Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 00:38

General

  • Target

    4001c7cf1041f04b6245074610200c9dc04aac5d64ed0d4668004ba764440dc5N.exe

  • Size

    2.6MB

  • MD5

    565e34885fa9dfad462ed1c951c216e0

  • SHA1

    7796cbcc6b7b211c78b59e1e154efbcae764ba88

  • SHA256

    4001c7cf1041f04b6245074610200c9dc04aac5d64ed0d4668004ba764440dc5

  • SHA512

    a4ac1d77724aa025bd9f2ad155b30abcac9baab03250c0e3c471250a70e64f8cc5711a4f78257b20683ccb7f8a5446809c0fb6c396283ede98540b070c5d1007

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBQB/bS:sxX7QnxrloE5dpUpjb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4001c7cf1041f04b6245074610200c9dc04aac5d64ed0d4668004ba764440dc5N.exe
    "C:\Users\Admin\AppData\Local\Temp\4001c7cf1041f04b6245074610200c9dc04aac5d64ed0d4668004ba764440dc5N.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2800
    • C:\AdobeRC\xdobloc.exe
      C:\AdobeRC\xdobloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2680

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\AdobeRC\xdobloc.exe

          Filesize

          2.6MB

          MD5

          bb206d53bd89091f32806251f7eef8a1

          SHA1

          a78d702588ecd7bb84ec9be6161e8f6a619ad27c

          SHA256

          6fe8b3bfc651eb9bfa05b6ad6d1f4995aaee6e2d71f3b696365d2547b27e0625

          SHA512

          0a98208c9bd98cb03b0e87e5045f48074754d136b4721bc7b95c07541547548c9a66746b9281bd868a89954579291dd1f5abda7b8f888113d629a351881e8432

        • C:\MintOY\optixec.exe

          Filesize

          2.6MB

          MD5

          6210e64f693c7894c96f0d38bda3676c

          SHA1

          a04aa9c0a28277cd1e811aafdd194df5a1699e30

          SHA256

          115c3d3a244279549e6981fe5fa74ceb59b87264c577eee665e479eba41afa16

          SHA512

          403ad7ae2e9068a1ab2c54fbc3a583c067fcb3ed570cae3db68c44098534546a1b8cf2eaf65685e0417669cc02b870fa2ff8107444f3a6c99a70ba1962bd5afb

        • C:\Users\Admin\253086396416_6.1_Admin.ini

          Filesize

          168B

          MD5

          2a35cf42cc72366bd9074b545a65de20

          SHA1

          c075b21d02b5d6d0185e433ffc5b30ab2d24464e

          SHA256

          e44085021fb7230c3ca657ccf612226d798c2126a1c9fe7c23885c6844ccf097

          SHA512

          6c8c0fc54cd443efda7e78b6bf13fb1864de54bad414bd5f42f585bccc2d712ab76f1992968cecf6b9d7f6f02b57e19fa913593ce96e7f69411a69f6bbda5c90

        • C:\Users\Admin\253086396416_6.1_Admin.ini

          Filesize

          200B

          MD5

          61f3cf47efb10db2fd22998b1bbd764b

          SHA1

          ad0ba1d5084dd2fee7aa0661366ae06de4cdccdc

          SHA256

          46e986642f91def9ab53248bad0a4e05877b67495e7e223d32cf2ec05b45e0d9

          SHA512

          15f620a6f3cb0b8c8cbaf5fee87b45da57e33022502c2095d6120df5f0805ea49609b2b2fe66b57c50fc409af5c0ef28fd41e8ffc3b71ea497df8175e526b925

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe

          Filesize

          2.6MB

          MD5

          9910fb885602a974a0dcc38bf53d3fe5

          SHA1

          227d4dd85b55f3bb822bfa7e0c79f316957f2bc5

          SHA256

          b4b93d09c1e4a7141877291b7c160b026d54ebc3010375d14085ce6c92932895

          SHA512

          beffcfe42852b596c5c778acf24e03c2b531a9442be822fe55beb228d3881dca28195a14a13f44a75985ba736ed2756cbd84d3bff5cabfa53d6f43d394f8cd61