Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
797f302eb010c6c8ff85f372edb92410N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
797f302eb010c6c8ff85f372edb92410N.exe
Resource
win10v2004-20240802-en
General
-
Target
797f302eb010c6c8ff85f372edb92410N.exe
-
Size
2.6MB
-
MD5
797f302eb010c6c8ff85f372edb92410
-
SHA1
70fb2fc504ae5565c78e15b6a74b768ed4fbbf7b
-
SHA256
07f6a383dfe6a31199df51038d2499dbd60c5d87c3b31d33d4ce2496dc7e9d22
-
SHA512
27559ff7e94fe88b10576db853421defce392c9545546a3d653da2da22c2c1e6529794e768878edc8f250c4ddc32e96b0c088e1e16b7a02de125d46be7706e18
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB0B/bS:sxX7QnxrloE5dpUpfb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxdob.exe 797f302eb010c6c8ff85f372edb92410N.exe -
Executes dropped EXE 2 IoCs
pid Process 3032 ecxdob.exe 4976 aoptiloc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Intelproc28\\aoptiloc.exe" 797f302eb010c6c8ff85f372edb92410N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBSP\\optiasys.exe" 797f302eb010c6c8ff85f372edb92410N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 797f302eb010c6c8ff85f372edb92410N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecxdob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aoptiloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3588 797f302eb010c6c8ff85f372edb92410N.exe 3588 797f302eb010c6c8ff85f372edb92410N.exe 3588 797f302eb010c6c8ff85f372edb92410N.exe 3588 797f302eb010c6c8ff85f372edb92410N.exe 3032 ecxdob.exe 3032 ecxdob.exe 4976 aoptiloc.exe 4976 aoptiloc.exe 3032 ecxdob.exe 3032 ecxdob.exe 4976 aoptiloc.exe 4976 aoptiloc.exe 3032 ecxdob.exe 3032 ecxdob.exe 4976 aoptiloc.exe 4976 aoptiloc.exe 3032 ecxdob.exe 3032 ecxdob.exe 4976 aoptiloc.exe 4976 aoptiloc.exe 3032 ecxdob.exe 3032 ecxdob.exe 4976 aoptiloc.exe 4976 aoptiloc.exe 3032 ecxdob.exe 3032 ecxdob.exe 4976 aoptiloc.exe 4976 aoptiloc.exe 3032 ecxdob.exe 3032 ecxdob.exe 4976 aoptiloc.exe 4976 aoptiloc.exe 3032 ecxdob.exe 3032 ecxdob.exe 4976 aoptiloc.exe 4976 aoptiloc.exe 3032 ecxdob.exe 3032 ecxdob.exe 4976 aoptiloc.exe 4976 aoptiloc.exe 3032 ecxdob.exe 3032 ecxdob.exe 4976 aoptiloc.exe 4976 aoptiloc.exe 3032 ecxdob.exe 3032 ecxdob.exe 4976 aoptiloc.exe 4976 aoptiloc.exe 3032 ecxdob.exe 3032 ecxdob.exe 4976 aoptiloc.exe 4976 aoptiloc.exe 3032 ecxdob.exe 3032 ecxdob.exe 4976 aoptiloc.exe 4976 aoptiloc.exe 3032 ecxdob.exe 3032 ecxdob.exe 4976 aoptiloc.exe 4976 aoptiloc.exe 3032 ecxdob.exe 3032 ecxdob.exe 4976 aoptiloc.exe 4976 aoptiloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3588 wrote to memory of 3032 3588 797f302eb010c6c8ff85f372edb92410N.exe 86 PID 3588 wrote to memory of 3032 3588 797f302eb010c6c8ff85f372edb92410N.exe 86 PID 3588 wrote to memory of 3032 3588 797f302eb010c6c8ff85f372edb92410N.exe 