Analysis
-
max time kernel
120s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 01:45
Static task
static1
Behavioral task
behavioral1
Sample
855dcca669144d13c8b07ea5bbfd6760N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
855dcca669144d13c8b07ea5bbfd6760N.exe
Resource
win10v2004-20240802-en
General
-
Target
855dcca669144d13c8b07ea5bbfd6760N.exe
-
Size
2.6MB
-
MD5
855dcca669144d13c8b07ea5bbfd6760
-
SHA1
0d0350a79c13baacdf1bbf05ffdf0573692a45fc
-
SHA256
cb709e197edd5aaaeb940f757f8bb7e23a0b1e11d5e34561200b38635b0bddea
-
SHA512
81053959908c5d6b20f21cbd2063c9017cc4b4af1a8065b9a150bf87f4a8d4e0e010321621dc6ac09863f1f38778c6fcb30be32432a6403982661a54fef7036f
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB2B/bS:sxX7QnxrloE5dpUpdb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxdob.exe 855dcca669144d13c8b07ea5bbfd6760N.exe -
Executes dropped EXE 2 IoCs
pid Process 3952 locxdob.exe 3964 aoptisys.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrv2O\\aoptisys.exe" 855dcca669144d13c8b07ea5bbfd6760N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBRM\\bodxec.exe" 855dcca669144d13c8b07ea5bbfd6760N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 855dcca669144d13c8b07ea5bbfd6760N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locxdob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aoptisys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 468 855dcca669144d13c8b07ea5bbfd6760N.exe 468 855dcca669144d13c8b07ea5bbfd6760N.exe 468 855dcca669144d13c8b07ea5bbfd6760N.exe 468 855dcca669144d13c8b07ea5bbfd6760N.exe 3952 locxdob.exe 3952 locxdob.exe 3964 aoptisys.exe 3964 aoptisys.exe 3952 locxdob.exe 3952 locxdob.exe 3964 aoptisys.exe 3964 aoptisys.exe 3952 locxdob.exe 3952 locxdob.exe 3964 aoptisys.exe 3964 aoptisys.exe 3952 locxdob.exe 3952 locxdob.exe 3964 aoptisys.exe 3964 aoptisys.exe 3952 locxdob.exe 3952 locxdob.exe 3964 aoptisys.exe 3964 aoptisys.exe 3952 locxdob.exe 3952 locxdob.exe 3964 aoptisys.exe 3964 aoptisys.exe 3952 locxdob.exe 3952 locxdob.exe 3964 aoptisys.exe 3964 aoptisys.exe 3952 locxdob.exe 3952 locxdob.exe 3964 aoptisys.exe 3964 aoptisys.exe 3952 locxdob.exe 3952 locxdob.exe 3964 aoptisys.exe 3964 aoptisys.exe 3952 locxdob.exe 3952 locxdob.exe 3964 aoptisys.exe 3964 aoptisys.exe 3952 locxdob.exe 3952 locxdob.exe 3964 aoptisys.exe 3964 aoptisys.exe 3952 locxdob.exe 3952 locxdob.exe 3964 aoptisys.exe 3964 aoptisys.exe 3952 locxdob.exe 3952 locxdob.exe 3964 aoptisys.exe 3964 aoptisys.exe 3952 locxdob.exe 3952 locxdob.exe 3964 aoptisys.exe 3964 aoptisys.exe 3952 locxdob.exe 3952 locxdob.exe 3964 aoptisys.exe 3964 aoptisys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 468 wrote to memory of 3952 468 855dcca669144d13c8b07ea5bbfd6760N.exe 87 PID 468 wrote to memory of 3952 468 855dcca669144d13c8b07ea5bbfd6760N.exe 87 PID 468 wrote to memory of 3952 468 855dcca669144d13c8b07ea5bbfd6760N.exe 87 PID 468 wrote to memory of 3964 468 855dcca669144d13c8b07ea5bbfd6760N.exe 88 PID 468 wrote to memory of 3964 468 855dcca669144d13c8b07ea5bbfd6760N.exe 88 PID 468 wrote to memory of 3964 468 855dcca669144d13c8b07ea5bbfd6760N.