Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 22:38
Static task
static1
Behavioral task
behavioral1
Sample
659b25a0e73e7c8c2e3886eb24e689e12405e3de3fe00b16be209f1fda81943aN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
659b25a0e73e7c8c2e3886eb24e689e12405e3de3fe00b16be209f1fda81943aN.exe
Resource
win10v2004-20240802-en
General
-
Target
659b25a0e73e7c8c2e3886eb24e689e12405e3de3fe00b16be209f1fda81943aN.exe
-
Size
2.6MB
-
MD5
232a5eb4739f87db4c7772ccbfce5f60
-
SHA1
103e297af0cd5865b46218b291e6b124a0774267
-
SHA256
659b25a0e73e7c8c2e3886eb24e689e12405e3de3fe00b16be209f1fda81943a
-
SHA512
93cb04c682952bf0cc14a677cb1f737b809da7712a7714cf047305d135645690c7dba1d72237ea1049de6fe7f7520eac46be29c9110114682e7d261e5acd9015
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBiB/bS:sxX7QnxrloE5dpUppb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe 659b25a0e73e7c8c2e3886eb24e689e12405e3de3fe00b16be209f1fda81943aN.exe -
Executes dropped EXE 2 IoCs
pid Process 4072 locxopti.exe 656 devoptiec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeBH\\devoptiec.exe" 659b25a0e73e7c8c2e3886eb24e689e12405e3de3fe00b16be209f1fda81943aN.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZNA\\dobxsys.exe" 659b25a0e73e7c8c2e3886eb24e689e12405e3de3fe00b16be209f1fda81943aN.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devoptiec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 659b25a0e73e7c8c2e3886eb24e689e12405e3de3fe00b16be209f1fda81943aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locxopti.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1880 659b25a0e73e7c8c2e3886eb24e689e12405e3de3fe00b16be209f1fda81943aN.exe 1880 659b25a0e73e7c8c2e3886eb24e689e12405e3de3fe00b16be209f1fda81943aN.exe 1880 659b25a0e73e7c8c2e3886eb24e689e12405e3de3fe00b16be209f1fda81943aN.exe 1880 659b25a0e73e7c8c2e3886eb24e689e12405e3de3fe00b16be209f1fda81943aN.exe 4072 locxopti.exe 4072 locxopti.exe 656 devoptiec.exe 656 devoptiec.exe 4072 locxopti.exe 4072 locxopti.exe 656 devoptiec.exe 656 devoptiec.exe 4072 locxopti.exe 4072 locxopti.exe 656 devoptiec.exe 656 devoptiec.exe 4072 locxopti.exe 4072 locxopti.exe 656 devoptiec.exe 656 devoptiec.exe 4072 locxopti.exe 4072 locxopti.exe 656 devoptiec.exe 656 devoptiec.exe 4072 locxopti.exe 4072 locxopti.exe 656 devoptiec.exe 656 devoptiec.exe 4072 locxopti.exe 4072 locxopti.exe 656 devoptiec.exe 656 devoptiec.exe 4072 locxopti.exe 4072 locxopti.exe 656 devoptiec.exe 656 devoptiec.exe 4072 locxopti.exe 4072 locxopti.exe 656 devoptiec.exe 656 devoptiec.exe 4072 locxopti.exe 4072 locxopti.exe 656 devoptiec.exe 656 devoptiec.exe 4072 locxopti.exe 4072 locxopti.exe 656 devoptiec.exe 656 devoptiec.exe 4072 locxopti.exe 4072 locxopti.exe 656 devoptiec.exe 656 devoptiec.exe 4072 locxopti.exe 4072 locxopti.exe 656 devoptiec.exe 656 devoptiec.exe 4072 locxopti.exe 4072 locxopti.exe 656 devoptiec.exe 656 devoptiec.exe 4072 locxopti.exe 4072 locxopti.exe 656 devoptiec.exe 656 devoptiec.