86 PID 3588 wrote to memory of 4976 3588 797f302eb010c6c8ff85f372edb92410N.exe 87 PID 3588 wrote to memory of 4976 3588 797f302eb010c6c8ff85f372edb92410N.exe 87 PID 3588 wrote to memory of 4976 3588 797f302eb010c6c8ff85f372edb92410N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\797f302eb010c6c8ff85f372edb92410N.exe"C:\Users\Admin\AppData\Local\Temp\797f302eb010c6c8ff85f372edb92410N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxdob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxdob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3032
-
-
C:\Intelproc28\aoptiloc.exeC:\Intelproc28\aoptiloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5ede40b36034d11420daf9b761d447622
SHA183e69cb72e12fd8ccd507bfa21133e1fca0fd5d7
SHA2566e27085c9b049479ed4b5d515c82d49091d1d0d6a70cc1af4fe1e085816236d4
SHA5120fc2330cfab1d7a2fa7e55f9cc177aa246de7f672540212721ca9232920652a2306906719e60af2bd37ca2fc9074d2244a5514fdc7f344e7c4006b4c69a75120
-
Filesize
2.6MB
MD5383056743f4aaf74cc1d1bee1e6b78cb
SHA1858c983f627e606681aea3111b313ff991a288b5
SHA25624b58e480f865033ffa379026f52eeb51d5a99cb00539bbe8cdc1ac3c565ef96
SHA512a2b25d1cedf7b59f067cc7d12227f973011f2f8251c4cff6e1309f6210225311b649013893d4d34ccd2d93b41c258f4bc0ae38f34153d1cff22218666e0af8ba
-
Filesize
2.6MB
MD558ea7145ff1320d9bee7fe878f3d9bc2
SHA18f5a2dc10edf89c870dbe061c8bcc860cb2d8a11
SHA256e5f6435a1f9c2cefc387a828610fbc640d5890d870e59383c63b8bce7bc246a0
SHA512f9d76903fd07df0bfb9e3b45d71bb3236eaf343310a647eb9c9b9c81713d313d28059c6172e54fbd30119d6c45d76dbed11bb7a4cf61a58296b2bd4a0da7bc29
-
Filesize
2.6MB
MD50386f18ad1d26dccd89eb5cc3e6467b8
SHA17ae70e48eaabccd0d5e0b172f23a6437d547f4fd
SHA2560e0fa690c1a137adc5d0ea8cd54b73d89269df1a1011f516bc653808cfc6eda7
SHA51274c8bc9c49834b2776fbec5d0e2d5db1bfe7dbdea3aaae9c511ffa869ac924f8a5c2b5cb9986392462cef75e6f30c3f8595de6ee07acb1e20da3318c63e393a1
-
Filesize
205B
MD5d1df6098c2d7687b169f5c55b284af40
SHA118dfb196cdc7708a157dfb5a5b0936a9d65cb97b
SHA256889d4127a75b649fc2618c2bcc0f7a8422c72e14349837e450b1a375199ed92a
SHA51276e77e9818dfcb20aaa3ba46a150b101047322bc5c758f326bc5797175ec728d83bd9ccab7d39f48bef366139214e2f799bf71c9f1fb84a32f6c0c94855db3a1
-
Filesize
173B
MD5b01932c912b90c11ebbd554f976d0900
SHA1921eb1e53ac7bd33829ff724c1cf903648340645
SHA25634dceae3d4f9791a3ee7db4ad5c03eab37a114bee626fd199b36c843e73db27a
SHA512f6c7496751d5ef23e6add107b89696583e6e113b71ecf24496a0f57a78136c6db0e65aa55c7cc79915ac371e0386642ad4e5fc875580368fc3d8f2ac7f43eac2
-
Filesize
2.6MB
MD53bc56de4863421fc97afba8a3102d35b
SHA123a476d825e9961c14556c96d32cb358916768f4
SHA256e667ce9985d4ab96525756ef04c928c187c2a259dac82dcd1be2ab1eb7a3d237
SHA512d72f8d5cd3ae58b294f848c95d9b07ae7064daf1c97ceff09dac170ca30ecc84151d4d1766764dc9fb7c1053e8a0af3f7ab1a675154280c28e74497d5f8884f4