Analysis
-
max time kernel
119s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 12:42
Static task
static1
Behavioral task
behavioral1
Sample
01d493e7415a82b5a64160b87211f910N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
01d493e7415a82b5a64160b87211f910N.exe
Resource
win10v2004-20240802-en
General
-
Target
01d493e7415a82b5a64160b87211f910N.exe
-
Size
2.6MB
-
MD5
01d493e7415a82b5a64160b87211f910
-
SHA1
f78e6f1a77993fe37b4fa697c55052e1673e641c
-
SHA256
2f449deb736202e157a39a58813c88dcd28382db43e325391b5cad190fbd132b
-
SHA512
aabd323df5fe5afb83440d9cefa2240d901b7e15360e70d74f9c1996e5662f5054354a7a766932c931174317c47bbcde1ad65d84b5d16f599c332dd6918c4749
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBWB/bS:sxX7QnxrloE5dpUpNb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysabod.exe 01d493e7415a82b5a64160b87211f910N.exe -
Executes dropped EXE 2 IoCs
pid Process 2060 sysabod.exe 1572 xbodec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Adobe0J\\xbodec.exe" 01d493e7415a82b5a64160b87211f910N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Vid43\\boddevec.exe" 01d493e7415a82b5a64160b87211f910N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysabod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbodec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01d493e7415a82b5a64160b87211f910N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1812 01d493e7415a82b5a64160b87211f910N.exe 1812 01d493e7415a82b5a64160b87211f910N.exe 1812 01d493e7415a82b5a64160b87211f910N.exe 1812 01d493e7415a82b5a64160b87211f910N.exe 2060 sysabod.exe 2060 sysabod.exe 1572 xbodec.exe 1572 xbodec.exe 2060 sysabod.exe 2060 sysabod.exe 1572 xbodec.exe 1572 xbodec.exe 2060 sysabod.exe 2060 sysabod.exe 1572 xbodec.exe 1572 xbodec.exe 2060 sysabod.exe 2060 sysabod.exe 1572 xbodec.exe 1572 xbodec.exe 2060 sysabod.exe 2060 sysabod.exe 1572 xbodec.exe 1572 xbodec.exe 2060 sysabod.exe 2060 sysabod.exe 1572 xbodec.exe 1572 xbodec.exe 2060 sysabod.exe 2060 sysabod.exe 1572 xbodec.exe 1572 xbodec.exe 2060 sysabod.exe 2060 sysabod.exe 1572 xbodec.exe 1572 xbodec.exe 2060 sysabod.exe 2060 sysabod.exe 1572 xbodec.exe 1572 xbodec.exe 2060 sysabod.exe 2060 sysabod.exe 1572 xbodec.exe 1572 xbodec.exe 2060 sysabod.exe 2060 sysabod.exe 1572 xbodec.exe 1572 xbodec.exe 2060 sysabod.exe 2060 sysabod.exe 1572 xbodec.exe 1572 xbodec.exe 2060 sysabod.exe 2060 sysabod.exe 1572 xbodec.exe 1572 xbodec.exe 2060 sysabod.exe 2060 sysabod.exe 1572 xbodec.exe 1572 xbodec.exe 2060 sysabod.exe 2060 sysabod.exe 1572 xbodec.exe 1572 xbodec.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1812 wrote to memory of 2060 1812 01d493e7415a82b5a64160b87211f910N.exe 87 PID 1812 wrote to memory of 2060 1812 01d493e7415a82b5a64160b87211f910N.exe 87 PID 1812 wrote to memory of 2060 1812 01d493e7415a82b5a64160b87211f910N.exe 87 PID 1812 wrote to memory of 1572 1812 01d493e7415a82b5a64160b87211f910N.exe 90 PID 1812 wrote to memory of 1572 1812 01d493e7415a82b5a64160b87211f910N.exe 90 PID 1812 wrote to memory of 1572 1812 01d493e7415a82b5a64160b87211f910N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\01d493e7415a82b5a64160b87211f910N.exe"C:\Users\Admin\AppData\Local\Temp\01d493e7415a82b5a64160b87211f910N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysabod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysabod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2060
-
-
C:\Adobe0J\xbodec.exeC:\Adobe0J\xbodec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD51f764add70e0eebdc3d72a91f40b15a7
SHA1aa701a2a48b9ef93a344037b8411beea504bd84d
SHA256042227f2ae91aabd6db21e48fd2c9b30f669407d2f9ab09e729b88b265b0f055
SHA512f319a255a7516b4616a42e738b1152fb28083b71cf4898aa01888040ff3cd384e32f58202ed1faedf653f7dc31cfb02ae92b7caba42df157cd06580440ae138a
-
Filesize
199B
MD58bbf58415324f3cb5cefd8cecde25d76
SHA1a2b22cd663510c5b6747814a754b7e77a93bef4b
SHA256510668f4e5041eaaa12475e55b2bd3db6e7947a00e48f7867ce6f1039c1089f4
SHA51259d7a9d1bf52706cfb9e37ffcbaa7aa234d419164519c96ea4b6f581953bab23f5279cb01a0e829a68348fb10e5fa7e404a8814dcc7500d4779b3b5908597341
-
Filesize
167B
MD595fbe922b7a9f297d8ab55c6fcb4f0b0
SHA1446cd945ff2b75c54e6c2670780670792943bd44
SHA256cfd2ec48f9e4c97efbda4c5b27b3d07b9c082e8685a7e94c34935e5028b046aa
SHA51218a976466d1345a9a76993ccbc3b52e801e19b62f4bd41a13285698610e22c5a492b693641857191a2dd284155697f9056ba5dfe66f7f121881e90d59d0b2cfc
-
Filesize
2.6MB
MD518dec1a8a87f24d8b15c9e56431ce928
SHA1a39a789db92b8365ac5e2140961127532da7f21e
SHA256de25f1be7ba7886c6c83f216a81ae3b76a5196c9f986bb0fff2d83a65273962a
SHA512758a002280a01962a23a3b85dc1ba94b116fa3b3c727f95978700149b377caaa795cd54e6876b470420d7882983bfb48c3d2eab44387046ace67ee0778a0dfcc
-
Filesize
552KB
MD5478154ae5974174d13b0a7ff1033a164
SHA1b0544134f9a3f744f4e4043437703e155386006f
SHA2566d277a2f190c46fafad8dd611f707e67e75f6cf5184a1de8e2a2fe7a5d3a1958
SHA5129b32e7e58c6ac40b902ca33155990f72bafacfc18f4532884ef4ea524d60444a249c4659c8bfbf78f088dac65567ce4c32d1b2e81701be22c839310e4c752615
-
Filesize
2.6MB
MD5317b855281f7cf6b15593f319e998150
SHA1e753b28c01a98569de6b50dd45109582d9bc43e4
SHA25637119126978130e5b66fd8f55e1019102d7396a6602215a915734ef4809ad0d4
SHA512e8a15d9f85ff7b3e25eb8993d507fc10051ce9a8232e60ba1e3f6f3625d1346c63a30b3461f857a1eb7ad9470a7ea5673c63cec414f5ebee51ea5d2cd0dc6a2a