Analysis

  • max time kernel
    149s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 03:05

General

  • Target

    eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe

  • Size

    2.6MB

  • MD5

    76d7cc0ad3e49a273abea16280736bea

  • SHA1

    26cae96fc932042876b2c7c22fe98eb352c5e879

  • SHA256

    eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da

  • SHA512

    ac42dca0f1c866656c0111c681fb8d55505ddfa2a8918d24e1471b8bf210cae4200c6d593e8a19d21905bc5bb47595537557b7175432bb164c61dd63f66b4ab9

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBCB/bS:sxX7QnxrloE5dpUpVb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe
    "C:\Users\Admin\AppData\Local\Temp\eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:220
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevdob.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevdob.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:5092
    • C:\Files6L\devoptiloc.exe
      C:\Files6L\devoptiloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Files6L\devoptiloc.exe

    Filesize

    2.6MB

    MD5

    cd86f260720ae6787c17cb0cfa4aa480

    SHA1

    e5b1a7a061e450cb102872e4241ec0a45137478b

    SHA256

    d51f7b33521c7ffa2faf9703f8874b51906206350d44a3e6f5021e2444554f58

    SHA512

    35620aeea3a62d395cf772837b60f6bd00e183f68fb65dbc01f29a41f887e016ed1736252e1670ef65f9555491c5e33b9d6676b34bf78d09a9b4b65e7e114573

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    205B

    MD5

    9b128777d7fce0720e405e09f1427ce4

    SHA1

    e05a2f45b81180179a17d658d60b98cf1e048282

    SHA256

    a265aa9dec119db74bcd22835d386f383202c730a406212efa6fa9a032a1d4b6

    SHA512

    06db1e3de62429216a701a9db353cc1b00bfa972cd3121b9d64b3c668fe751f3a7939a9ff235283846e79d0201654f2847e83f09a573624123ec7052f5c94022

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    173B

    MD5

    f268a5547c1eddf86559af3ef5d799c6

    SHA1

    3914605e9745c89c4485812dc1663c1a11759dde

    SHA256

    9a8703b727d78ca490d7e555aa76aa9ca75d9f0aec34dd7534cd856719a7761d

    SHA512

    af7f79afabbe96a1dd032cdd93c7b32598e5d683228f9a5e458acc9d0778a25edc3f7e38e6de133bef18ab0a16df123454c3ace531fcf7e609241889f2b79c30

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevdob.exe

    Filesize

    2.6MB

    MD5

    ea934d964ab3658c5fd99935421e86fb

    SHA1

    399762e5566168bee8fa4f98763dec67dea39551

    SHA256

    a40306605272eaa7ac3b63a8dc9a899b8e47a9e6e108c6c3c28d62d8c38cb878

    SHA512

    a236541d14a6d69b5d5cffcfcd25ee8fac50e694d172bbe11aefa4b28fc64320db5ddabe27612ab2584949e7e16c647b22709c66b61f9d55a9802f00ead2c5bc

  • C:\Vid5W\optialoc.exe

    Filesize

    2.6MB

    MD5

    939c7cc014ed21652c2409de5230f9e1

    SHA1

    fe1bc88648eb07ff9ff964353576d81a84ab36b3

    SHA256

    fd4523c76c6eeec67fb7a6731476f0fb0c5eb10741ecfb678576390b65011c9a

    SHA512

    e2865978d28cc82b21ee8f846b29c389a1dd0e1f098af1f07bb7cb76ad1068dd74f30dafba189d03e8db6c670a5848079b9b1bbfdb3ba60201f9453ba721a531

  • C:\Vid5W\optialoc.exe

    Filesize

    282KB

    MD5

    474e813e61c6aa0fadb5dcd242dc4743

    SHA1

    0d35606140fc0b84c6e24e54a605ae45cd096c42

    SHA256

    f0ba49b3b32532b70c1a3ad65437c6ee09d0580c39cc279f1c51d3669a16b3b1

    SHA512

    d97831249202dc33968e50defb6086459bae4ed7b3bbdc4d9a565f26cdf9bbaf65b55ec83fb075f15437cc05d869d4a52ae1123bfd38cc486813e75cf62ee931