Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 12:16
Static task
static1
Behavioral task
behavioral1
Sample
ed3185b41aacffe090bde376d9b43560N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed3185b41aacffe090bde376d9b43560N.exe
Resource
win10v2004-20240802-en
General
-
Target
ed3185b41aacffe090bde376d9b43560N.exe
-
Size
2.6MB
-
MD5
ed3185b41aacffe090bde376d9b43560
-
SHA1
868cde6b6df79bd3ece4e1e87320490fac60104f
-
SHA256
c60fc62b310367a4877e73c1ff6669212a1fcd06b8973c853beab932c3668ff1
-
SHA512
106fa2309094d43c303277069a5873250dbcabe8ca51c2742b53a50d6d137894d314ef4c2f68f8b355a9d0769dc2d21d2463f76410e1a4e86c0e17ec0a8a80fc
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBVB/bS:sxX7QnxrloE5dpUpSb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe ed3185b41aacffe090bde376d9b43560N.exe -
Executes dropped EXE 2 IoCs
pid Process 2532 locadob.exe 912 xoptiloc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesNL\\xoptiloc.exe" ed3185b41aacffe090bde376d9b43560N.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidU6\\dobxec.exe" ed3185b41aacffe090bde376d9b43560N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed3185b41aacffe090bde376d9b43560N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locadob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xoptiloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4652 ed3185b41aacffe090bde376d9b43560N.exe 4652 ed3185b41aacffe090bde376d9b43560N.exe 4652 ed3185b41aacffe090bde376d9b43560N.exe 4652 ed3185b41aacffe090bde376d9b43560N.exe 2532 locadob.exe 2532 locadob.exe 912 xoptiloc.exe 912 xoptiloc.exe 2532 locadob.exe 2532 locadob.exe 912 xoptiloc.exe 912 xoptiloc.exe 2532 locadob.exe 2532 locadob.exe 912 xoptiloc.exe 912 xoptiloc.exe 2532 locadob.exe 2532 locadob.exe 912 xoptiloc.exe 912 xoptiloc.exe 2532 locadob.exe 2532 locadob.exe 912 xoptiloc.exe 912 xoptiloc.exe 2532 locadob.exe 2532 locadob.exe 912 xoptiloc.exe 912 xoptiloc.exe 2532 locadob.exe 2532 locadob.exe 912 xoptiloc.exe 912 xoptiloc.exe 2532 locadob.exe 2532 locadob.exe 912 xoptiloc.exe 912 xoptiloc.exe 2532 locadob.exe 2532 locadob.exe 912 xoptiloc.exe 912 xoptiloc.exe 2532 locadob.exe 2532 locadob.exe 912 xoptiloc.exe 912 xoptiloc.exe 2532 locadob.exe 2532 locadob.exe 912 xoptiloc.exe 912 xoptiloc.exe 2532 locadob.exe 2532 locadob.exe 912 xoptiloc.exe 912 xoptiloc.exe 2532 locadob.exe 2532 locadob.exe 912 xoptiloc.exe 912 xoptiloc.exe 2532 locadob.exe 2532 locadob.exe 912 xoptiloc.exe 912 xoptiloc.exe 2532 locadob.exe 2532 locadob.exe 912 xoptiloc.exe 912 xoptiloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4652 wrote to memory of 2532 4652 ed3185b41aacffe090bde376d9b43560N.exe 86 PID 4652 wrote to memory of 2532 4652 ed3185b41aacffe090bde376d9b43560N.exe 