Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-09-2024 12:16

General

  • Target

    ed3185b41aacffe090bde376d9b43560N.exe

  • Size

    2.6MB

  • MD5

    ed3185b41aacffe090bde376d9b43560

  • SHA1

    868cde6b6df79bd3ece4e1e87320490fac60104f

  • SHA256

    c60fc62b310367a4877e73c1ff6669212a1fcd06b8973c853beab932c3668ff1

  • SHA512

    106fa2309094d43c303277069a5873250dbcabe8ca51c2742b53a50d6d137894d314ef4c2f68f8b355a9d0769dc2d21d2463f76410e1a4e86c0e17ec0a8a80fc

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBVB/bS:sxX7QnxrloE5dpUpSb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed3185b41aacffe090bde376d9b43560N.exe
    "C:\Users\Admin\AppData\Local\Temp\ed3185b41aacffe090bde376d9b43560N.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4652
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2532
    • C:\FilesNL\xoptiloc.exe
      C:\FilesNL\xoptiloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\FilesNL\xoptiloc.exe

    Filesize

    436KB

    MD5

    a4f367fff7abc059f3b65e0218a62926

    SHA1

    b89cd8003a348f7e4dff9974a7d394de77305dff

    SHA256

    7269da6618eefbea9a0d0e36bfa08fbe2119c5c0a234ca1c40cb6e8b58dcd226

    SHA512

    17f6f0e393c867d8d4d98cf19a17b5ec5e1cb09f7debbf17f10a60ad148723cf99b59aaa7a445ba8cc2ef06b7c4ac185f5594c4e1dd5568cf44d3b1d73e11d4f

  • C:\FilesNL\xoptiloc.exe

    Filesize

    2.6MB

    MD5

    6a6158e19671a0a5da3fd380d225106c

    SHA1

    81f6943368d3e272a5b3f822be4f2730a584253d

    SHA256

    421c94ae973cc9f1f0fb3c4c6639778236a7b01ceb887589be56b4c43a4ac630

    SHA512

    3438ee8acafeacceed61ea4d866130d60437272a3b9581c9785991e1fec2544d0136359be31ec1bb089f62c3136229079770a5addddf24c81e42c490d67a6b6f

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    199B

    MD5

    8d450c5278e69370596539fbb52f1d92

    SHA1

    efadf7292de97b659a3a2c25cea75b8a79ab7600

    SHA256

    03c9228c5d513f561a9147a638fd9c792739a1db1c609955add33d60a3b2ce33

    SHA512

    1474e2bef270af34e1afab5b7f5611bc32f19a8e422b6498afa8f7cb844233a0e33ab1522500012a34a543ecdb8f2313d9292b65349e50f2e5d7391d54f32f81

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    167B

    MD5

    c74fb3a991fd102e060e77e577dc81e9

    SHA1

    6335d37e0a29a829857e5e8d1dab86af2a8fb84f

    SHA256

    4c88590da3c9e1b5ce7565a36cac4d84733b4818eaeeb4d4bc304549370c00d1

    SHA512

    b776cec75889ec198fc2d020610e4733a2e02a61050f7265a7f78ad2023f7f304175e9996db6b504612acc096832cf0cc20a2ee2f76edd039b0bdff98f4a23b8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe

    Filesize

    2.6MB

    MD5

    c74581345dac1724ecdbb7c1fb8ecccd

    SHA1

    3ac2b40a1105844cfe7bbadd8d92d98fea13d1ca

    SHA256

    5f6ad96dcfaec47e66d62f4f46d2210635f185ec6890379e7a031dbf854f8357

    SHA512

    87455b074e4f35d644f8d7f30cb0f851cd750b1b953410d08dbc88a8f22aa9f2a37e0a07d15780d2b4f44bbcd0298f5088e8f44ed3c2f6cf463d38c8d584a303

  • C:\VidU6\dobxec.exe

    Filesize

    86KB

    MD5

    ef576114a6ff3f98c1706d6b5de36c8c

    SHA1

    9b792fc9226efc00f8f0196fa12b5c0fca0c7d65

    SHA256

    544940f3f93aea0dbd580a2f6e530fe0f4faa0182ca36cadbae7a0833ec16031

    SHA512

    7ff90dcd71cd46e4fba5a439cb2b2f64ffb22334926c142d2809079a659502ec55b5c9c6e52c626ab8ae93c34cc6eeb5aae966048275bd78907ce748185b5783

  • C:\VidU6\dobxec.exe

    Filesize

    2.6MB

    MD5

    acee6596f1aec8127af36cbacdc5f5f8

    SHA1

    82b5580b19f13683bc83d6e5783ee65cb7840f38

    SHA256

    1f6bc1d853a12be34ec8f33c3362e2db7117eb58e466e78d51292dca06c43fa0

    SHA512

    ae5e8c4faabf7e5656c7e95247dcb2a18dd0ded0bfd885be8e9f51aa964bdb757aba6b374ff8536c793aa5d89177682ceff2bfdc3bae75ccb5be728b2aede72a