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1880 wrote to memory of 4072 1880 659b25a0e73e7c8c2e3886eb24e689e12405e3de3fe00b16be209f1fda81943aN.exe 82 PID 1880 wrote to memory of 4072 1880 659b25a0e73e7c8c2e3886eb24e689e12405e3de3fe00b16be209f1fda81943aN.exe 82 PID 1880 wrote to memory of 4072 1880 659b25a0e73e7c8c2e3886eb24e689e12405e3de3fe00b16be209f1fda81943aN.exe 82 PID 1880 wrote to memory of 656 1880 659b25a0e73e7c8c2e3886eb24e689e12405e3de3fe00b16be209f1fda81943aN.exe 85 PID 1880 wrote to memory of 656 1880 659b25a0e73e7c8c2e3886eb24e689e12405e3de3fe00b16be209f1fda81943aN.exe 85 PID 1880 wrote to memory of 656 1880 659b25a0e73e7c8c2e3886eb24e689e12405e3de3fe00b16be209f1fda81943aN.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\659b25a0e73e7c8c2e3886eb24e689e12405e3de3fe00b16be209f1fda81943aN.exe"C:\Users\Admin\AppData\Local\Temp\659b25a0e73e7c8c2e3886eb24e689e12405e3de3fe00b16be209f1fda81943aN.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4072
-
-
C:\AdobeBH\devoptiec.exeC:\AdobeBH\devoptiec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5aa826d499d7908fc7353bb355fb50c51
SHA121c437333fcbb8118f04e70e5253eb3fab5c8ca3
SHA25690caaa11f47ca210c5edc53cecf57d42f407a889403d674059574c3dacfa4036
SHA512fec859824537c8bda2141289981f01166154c5b25ee9f0ff4fb3cf9a755273fe40b08cc6a4df4791eb0827e84573fbf6140412bb4515ea5f40dc8adaa9059855
-
Filesize
764KB
MD50890ffda50359f03ab5f234822f5479a
SHA16c310156cb4f01347c20ac0f3e12beb02b366cb0
SHA256c357adb23e2b41ba4123fe53f795d1efce5f1ce39bff32a04c3ea30bcac63a76
SHA512767ac0733c1a97b63338c74376d51766e9c35f5c63d8b9410759c75769642a78c1cdc8fe4438b351d3fd6d0346a36f0ff671ff6c12afc4b2780c115e4bee8aa4
-
Filesize
365KB
MD56de02693eacf26d45ad20ce9df05207b
SHA13d3180d5adda26f35fbb5179dbcf657d957ee154
SHA256454c04ff400d0d84dc3344877d89850c9258960553c5db429dd884724ef6a246
SHA512ff51d22da8eddc157497b0a6f3831254eeb05abd85624849eb269e3249a731c661d2ab6f86e7d4b65dc2180efba6a1bd00896d171f5ae9f0a43c597e30cd0fc4
-
Filesize
203B
MD546def1d66eb28d58c71cc9d8a2b9c8d3
SHA1ea7a80fbe34a64ea9f3bd9c8924f0a1fd5a13731
SHA2565d8629a14ebd7b4319309d39edc4df6604d13f1fd933798da97d8ba3b70548a8
SHA512df5ca29ccc9850059edf6704a9139eee0b47654c9fbdc42ae779dc9a767b8c58f2d896a2989e2080aa3908bd4484ab6a54c8212c8b25d8907f81f77c6cf15633
-
Filesize
171B
MD5fc684036e64edad79117f5fade0c2231
SHA170e8efeea960a5de9e490b6a4fcfa035b734cf5b
SHA25696c579ad06a41715bd77591f96db251bcd0c37d0b54fcfbd949ba4e34ea3caa1
SHA512344e0cd73831fe5f64bd0c22c60847a59daa5db60265728e94c86778d6464a056656027059a560868ae2464cb7c81eca167c2085a10f35b258c523cb079bd540
-
Filesize
2.6MB
MD59f3d092c2b23f0ba506bf06cfa6c24c9
SHA15c50745e951e9910e31637444c002be1c7b99fd6
SHA25690081dc9174b6fc46c803b68da034e1f40fad809b5ca36da1e3da862c2719803
SHA5128b0a6c9ffeef2b00e1ad430901147163a9955fa20b555572e44e8b885b172ba3a489dcd982df113ce19ea38692641d25f3abd708073af1581851c6afc63bbb11