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\855dcca669144d13c8b07ea5bbfd6760N.exe"C:\Users\Admin\AppData\Local\Temp\855dcca669144d13c8b07ea5bbfd6760N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxdob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxdob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3952
-
-
C:\SysDrv2O\aoptisys.exeC:\SysDrv2O\aoptisys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD532c9a54f6cc136adaa9363520c48a37c
SHA1127999d2e068fad6e116e0c5a21bacc459896a26
SHA25679402dbb82d222e2630ac6d4ce698514f91ffe5b9419aaa39bca1e3ba96e422d
SHA5122a32ff3ca1234653df85ced320bf25e4b08a54e8a54f4bb4709ee37249adf6efbe33e87cfd5420a8b24b8e84d0a352aafe85bc054c92af0c649f10b6feac11f7
-
Filesize
274KB
MD585bde8842929d9d08104dfaac8613b04
SHA1d1fec767370dada1f134da468e41f21a3a381a21
SHA25685fade4eaa6069142a705fff2ce3fdc90c8c1c7f450635f59f36173ea9edd8f6
SHA512ca686cf2f69c3203d6f470e23f3f2ae978f39006138c7dcf81542d33be9428ab4fc9a6e4f1820693d1223d66e0faf28513de3af0ca2ac5669e6b732b2783948c
-
Filesize
659KB
MD56682995824bfafde8dfaa45cad4f033e
SHA1a9c640db0755066ee75a10fd083e5778b71e80b4
SHA2565941ae09aa67f8b0f9dd034e0776943adc3336dee60fedd5decfc4708453661a
SHA512d861b318029439321455bfa636c8b6479a4f6be6f28c0129487473bb53d3416b853330ccf27d34841ae08ce245cb500def9cc1bc60079426875dcf8e90f41aa3
-
Filesize
2.6MB
MD5b55870d85ad47de8af42b378a7140f05
SHA1dc149f1b40984db997de6a4d4d155ad3be5584de
SHA25620b5a53f4c7bdcf88948dc34ebdc03a10424319e26a370d036a53687af3c5a83
SHA51286d1fe316dcb4d4703625ac304467e2da80c500ff25ab33ecdfecba5d12662bc44e9f573ed1bc9724b853feeb96b8131da4f01dd8f2272a9487b3157e52b5bb8
-
Filesize
201B
MD578a3aa6262fe90e5e952e7516c3c87d6
SHA14def5564aeb7fdec273e97491c032287cabdd444
SHA2569fb3d8dbc6383339f1210563931f4ddf820c5ab5dab925b010273312abc775c3
SHA512ddd35a15607a0c8b98e5564776ea040f6871d1ee00ae6b31e63c1e8cc8241c2e34643ee0e766a9be59e4f799164fe65c027fca1e0060077dbd2dccd00861bca6
-
Filesize
169B
MD52744860926c137d5a3a8d68e53145df8
SHA1ccbf8fa8d302f35c2e15a77398699744b2adc491
SHA256956e63603ce8031023f03ce90fb32302f8a879cacb60ba958a46a2e4effb9b55
SHA51259bff87d6b8454d136a599e292911ab2056b739abd44a64764ad810c6c31a93211ba8c9bbad0e1e2e65bbbed08c55f315e5b2756beda0be37ca222ea47a3fd9c
-
Filesize
2.6MB
MD5d530016a1633f90a622bcf5706302587
SHA10776378eea03990b72e7af73e24eaec82a19e0e4
SHA25650b3eb32d90aaa5c6b8e03cc19f7ea4e460a71660d00ef7ee177c508365742a1
SHA5121dee0e83cb3d4ddaa75d9cbb0b9ef80d2cfe6320b5922dba19ee6147905e9ebe3f0db92d01ced74db89a8054312557126e471cd06c997e3842bb16f9d2fab1e6