86 PID 4652 wrote to memory of 2532 4652 ed3185b41aacffe090bde376d9b43560N.exe 86 PID 4652 wrote to memory of 912 4652 ed3185b41aacffe090bde376d9b43560N.exe 87 PID 4652 wrote to memory of 912 4652 ed3185b41aacffe090bde376d9b43560N.exe 87 PID 4652 wrote to memory of 912 4652 ed3185b41aacffe090bde376d9b43560N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed3185b41aacffe090bde376d9b43560N.exe"C:\Users\Admin\AppData\Local\Temp\ed3185b41aacffe090bde376d9b43560N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2532
-
-
C:\FilesNL\xoptiloc.exeC:\FilesNL\xoptiloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
436KB
MD5a4f367fff7abc059f3b65e0218a62926
SHA1b89cd8003a348f7e4dff9974a7d394de77305dff
SHA2567269da6618eefbea9a0d0e36bfa08fbe2119c5c0a234ca1c40cb6e8b58dcd226
SHA51217f6f0e393c867d8d4d98cf19a17b5ec5e1cb09f7debbf17f10a60ad148723cf99b59aaa7a445ba8cc2ef06b7c4ac185f5594c4e1dd5568cf44d3b1d73e11d4f
-
Filesize
2.6MB
MD56a6158e19671a0a5da3fd380d225106c
SHA181f6943368d3e272a5b3f822be4f2730a584253d
SHA256421c94ae973cc9f1f0fb3c4c6639778236a7b01ceb887589be56b4c43a4ac630
SHA5123438ee8acafeacceed61ea4d866130d60437272a3b9581c9785991e1fec2544d0136359be31ec1bb089f62c3136229079770a5addddf24c81e42c490d67a6b6f
-
Filesize
199B
MD58d450c5278e69370596539fbb52f1d92
SHA1efadf7292de97b659a3a2c25cea75b8a79ab7600
SHA25603c9228c5d513f561a9147a638fd9c792739a1db1c609955add33d60a3b2ce33
SHA5121474e2bef270af34e1afab5b7f5611bc32f19a8e422b6498afa8f7cb844233a0e33ab1522500012a34a543ecdb8f2313d9292b65349e50f2e5d7391d54f32f81
-
Filesize
167B
MD5c74fb3a991fd102e060e77e577dc81e9
SHA16335d37e0a29a829857e5e8d1dab86af2a8fb84f
SHA2564c88590da3c9e1b5ce7565a36cac4d84733b4818eaeeb4d4bc304549370c00d1
SHA512b776cec75889ec198fc2d020610e4733a2e02a61050f7265a7f78ad2023f7f304175e9996db6b504612acc096832cf0cc20a2ee2f76edd039b0bdff98f4a23b8
-
Filesize
2.6MB
MD5c74581345dac1724ecdbb7c1fb8ecccd
SHA13ac2b40a1105844cfe7bbadd8d92d98fea13d1ca
SHA2565f6ad96dcfaec47e66d62f4f46d2210635f185ec6890379e7a031dbf854f8357
SHA51287455b074e4f35d644f8d7f30cb0f851cd750b1b953410d08dbc88a8f22aa9f2a37e0a07d15780d2b4f44bbcd0298f5088e8f44ed3c2f6cf463d38c8d584a303
-
Filesize
86KB
MD5ef576114a6ff3f98c1706d6b5de36c8c
SHA19b792fc9226efc00f8f0196fa12b5c0fca0c7d65
SHA256544940f3f93aea0dbd580a2f6e530fe0f4faa0182ca36cadbae7a0833ec16031
SHA5127ff90dcd71cd46e4fba5a439cb2b2f64ffb22334926c142d2809079a659502ec55b5c9c6e52c626ab8ae93c34cc6eeb5aae966048275bd78907ce748185b5783
-
Filesize
2.6MB
MD5acee6596f1aec8127af36cbacdc5f5f8
SHA182b5580b19f13683bc83d6e5783ee65cb7840f38
SHA2561f6bc1d853a12be34ec8f33c3362e2db7117eb58e466e78d51292dca06c43fa0
SHA512ae5e8c4faabf7e5656c7e95247dcb2a18dd0ded0bfd885be8e9f51aa964bdb757aba6b374ff8536c793aa5d89177682ceff2bfdc3bae75ccb5be728b2aede72a