Analysis
-
max time kernel
149s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:05
Static task
static1
Behavioral task
behavioral1
Sample
eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe
Resource
win10v2004-20240802-en
General
-
Target
eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe
-
Size
2.6MB
-
MD5
76d7cc0ad3e49a273abea16280736bea
-
SHA1
26cae96fc932042876b2c7c22fe98eb352c5e879
-
SHA256
eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da
-
SHA512
ac42dca0f1c866656c0111c681fb8d55505ddfa2a8918d24e1471b8bf210cae4200c6d593e8a19d21905bc5bb47595537557b7175432bb164c61dd63f66b4ab9
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBCB/bS:sxX7QnxrloE5dpUpVb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevdob.exe eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe -
Executes dropped EXE 2 IoCs
pid Process 5092 locdevdob.exe 2588 devoptiloc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Files6L\\devoptiloc.exe" eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Vid5W\\optialoc.exe" eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devoptiloc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locdevdob.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 220 eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe 220 eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe 220 eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe 220 eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe 5092 locdevdob.exe 5092 locdevdob.exe 2588 devoptiloc.exe 2588 devoptiloc.exe 5092 locdevdob.exe 5092 locdevdob.exe 2588 devoptiloc.exe 2588 devoptiloc.exe 5092 locdevdob.exe 5092 locdevdob.exe 2588 devoptiloc.exe 2588 devoptiloc.exe 5092 locdevdob.exe 5092 locdevdob.exe 2588 devoptiloc.exe 2588 devoptiloc.exe 5092 locdevdob.exe 5092 locdevdob.exe 2588 devoptiloc.exe 2588 devoptiloc.exe 5092 locdevdob.exe 5092 locdevdob.exe 2588 devoptiloc.exe 2588 devoptiloc.exe 5092 locdevdob.exe 5092 locdevdob.exe 2588 devoptiloc.exe 2588 devoptiloc.exe 5092 locdevdob.exe 5092 locdevdob.exe 2588 devoptiloc.exe 2588 devoptiloc.exe 5092 locdevdob.exe 5092 locdevdob.exe 2588 devoptiloc.exe 2588 devoptiloc.exe 5092 locdevdob.exe 5092 locdevdob.exe 2588 devoptiloc.exe 2588 devoptiloc.exe 5092 locdevdob.exe 5092 locdevdob.exe 2588 devoptiloc.exe 2588 devoptiloc.exe 5092 locdevdob.exe 5092 locdevdob.exe 2588 devoptiloc.exe 2588 devoptiloc.exe 5092 locdevdob.exe 5092 locdevdob.exe 2588 devoptiloc.exe 2588 devoptiloc.exe 5092 locdevdob.exe 5092 locdevdob.exe 2588 devoptiloc.exe 2588 devoptiloc.exe 5092 locdevdob.exe 5092 locdevdob.exe 2588 devoptiloc.exe 2588 devoptiloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 220 wrote to memory of 5092 220 eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe 82 PID 220 wrote to memory of 5092 220 eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe 82 PID 220 wrote to memory of 5092 220 eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe 82 PID 220 wrote to memory of 2588 220 eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe 85 PID 220 wrote to memory of 2588 220 eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe 85 PID 220 wrote to memory of 2588 220 eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe"C:\Users\Admin\AppData\Local\Temp\eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevdob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevdob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5092
-
-
C:\Files6L\devoptiloc.exeC:\Files6L\devoptiloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5cd86f260720ae6787c17cb0cfa4aa480
SHA1e5b1a7a061e450cb102872e4241ec0a45137478b
SHA256d51f7b33521c7ffa2faf9703f8874b51906206350d44a3e6f5021e2444554f58
SHA51235620aeea3a62d395cf772837b60f6bd00e183f68fb65dbc01f29a41f887e016ed1736252e1670ef65f9555491c5e33b9d6676b34bf78d09a9b4b65e7e114573
-
Filesize
205B
MD59b128777d7fce0720e405e09f1427ce4
SHA1e05a2f45b81180179a17d658d60b98cf1e048282
SHA256a265aa9dec119db74bcd22835d386f383202c730a406212efa6fa9a032a1d4b6
SHA51206db1e3de62429216a701a9db353cc1b00bfa972cd3121b9d64b3c668fe751f3a7939a9ff235283846e79d0201654f2847e83f09a573624123ec7052f5c94022
-
Filesize
173B
MD5f268a5547c1eddf86559af3ef5d799c6
SHA13914605e9745c89c4485812dc1663c1a11759dde
SHA2569a8703b727d78ca490d7e555aa76aa9ca75d9f0aec34dd7534cd856719a7761d
SHA512af7f79afabbe96a1dd032cdd93c7b32598e5d683228f9a5e458acc9d0778a25edc3f7e38e6de133bef18ab0a16df123454c3ace531fcf7e609241889f2b79c30
-
Filesize
2.6MB
MD5ea934d964ab3658c5fd99935421e86fb
SHA1399762e5566168bee8fa4f98763dec67dea39551
SHA256a40306605272eaa7ac3b63a8dc9a899b8e47a9e6e108c6c3c28d62d8c38cb878
SHA512a236541d14a6d69b5d5cffcfcd25ee8fac50e694d172bbe11aefa4b28fc64320db5ddabe27612ab2584949e7e16c647b22709c66b61f9d55a9802f00ead2c5bc
-
Filesize
2.6MB
MD5939c7cc014ed21652c2409de5230f9e1
SHA1fe1bc88648eb07ff9ff964353576d81a84ab36b3
SHA256fd4523c76c6eeec67fb7a6731476f0fb0c5eb10741ecfb678576390b65011c9a
SHA512e2865978d28cc82b21ee8f846b29c389a1dd0e1f098af1f07bb7cb76ad1068dd74f30dafba189d03e8db6c670a5848079b9b1bbfdb3ba60201f9453ba721a531
-
Filesize
282KB
MD5474e813e61c6aa0fadb5dcd242dc4743
SHA10d35606140fc0b84c6e24e54a605ae45cd096c42
SHA256f0ba49b3b32532b70c1a3ad65437c6ee09d0580c39cc279f1c51d3669a16b3b1
SHA512d97831249202dc33968e50defb6086459bae4ed7b3bbdc4d9a565f26cdf9bbaf65b55ec83fb075f15437cc05d869d4a52ae1123bfd38cc486813e75cf62ee931