Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 21:02
Static task
static1
Behavioral task
behavioral1
Sample
b1440106da82fa1a98020be948cab990N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b1440106da82fa1a98020be948cab990N.exe
Resource
win10v2004-20240802-en
General
-
Target
b1440106da82fa1a98020be948cab990N.exe
-
Size
2.6MB
-
MD5
b1440106da82fa1a98020be948cab990
-
SHA1
862fd6505c7c365e2cd9285bcb50c3e08ee9d21f
-
SHA256
fdf3dd27233c683d1eb40fa1e78235a9d7a47ea0042181f690d57241332ea721
-
SHA512
20d48a5b0ac20f10b113cad79972677f3a1f4b8d844b55c0c458a48e3943f65094937275ad44fb3895df9f2b7bf6edf5236acf6fcc80316210ab90a396372c49
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBNB/bS:sxX7QnxrloE5dpUpub
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxbod.exe b1440106da82fa1a98020be948cab990N.exe -
Executes dropped EXE 2 IoCs
pid Process 3024 sysxbod.exe 2432 adobsys.exe -
Loads dropped DLL 2 IoCs
pid Process 2428 b1440106da82fa1a98020be948cab990N.exe 2428 b1440106da82fa1a98020be948cab990N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Intelproc2Y\\adobsys.exe" b1440106da82fa1a98020be948cab990N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVB7V\\bodasys.exe" b1440106da82fa1a98020be948cab990N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1440106da82fa1a98020be948cab990N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysxbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2428 b1440106da82fa1a98020be948cab990N.exe 2428 b1440106da82fa1a98020be948cab990N.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe 3024 sysxbod.exe 2432 adobsys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2428 wrote to memory of 3024 2428 b1440106da82fa1a98020be948cab990N.exe 30 PID 2428 wrote to memory of 3024 2428 b1440106da82fa1a98020be948cab990N.exe 30 PID 2428 wrote to memory of 3024 2428 b1440106da82fa1a98020be948cab990N.exe 30 PID 2428 wrote to memory of 3024 2428 b1440106da82fa1a98020be948cab990N.exe 30 PID 2428 wrote to memory of 2432 2428 b1440106da82fa1a98020be948cab990N.exe 31 PID 2428 wrote to memory of 2432 2428 b1440106da82fa1a98020be948cab990N.exe 31 PID 2428 wrote to memory of 2432 2428 b1440106da82fa1a98020be948cab990N.exe 31 PID 2428 wrote to memory of 2432 2428 b1440106da82fa1a98020be948cab990N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1440106da82fa1a98020be948cab990N.exe"C:\Users\Admin\AppData\Local\Temp\b1440106da82fa1a98020be948cab990N.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxbod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3024
-
-
C:\Intelproc2Y\adobsys.exeC:\Intelproc2Y\adobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD50f7dff2644226790bb3de7175ed557c5
SHA13331239e42ca41e49907a0c922507225953b924f
SHA2568fa3b2d9db81458b3254ce0106e98c99bc45f0e2ff19df5a7c3209fa681a8642
SHA512b2395e8e77b86ccd1e0f109e1bef7440f1c5d21fc5a29fd75c9c81868b43d41b963eb06a55a11d512b38d404bc2ea270c4b3009daa7610125091bae008b6caa7
-
Filesize
2.6MB
MD51e6adafe5f995d91b26ba9142de89560
SHA1e8d620a0d84652663e71dc79286b150677014e42
SHA2569758a29ef15c841a168b22217b648c79a63ea3fa670f04a8a308bd37b7a175aa
SHA5129e2edad756faa7957ad4f7db907d1ef6ccaffad394816e678df931dc93bde1ec37b5c90af143a4cecdec5c3a34413a21ef6dae05cc8526711550bd833dad8d57
-
Filesize
2.6MB
MD57b8c0560d79511d2d3b7a8d6ec337dc9
SHA1cdb8f681840f44c85e13058c62c5dbe7351892ec
SHA256c096f2d31cb2ec611746f9767a6a0fbd3c0fcf5425077e02cd3c653f5419538d
SHA512da0f7cc1092c482b275f51709b10b7c6c2e83343bc665b332d793d7977bd2a1ba9a78c6c7c626547533bd52ba03287155239da4768d210c3295f37ad0cb74d7d
-
Filesize
172B
MD5e004ed3fba0a97eeec58449d65991f23
SHA14226e8f789cdb8b59a0b9c0b9860f58b0ee034c7
SHA256eab32e48110becce1fe49a8203460b0a0ace14234a9338affa37c25bf3a74570
SHA512afd799ba9e5f188c4f241053caeaff949a8e94fc42fc8b4becb71b13b4728fde6b69052607f8f8ef10b9c2c3b6a823319fa902e474f9f052fbc6b5c3f5f3d656
-
Filesize
204B
MD54c4f9e4453297191c0089d70fb977aa0
SHA12e0213ffa1e76bc7eb6155deae22ccf094e90691
SHA25686408a6e7ffa37ad5f43b314b820d483ef1d99745cb7775b1979032ffb03da45
SHA5121f97cd51d464fa6d647521d80c9e95e492cd8bbf8614287a98c32de5d527c9cda803ff48c32cede01c3f3a90616fb7648a41b58a1d716cd14addd85e5132f734
-
Filesize
2.6MB
MD54397862a7f3dbe169cff6678ba3678de
SHA1e567049287515a4e3e83c7831d47f1f20cfffd90
SHA256b0c0aeb045cb7199f6d1a19d521f8824002a2dac75e3806d5edcaf272fc0df9f
SHA51268f32735af189e7343d899477f9ea82e70b9c676f0f4f5fe7c8bc91301c69832e05e30cec598956089f87684fe15a004322399d48dc740270d32d021f429bbf5