Analysis
-
max time kernel
149s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 15:17
Static task
static1
Behavioral task
behavioral1
Sample
053ac109faa22e64154ca3997308485a6cd8ef78160d332219bfd16cac422e10N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
053ac109faa22e64154ca3997308485a6cd8ef78160d332219bfd16cac422e10N.exe
Resource
win10v2004-20240802-en
General
-
Target
053ac109faa22e64154ca3997308485a6cd8ef78160d332219bfd16cac422e10N.exe
-
Size
2.6MB
-
MD5
2026a56badeb1ecdfc97416d4e265970
-
SHA1
05c80964fe8fa47592294f361f32e3a3edbaf8cb
-
SHA256
053ac109faa22e64154ca3997308485a6cd8ef78160d332219bfd16cac422e10
-
SHA512
8625165641fcd3b267deaf218275cb5bbc436a089feabb068cf72fb1dae7fb7be8ad12f208e24dc597eccf328ec166fc65f5a6a9c5830f1fdd3d7a758f7307b9
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBdB/bS:sxX7QnxrloE5dpUpyb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevdob.exe 053ac109faa22e64154ca3997308485a6cd8ef78160d332219bfd16cac422e10N.exe -
Executes dropped EXE 2 IoCs
pid Process 2336 sysdevdob.exe 2920 xoptiloc.exe -
Loads dropped DLL 2 IoCs
pid Process 2136 053ac109faa22e64154ca3997308485a6cd8ef78160d332219bfd16cac422e10N.exe 2136 053ac109faa22e64154ca3997308485a6cd8ef78160d332219bfd16cac422e10N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesKR\\xoptiloc.exe" 053ac109faa22e64154ca3997308485a6cd8ef78160d332219bfd16cac422e10N.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidVC\\optialoc.exe" 053ac109faa22e64154ca3997308485a6cd8ef78160d332219bfd16cac422e10N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 053ac109faa22e64154ca3997308485a6cd8ef78160d332219bfd16cac422e10N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysdevdob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xoptiloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2136 053ac109faa22e64154ca3997308485a6cd8ef78160d332219bfd16cac422e10N.exe 2136 053ac109faa22e64154ca3997308485a6cd8ef78160d332219bfd16cac422e10N.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe 2336 sysdevdob.exe 2920 xoptiloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2336 2136 053ac109faa22e64154ca3997308485a6cd8ef78160d332219bfd16cac422e10N.exe 30 PID 2136 wrote to memory of 2336 2136 053ac109faa22e64154ca3997308485a6cd8ef78160d332219bfd16cac422e10N.exe 30 PID 2136 wrote to memory of 2336 2136 053ac109faa22e64154ca3997308485a6cd8ef78160d332219bfd16cac422e10N.exe 30 PID 2136 wrote to memory of 2336 2136 053ac109faa22e64154ca3997308485a6cd8ef78160d332219bfd16cac422e10N.exe 30 PID 2136 wrote to memory of 2920 2136 053ac109faa22e64154ca3997308485a6cd8ef78160d332219bfd16cac422e10N.exe 31 PID 2136 wrote to memory of 2920 2136 053ac109faa22e64154ca3997308485a6cd8ef78160d332219bfd16cac422e10N.exe 31 PID 2136 wrote to memory of 2920 2136 053ac109faa22e64154ca3997308485a6cd8ef78160d332219bfd16cac422e10N.exe 31 PID 2136 wrote to memory of 2920 2136 053ac109faa22e64154ca3997308485a6cd8ef78160d332219bfd16cac422e10N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\053ac109faa22e64154ca3997308485a6cd8ef78160d332219bfd16cac422e10N.exe"C:\Users\Admin\AppData\Local\Temp\053ac109faa22e64154ca3997308485a6cd8ef78160d332219bfd16cac422e10N.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevdob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevdob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
-
C:\FilesKR\xoptiloc.exeC:\FilesKR\xoptiloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD50f419348c616a2e0f83cf9d443e7e699
SHA18c9cb868dd77137cd6df14199731b2560f968921
SHA25626d462187c8a426fcfe2d84ab79a0175c625979e522684fcda3bbdb404fc48f6
SHA51208f18f74bfbd05c73c8a5f63115ae5114fca25877006a4996a3f4c1692b59219fa3986db512c66550ebefc6114c1507d523c119fe3f85a74ba4936e2ad11b3a3
-
Filesize
171B
MD5ac5f67283c28278142cd50e3aaa5da8d
SHA19def7f7a39520e9544f82a959d867a0920091be4
SHA25674a4621a021be37b66fd8c0e909fb9918b930ab8c8e93593a756d8b5167eba42
SHA512888b2ba8f083874ee08d857e9b37d1a524f9816d38f38d93d94c526d53dffecf827adfbaa28aa7520c466203d1d4ac6ae73b25a69a5a30d8654f0b02c6ad7da1
-
Filesize
203B
MD572f4e96670eb9dd8a3e77adfd2d6c1bb
SHA1842ab21dd429dac3f84e951b25e9382199d6e3c3
SHA256fe7c1456bebcde95b36522e3a884f33e6cccc3a43cd17cc8832f48193b9dffbd
SHA51298fa26d483979a4820262da719572f4cd594786dd1ca27a021e6ecf55566e414ffd326631c4afa976f8291fafbbf9eea8de7cb7fb4de8c6c24709fb55f019fee
-
Filesize
2.6MB
MD5fc5285e25743f1ea481ec24ccd6950fc
SHA191afbf7f4c1bd7cf5779404da9997a8c34a9ed2a
SHA25631cec33b8d381cfcbf404c7d2cd61f066c1cb6bca44399de389b48f394e79dc9
SHA5129f74b3c6da751e4016d2037d4390875f81803f5c904a6ba936c00cf4e928c5dbf953a93e559d45d959e3d88a698a531bc4ec152e760ef7b243ff27b705b8a53b
-
Filesize
2.6MB
MD5c39f64e365a6c618d9694e4857d69da5
SHA173fc8e17db5e8a398bdf88ee5c8abad7b2c42707
SHA25679a72aa3a4a4bf805571923ad4ff65942c76a7319174d81272d55aafb708d624
SHA512c74e14a16d2258f46afbc3e26e250d49839fed39821350c3fb88ff1235316c3e7b683d38a88fead41a1fa42de2fa1ef45c52b33353eaddfdc012e1fb7ca5d05e
-
Filesize
2.6MB
MD5f00b739b6428c56973328745f8f39362
SHA19cbffb4c90883e230778a2b03994f710906df67e
SHA2566468c24ab8f242c22e7acc4a49f92ee1563a2a0ef632a8717ce9e35d7d4f7db3
SHA512751f89ce9091b3a91d87eaee19db1f9851eee4cbbd3c99318dac182563cd4d2f12e82030d32158d6fbdf4e7b6608c9406e3f5eaefa7c1d82e1f6675430cf773d