Analysis

  • max time kernel
    119s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2024, 22:38

General

  • Target

    659b25a0e73e7c8c2e3886eb24e689e12405e3de3fe00b16be209f1fda81943aN.exe

  • Size

    2.6MB

  • MD5

    232a5eb4739f87db4c7772ccbfce5f60

  • SHA1

    103e297af0cd5865b46218b291e6b124a0774267

  • SHA256

    659b25a0e73e7c8c2e3886eb24e689e12405e3de3fe00b16be209f1fda81943a

  • SHA512

    93cb04c682952bf0cc14a677cb1f737b809da7712a7714cf047305d135645690c7dba1d72237ea1049de6fe7f7520eac46be29c9110114682e7d261e5acd9015

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBiB/bS:sxX7QnxrloE5dpUppb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\659b25a0e73e7c8c2e3886eb24e689e12405e3de3fe00b16be209f1fda81943aN.exe
    "C:\Users\Admin\AppData\Local\Temp\659b25a0e73e7c8c2e3886eb24e689e12405e3de3fe00b16be209f1fda81943aN.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1880
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4072
    • C:\AdobeBH\devoptiec.exe
      C:\AdobeBH\devoptiec.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\AdobeBH\devoptiec.exe

    Filesize

    2.6MB

    MD5

    aa826d499d7908fc7353bb355fb50c51

    SHA1

    21c437333fcbb8118f04e70e5253eb3fab5c8ca3

    SHA256

    90caaa11f47ca210c5edc53cecf57d42f407a889403d674059574c3dacfa4036

    SHA512

    fec859824537c8bda2141289981f01166154c5b25ee9f0ff4fb3cf9a755273fe40b08cc6a4df4791eb0827e84573fbf6140412bb4515ea5f40dc8adaa9059855

  • C:\LabZNA\dobxsys.exe

    Filesize

    764KB

    MD5

    0890ffda50359f03ab5f234822f5479a

    SHA1

    6c310156cb4f01347c20ac0f3e12beb02b366cb0

    SHA256

    c357adb23e2b41ba4123fe53f795d1efce5f1ce39bff32a04c3ea30bcac63a76

    SHA512

    767ac0733c1a97b63338c74376d51766e9c35f5c63d8b9410759c75769642a78c1cdc8fe4438b351d3fd6d0346a36f0ff671ff6c12afc4b2780c115e4bee8aa4

  • C:\LabZNA\dobxsys.exe

    Filesize

    365KB

    MD5

    6de02693eacf26d45ad20ce9df05207b

    SHA1

    3d3180d5adda26f35fbb5179dbcf657d957ee154

    SHA256

    454c04ff400d0d84dc3344877d89850c9258960553c5db429dd884724ef6a246

    SHA512

    ff51d22da8eddc157497b0a6f3831254eeb05abd85624849eb269e3249a731c661d2ab6f86e7d4b65dc2180efba6a1bd00896d171f5ae9f0a43c597e30cd0fc4

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    203B

    MD5

    46def1d66eb28d58c71cc9d8a2b9c8d3

    SHA1

    ea7a80fbe34a64ea9f3bd9c8924f0a1fd5a13731

    SHA256

    5d8629a14ebd7b4319309d39edc4df6604d13f1fd933798da97d8ba3b70548a8

    SHA512

    df5ca29ccc9850059edf6704a9139eee0b47654c9fbdc42ae779dc9a767b8c58f2d896a2989e2080aa3908bd4484ab6a54c8212c8b25d8907f81f77c6cf15633

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    171B

    MD5

    fc684036e64edad79117f5fade0c2231

    SHA1

    70e8efeea960a5de9e490b6a4fcfa035b734cf5b

    SHA256

    96c579ad06a41715bd77591f96db251bcd0c37d0b54fcfbd949ba4e34ea3caa1

    SHA512

    344e0cd73831fe5f64bd0c22c60847a59daa5db60265728e94c86778d6464a056656027059a560868ae2464cb7c81eca167c2085a10f35b258c523cb079bd540

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe

    Filesize

    2.6MB

    MD5

    9f3d092c2b23f0ba506bf06cfa6c24c9

    SHA1

    5c50745e951e9910e31637444c002be1c7b99fd6

    SHA256

    90081dc9174b6fc46c803b68da034e1f40fad809b5ca36da1e3da862c2719803

    SHA512

    8b0a6c9ffeef2b00e1ad430901147163a9955fa20b555572e44e8b885b172ba3a489dcd982df113ce19ea38692641d25f3abd708073af1581851c6afc63bbb11