874357837f996d12f1f4d5228a
SHA1925a0c8bb68a5e571b3e250c97dec1ad607a2a1d
SHA256ac545375e631f26d17ad4afc118ec9c1204ecfc14eeeca213ea370ff0a871b12
SHA512809312c22e4f4cd5dae2975b808ae1e774ca4df70ab9be9cc820dcf66fda9d3606827c85b37eaa2c9f0dc7a4edb3a6970ad0c36860def457dd64555199bdbba5
-
Filesize
2.6MB
MD56050a3de17eff63e6209970dd73b833b
SHA1eefced1a620bb4fabd92eafd0bfeb490ab0e0ee9
SHA256c8ab3e898dd48a03ba537d1f94bb27969ee1cf24b760ca4a04a8d1eb212c173d
SHA51275fd832bfe348fdc8b24b7190d5c77acc0930249f96ee6ebcb287d174c9b44ce9fb66826a5d7ba0b0259b0180cf11b9bf00f098741c5c60a024590a19f188a35