Analysis
-
max time kernel
119s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/09/2024, 19:44
Static task
static1
Behavioral task
behavioral1
Sample
403613916f6088f2d9f8cac28c754ec0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
403613916f6088f2d9f8cac28c754ec0N.exe
Resource
win10v2004-20240802-en
General
-
Target
403613916f6088f2d9f8cac28c754ec0N.exe
-
Size
2.6MB
-
MD5
403613916f6088f2d9f8cac28c754ec0
-
SHA1
1b8831aa4c873a9b2737d19fa5d9e66e8e8dac54
-
SHA256
cca47cd581e73883ed369432e24b3ed65126ee119c0a270b9a6b14642be5d4f7
-
SHA512
8788527bea28a87695318462595df7c9ee1bf01f1a39fc9ee39da42c4a36d59d9b811485b1e33f02b66fe889659f0f3a66e6ca15ae6dbfbd566b67b0d8f41956
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB6B/bS:sxX7QnxrloE5dpUpBb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysaopti.exe 403613916f6088f2d9f8cac28c754ec0N.exe -
Executes dropped EXE 2 IoCs
pid Process 2516 sysaopti.exe 728 adobec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvG4\\adobec.exe" 403613916f6088f2d9f8cac28c754ec0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxW0\\dobxsys.exe" 403613916f6088f2d9f8cac28c754ec0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 403613916f6088f2d9f8cac28c754ec0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysaopti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1920 403613916f6088f2d9f8cac28c754ec0N.exe 1920 403613916f6088f2d9f8cac28c754ec0N.exe 1920 403613916f6088f2d9f8cac28c754ec0N.exe 1920 403613916f6088f2d9f8cac28c754ec0N.exe 2516 sysaopti.exe 2516 sysaopti.exe 728 adobec.exe 728 adobec.exe 2516 sysaopti.exe 2516 sysaopti.exe 728 adobec.exe 728 adobec.exe 2516 sysaopti.exe 2516 sysaopti.exe 728 adobec.exe 728 adobec.exe 2516 sysaopti.exe 2516 sysaopti.exe 728 adobec.exe 728 adobec.exe 2516 sysaopti.exe 2516 sysaopti.exe 728 adobec.exe 728 adobec.exe 2516 sysaopti.exe 2516 sysaopti.exe 728 adobec.exe 728 adobec.exe 2516 sysaopti.exe 2516 sysaopti.exe 728 adobec.exe 728 adobec.exe 2516 sysaopti.exe 2516 sysaopti.exe 728 adobec.exe 728 adobec.exe 2516 sysaopti.exe 2516 sysaopti.exe 728 adobec.exe 728 adobec.exe 2516 sysaopti.exe 2516 sysaopti.exe 728 adobec.exe 728 adobec.exe 2516 sysaopti.exe 2516 sysaopti.exe 728 adobec.exe 728 adobec.exe 2516 sysaopti.exe 2516 sysaopti.exe 728 adobec.exe 728 adobec.exe 2516 sysaopti.exe 2516 sysaopti.exe 728 adobec.exe 728 adobec.exe 2516 sysaopti.exe 2516 sysaopti.exe 728 adobec.exe 728 adobec.exe 2516 sysaopti.exe 2516 sysaopti.exe 728 adobec.exe 728 adobec.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1920 wrote to memory of 2516 1920 403613916f6088f2d9f8cac28c754ec0N.exe 90 PID 1920 wrote to memory of 2516 1920 403613916f6088f2d9f8cac28c754ec0N.exe 90 PID 1920 wrote to memory of 2516 1920 403613916f6088f2d9f8cac28c754ec0N.exe 90 PID 1920 wrote to memory of 728 1920 403613916f6088f2d9f8cac28c754ec0N.exe 93 PID 1920 wrote to memory of 728 1920 403613916f6088f2d9f8cac28c754ec0N.exe 93 PID 1920 wrote to memory of 728 1920 403613916f6088f2d9f8cac28c754ec0N.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\403613916f6088f2d9f8cac28c754ec0N.exe"C:\Users\Admin\AppData\Local\Temp\403613916f6088f2d9f8cac28c754ec0N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysaopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysaopti.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2516
-
-
C:\SysDrvG4\adobec.exeC:\SysDrvG4\adobec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5f93b2e86f724f4437fccd8a08890986d
SHA1cd8ccd9c1c5763908ad5a4d464c0947b238a0a17
SHA2560f6e6693f617cf2783b2df70f357c0589d463f1d045c0cbe8480aa5344ed1a36
SHA51249c35b01c8d36b2f6939a03b4a7d53a9a2c7e27c5c27050297bc318e0013034b044c85fb296f9518321e97ca71bb6d261d5e995565071179a3f62cd55b167b9c
-
Filesize
307KB
MD5102f7bac70123a2f9e364873c6f6d110
SHA1d5ba16dea2ba86959e249e431f52605bce42343d
SHA25633d5cbd219c0364619b6b06a1f36cb0208bde7d7b23375556541cc94b31bd930
SHA512a9a5ff416391fad5e49daef33e6fe169c94617f41bc3916201ec7979d3be5078abce8f11a8b2dfb80633ca12e790a952861621a6ddb491f2c76bf795089b3e39
-
Filesize
911KB
MD5906e58473a807d5cc2c8a85c786eaf0d
SHA144a0b2993bd664fdda7957fb1eed5c517525f7da
SHA256c4cf019dbbfd37ffb8529e9d65d6352a1526521e41c40a8522879a1620d535d9
SHA51225bc72b728424beacdb8dbcbd136349ccfba3330d2ad043310051598da8928952958c9a1d9c65775758490b162eb25c34ab53203a0a0941442c14e52bb09e00e
-
Filesize
2.6MB
MD53006d33b8a3d6759678e7b3be51e7869
SHA1f4a564d7f6232b553cd72d3251c9561c6e28e527
SHA2560781977a2647b2b8f48e226e8e990fdbfc2de15031ce1750f672434b5df6811b
SHA5128804fdd4487cb2021507b44ce08a82dbbaf948d775d5915dccd3cb90d37b6fd6f5399bf6d51443cd9f01562f0cb9b5f7e42158072f9aa318f1a84e1f543e1baf
-
Filesize
202B
MD58c97311643e3798fcefcc511abc2e2a4
SHA19d2b6c5354a8cc3b5798d12d910175c024123c37
SHA25635e0f10e7b3898f28dca51632602464f86126218b4c0f5d25c706f874348f01d
SHA512fc1e4d009ca8ac5658190eb786522fbdf29cfdcdf853862c8253d24247c1351988c3552ef3cf59ef52ae3c6013f8053b833616ddb000cc5a6ebdb5ea2058e510
-
Filesize
170B
MD56067aded0d4387242fd1937eff21cf95
SHA1065f5130acec396165aea28f1e8cfd21707daa02
SHA25646c699ec51360261fca81f269b7d8c9bbd18303feae9d56dc48c5a37f2be92e4
SHA512caab92e797c8603cd2ac0c1ae86458e98eef3ccb7a2a1b799e7815f6cd25530bd171f137c8f761104e564546a73129f7c56482296f5add0b45d4516a21b07cac
-
Filesize
2.6MB
MD5edc595d349d2724ceb1d74c3ae262104
SHA1d2fcefff879cc3efe07c7a9e4334ae90ec578a04
SHA25677f0a56b518b0408bffb3cc8a03bb0fcd4092e74bfa9d65df53d058f16391246
SHA51227732cebaef375c3a5837e74a9cf1502f30f24cd01c8511253825f12555123cff5ee45d4035553879fc84759c8aa535ae49611dd2619d95009813c8600a88295