Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 06:32
Static task
static1
Behavioral task
behavioral1
Sample
54b05e88cc75597fd654d985704cd000N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
54b05e88cc75597fd654d985704cd000N.exe
Resource
win10v2004-20240802-en
General
-
Target
54b05e88cc75597fd654d985704cd000N.exe
-
Size
2.6MB
-
MD5
54b05e88cc75597fd654d985704cd000
-
SHA1
f172825976bf82ed42983f85c5bfeade60b016e7
-
SHA256
52b8e6802ae788cada3d4c7aba1f37177b75f7becdcc0749717c67992a2201cc
-
SHA512
434c5c8b46a9cb2b81147125c6cf800350a26f64bc38285109504d12c38bd6f3fa9da72d2bd1bf5fa181538002e27476fd12fa450321f779e15cf68195683c2e
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBNB/bS:sxX7QnxrloE5dpUpmb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe 54b05e88cc75597fd654d985704cd000N.exe -
Executes dropped EXE 2 IoCs
pid Process 2740 sysadob.exe 2012 adobloc.exe -
Loads dropped DLL 2 IoCs
pid Process 2440 54b05e88cc75597fd654d985704cd000N.exe 2440 54b05e88cc75597fd654d985704cd000N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrv6L\\adobloc.exe" 54b05e88cc75597fd654d985704cd000N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidY3\\optixloc.exe" 54b05e88cc75597fd654d985704cd000N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysadob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobloc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54b05e88cc75597fd654d985704cd000N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2440 54b05e88cc75597fd654d985704cd000N.exe 2440 54b05e88cc75597fd654d985704cd000N.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe 2740 sysadob.exe 2012 adobloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2740 2440 54b05e88cc75597fd654d985704cd000N.exe 30 PID 2440 wrote to memory of 2740 2440 54b05e88cc75597fd654d985704cd000N.exe 30 PID 2440 wrote to memory of 2740 2440 54b05e88cc75597fd654d985704cd000N.exe 30 PID 2440 wrote to memory of 2740 2440 54b05e88cc75597fd654d985704cd000N.exe 30 PID 2440 wrote to memory of 2012 2440 54b05e88cc75597fd654d985704cd000N.exe 31 PID 2440 wrote to memory of 2012 2440 54b05e88cc75597fd654d985704cd000N.exe 31 PID 2440 wrote to memory of 2012 2440 54b05e88cc75597fd654d985704cd000N.exe 31 PID 2440 wrote to memory of 2012 2440 54b05e88cc75597fd654d985704cd000N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\54b05e88cc75597fd654d985704cd000N.exe"C:\Users\Admin\AppData\Local\Temp\54b05e88cc75597fd654d985704cd000N.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2740
-
-
C:\SysDrv6L\adobloc.exeC:\SysDrv6L\adobloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5bc8e08679c09e813e9d9ce605f0bb448
SHA10f5c3a50b6df8a15e5b6265fcbf11defdd295f66
SHA256c81c7c2ca94f0ced20468db89ae86f69aca1801e939c1487c2583260cbda3446
SHA5123751f208d0a4d8d32f5d735da361457f65f93cc14fba9ef6c0e634a4ccaf5cf8881f640a6dc26c3a0ebde4c368ebc48446139f71f25e64ac7728d5e04fbedea7
-
Filesize
169B
MD5839b9e6b336e0102a36b763ffff640a1
SHA1d54164f8cafd306393ef29bd52975b500be99028
SHA2568ddfd4ffeb755e20dae68718006592aa5b98edfc5da408786a0564cc323e1a00
SHA512e5a6b077a73360691d445a4b0b8dfe216ba64a7bdb2baf9dd93833f095ba2dd4ef2b9a9463ce862aae30f4fc4f765ed330fa80faf1aecde015acb9c1c2110b53
-
Filesize
201B
MD59ff12f242afb716eeed5a2e4e83fa10b
SHA1da4fc5ebfa40dbc355ee349bad15d3e1bafe1650
SHA256cae611f5439876e06fe803fa18ec59e99a432825a61f7fb5e33e6be0b890a847
SHA512070570c4d7e24d78f2943782c9703ae605412c147be17411580d48b4b33d5aae46232b45bbb96151cc1a440c150093e67e83eab890352a5fc492f9e4c3155787
-
Filesize
2.6MB
MD5695e0a038ba2c653a2f7445a90d7dd0f
SHA12a63d2a5ca41065dfe62615ae74f40d425d346d0
SHA256ff6a6d12c403b8a1bf2b345633a584830f9e02beb237ddd114a64ae0ad415d17
SHA512ced1d0f5d85facb78a6def8b892d768760c980297a095cee53f4bfb94773050a36e87c519e9b1bc49cebc7cb994bd452ad8aaa7ef8c438dd6e69f59acd408497
-
Filesize
1.7MB
MD5cdd97b53b5ff1c4c91ddadde33a72d19
SHA1e874795b48a2225d7a2708576fd4d0606378c736
SHA256438c7c7dea5c73e6703f67772e6ae3226277177616fe6469e4a85d7a37eb1fde
SHA512e74bbb0f1a6c70a85e4a19f9210eb0a23ba0e66948a6e4ed7d84876eb2015b382eddbad1ef6992eb2581bd54de559a61e47b322cd032e848d367ac45a3f59cc0
-
Filesize
2.6MB
MD5ce2c41500f290d73aae176846567ae66
SHA1a9783b325c95b1735e6b5e25a7bd57576ce76e18
SHA256c732c6d2c77ccbd27ae4c1c3c9fcba8a9604306afde24292d0468f26c223516e
SHA512b6a4faffe2c8b1c8f55e3ec7b29f61c172d523195045474dab54b98dc18e2271e3ecb3d6b5abb077856a30d9b540667b6e62aa9a9225da410034e719f2b11e52