Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 06:32

General

  • Target

    54b05e88cc75597fd654d985704cd000N.exe

  • Size

    2.6MB

  • MD5

    54b05e88cc75597fd654d985704cd000

  • SHA1

    f172825976bf82ed42983f85c5bfeade60b016e7

  • SHA256

    52b8e6802ae788cada3d4c7aba1f37177b75f7becdcc0749717c67992a2201cc

  • SHA512

    434c5c8b46a9cb2b81147125c6cf800350a26f64bc38285109504d12c38bd6f3fa9da72d2bd1bf5fa181538002e27476fd12fa450321f779e15cf68195683c2e

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBNB/bS:sxX7QnxrloE5dpUpmb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54b05e88cc75597fd654d985704cd000N.exe
    "C:\Users\Admin\AppData\Local\Temp\54b05e88cc75597fd654d985704cd000N.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2740
    • C:\SysDrv6L\adobloc.exe
      C:\SysDrv6L\adobloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\SysDrv6L\adobloc.exe

    Filesize

    2.6MB

    MD5

    bc8e08679c09e813e9d9ce605f0bb448

    SHA1

    0f5c3a50b6df8a15e5b6265fcbf11defdd295f66

    SHA256

    c81c7c2ca94f0ced20468db89ae86f69aca1801e939c1487c2583260cbda3446

    SHA512

    3751f208d0a4d8d32f5d735da361457f65f93cc14fba9ef6c0e634a4ccaf5cf8881f640a6dc26c3a0ebde4c368ebc48446139f71f25e64ac7728d5e04fbedea7

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    169B

    MD5

    839b9e6b336e0102a36b763ffff640a1

    SHA1

    d54164f8cafd306393ef29bd52975b500be99028

    SHA256

    8ddfd4ffeb755e20dae68718006592aa5b98edfc5da408786a0564cc323e1a00

    SHA512

    e5a6b077a73360691d445a4b0b8dfe216ba64a7bdb2baf9dd93833f095ba2dd4ef2b9a9463ce862aae30f4fc4f765ed330fa80faf1aecde015acb9c1c2110b53

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    201B

    MD5

    9ff12f242afb716eeed5a2e4e83fa10b

    SHA1

    da4fc5ebfa40dbc355ee349bad15d3e1bafe1650

    SHA256

    cae611f5439876e06fe803fa18ec59e99a432825a61f7fb5e33e6be0b890a847

    SHA512

    070570c4d7e24d78f2943782c9703ae605412c147be17411580d48b4b33d5aae46232b45bbb96151cc1a440c150093e67e83eab890352a5fc492f9e4c3155787

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe

    Filesize

    2.6MB

    MD5

    695e0a038ba2c653a2f7445a90d7dd0f

    SHA1

    2a63d2a5ca41065dfe62615ae74f40d425d346d0

    SHA256

    ff6a6d12c403b8a1bf2b345633a584830f9e02beb237ddd114a64ae0ad415d17

    SHA512

    ced1d0f5d85facb78a6def8b892d768760c980297a095cee53f4bfb94773050a36e87c519e9b1bc49cebc7cb994bd452ad8aaa7ef8c438dd6e69f59acd408497

  • C:\VidY3\optixloc.exe

    Filesize

    1.7MB

    MD5

    cdd97b53b5ff1c4c91ddadde33a72d19

    SHA1

    e874795b48a2225d7a2708576fd4d0606378c736

    SHA256

    438c7c7dea5c73e6703f67772e6ae3226277177616fe6469e4a85d7a37eb1fde

    SHA512

    e74bbb0f1a6c70a85e4a19f9210eb0a23ba0e66948a6e4ed7d84876eb2015b382eddbad1ef6992eb2581bd54de559a61e47b322cd032e848d367ac45a3f59cc0

  • C:\VidY3\optixloc.exe

    Filesize

    2.6MB

    MD5

    ce2c41500f290d73aae176846567ae66

    SHA1

    a9783b325c95b1735e6b5e25a7bd57576ce76e18

    SHA256

    c732c6d2c77ccbd27ae4c1c3c9fcba8a9604306afde24292d0468f26c223516e

    SHA512

    b6a4faffe2c8b1c8f55e3ec7b29f61c172d523195045474dab54b98dc18e2271e3ecb3d6b5abb077856a30d9b540667b6e62aa9a9225da410034e719f2b11e52