Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 02:41
Static task
static1
Behavioral task
behavioral1
Sample
06835cff0c4a008d639c5d2747284940N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
06835cff0c4a008d639c5d2747284940N.exe
Resource
win10v2004-20240802-en
General
-
Target
06835cff0c4a008d639c5d2747284940N.exe
-
Size
2.6MB
-
MD5
06835cff0c4a008d639c5d2747284940
-
SHA1
06979f10baa4ac7e38e651c5b2faa3347f19afef
-
SHA256
67e3fb3193427369cf6cfdc2084a95ffde2ec3b8d739fe5a1f8d45bde8ce377d
-
SHA512
36ecef71efbded860ce8229a479579a3e86b060d4669fe62a11a3f6281eb191d66b0efaa6906c3b57f9a1a0417d57dc294eccbfe9570509cf21c841f3502ba9c
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBlB/bS:sxX7QnxrloE5dpUpyb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe 06835cff0c4a008d639c5d2747284940N.exe -
Executes dropped EXE 2 IoCs
pid Process 3924 locxopti.exe 2064 aoptiec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeK4\\aoptiec.exe" 06835cff0c4a008d639c5d2747284940N.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintFR\\boddevloc.exe" 06835cff0c4a008d639c5d2747284940N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06835cff0c4a008d639c5d2747284940N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locxopti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aoptiec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3428 06835cff0c4a008d639c5d2747284940N.exe 3428 06835cff0c4a008d639c5d2747284940N.exe 3428 06835cff0c4a008d639c5d2747284940N.exe 3428 06835cff0c4a008d639c5d2747284940N.exe 3924 locxopti.exe 3924 locxopti.exe 2064 aoptiec.exe 2064 aoptiec.exe 3924 locxopti.exe 3924 locxopti.exe 2064 aoptiec.exe 2064 aoptiec.exe 3924 locxopti.exe 3924 locxopti.exe 2064 aoptiec.exe 2064 aoptiec.exe 3924 locxopti.exe 3924 locxopti.exe 2064 aoptiec.exe 2064 aoptiec.exe 3924 locxopti.exe 3924 locxopti.exe 2064 aoptiec.exe 2064 aoptiec.exe 3924 locxopti.exe 3924 locxopti.exe 2064 aoptiec.exe 2064 aoptiec.exe 3924 locxopti.exe 3924 locxopti.exe 2064 aoptiec.exe 2064 aoptiec.exe 3924 locxopti.exe 3924 locxopti.exe 2064 aoptiec.exe 2064 aoptiec.exe 3924 locxopti.exe 3924 locxopti.exe 2064 aoptiec.exe 2064 aoptiec.exe 3924 locxopti.exe 3924 locxopti.exe 2064 aoptiec.exe 2064 aoptiec.exe 3924 locxopti.exe 3924 locxopti.exe 2064 aoptiec.exe 2064 aoptiec.exe 3924 locxopti.exe 3924 locxopti.exe 2064 aoptiec.exe 2064 aoptiec.exe 3924 locxopti.exe 3924 locxopti.exe 2064 aoptiec.exe 2064 aoptiec.exe 3924 locxopti.exe 3924 locxopti.exe 2064 aoptiec.exe 2064 aoptiec.exe 3924 locxopti.exe 3924 locxopti.exe 2064 aoptiec.exe 2064 aoptiec.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3428 wrote to memory of 3924 3428 06835cff0c4a008d639c5d2747284940N.exe 88 PID 3428 wrote to memory of 3924 3428 06835cff0c4a008d639c5d2747284940N.exe 88 PID 3428 wrote to memory of 3924 3428 06835cff0c4a008d639c5d2747284940N.exe 88 PID 3428 wrote to memory of 2064 3428 06835cff0c4a008d639c5d2747284940N.exe 89 PID 3428 wrote to memory of 2064 3428 06835cff0c4a008d639c5d2747284940N.exe 89 PID 3428 wrote to memory of 2064 3428 06835cff0c4a008d639c5d2747284940N.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\06835cff0c4a008d639c5d2747284940N.exe"C:\Users\Admin\AppData\Local\Temp\06835cff0c4a008d639c5d2747284940N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3924
-
-
C:\AdobeK4\aoptiec.exeC:\AdobeK4\aoptiec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5f61e92cabba8204f003cde773906c98e
SHA182bd82cce63dadf535c637ad1c13163ec6e18934
SHA2569e7fd8ef4898f25caf7993dd91e45f0ea2f6ffc0fab10b41474c2c8ada9f2cb8
SHA5122502dbcf02d00a450d292304522a7cfe502ca2014e3d144fa8d0630d371654f9ff19e70bf5064c1938f6edb0da5d8dc3ebe17cf935dcf7a75f67f45dc2d1d522
-
Filesize
2.6MB
MD59b03ab87524ff239299b46b642e54dbf
SHA12b045055968884d9ce9f6ea8d014ea115b16d5cf
SHA256c044e9f52cbc789019399f14220c17d6962b8bca72df8706ed14b2e4ad772f55
SHA512237a0fbbd9795379f72d7309ba7dd7fe44c92065bc6ecf5c4ab8020611f5cb42a61ceb8328016a9b4e58847a006e7ea8d91b5477847873889ededa75e3c28ff8
-
Filesize
2.6MB
MD565bdedc2f270fa0542f341a8661a5215
SHA12b74d24e3776ac5e9045454e33d1d3424da6eb49
SHA256da9d094ee3b77b055129d811e4ef44247aea075e950242db91d1864a219a9b55
SHA512eb188a0a2783bc395d1e657f70b6c18286f4faff917aa0c83af270bd1602bb17d34a4862f5ebc353273e302a2903252feeab34a9754e5a8b58a5131d8762d4a0
-
Filesize
203B
MD5a846371aa6e633f259f09df0ba7016f3
SHA1712d4dbec5c3de0e2e073458c1d4fd7a4b78714d
SHA25613e88cb686431fde9d59adc4384a02092cbead45347287ccbe8816a89e03f92d
SHA5120b0c621c54c77a4c10df22f2cd46d9a131181138f56547c98a4b512741d429a06c6d146fe9bb98b08f0a99560cc52a38bca8987f6082f1847171c57b8f2bd1b1
-
Filesize
171B
MD50970ab8a23ddc3e6fd06f06057c6dfa9
SHA18888b15c97cd1a8f1feb2e500fce643626e5e999
SHA2567e4d67a586baf87bbd9c9b28bbc33b66089d352e74dd10815ce5ae93f387ce58
SHA5122c3904961f7f53cf5880d488ed3935810ed1bb2787d52cca00e5173fea3bcd365e391dbdfcf59da83e14e05eef818ec0f0752ed598b2278470994a22161f587d
-
Filesize
2.6MB
MD544c7c10d4fce282af2f3e836796ed60e
SHA1ace8c5a27671f5717d57a0298254050218af4abc
SHA2560cde8693ac68393181f364144d4b06aa16fbe60377baadbeec50b1a7dee026d3
SHA5120a191d9583d496ee0e3c688fc17918e74b860b4f6388d6353ec6d35fdbb2f33d264abaf592a9b89fffe4816df7020d353a037d85b674b0d38c87a780c14a4268