Analysis
-
max time kernel
120s -
max time network
92s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 04:45
Static task
static1
Behavioral task
behavioral1
Sample
3c4f11c94b5caee15552b4f7ca7c061313182e7c035b98c14dd7a2f80b86afd6N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3c4f11c94b5caee15552b4f7ca7c061313182e7c035b98c14dd7a2f80b86afd6N.exe
Resource
win10v2004-20240802-en
General
-
Target
3c4f11c94b5caee15552b4f7ca7c061313182e7c035b98c14dd7a2f80b86afd6N.exe
-
Size
2.6MB
-
MD5
5e16d047454ad48c3ea0bd8acd2e5490
-
SHA1
20f077366ded9cdcb5bc8c1639ba1dc18cc3c1b3
-
SHA256
3c4f11c94b5caee15552b4f7ca7c061313182e7c035b98c14dd7a2f80b86afd6
-
SHA512
6d21b8e405b3a4ad389de7b13a4be7a8845a469c0a3a87e584bb9fb4ac5990fe234eb194dee0bd6a7940680db5ea54d026de16cac578d52a5829056d343adf76
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB1B/bS:sxX7QnxrloE5dpUpmb
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxbod.exe 3c4f11c94b5caee15552b4f7ca7c061313182e7c035b98c14dd7a2f80b86afd6N.exe -
Executes dropped EXE 2 IoCs
pid Process 2120 sysxbod.exe 5096 adobloc.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesS0\\adobloc.exe" 3c4f11c94b5caee15552b4f7ca7c061313182e7c035b98c14dd7a2f80b86afd6N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Galax3M\\optialoc.exe" 3c4f11c94b5caee15552b4f7ca7c061313182e7c035b98c14dd7a2f80b86afd6N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c4f11c94b5caee15552b4f7ca7c061313182e7c035b98c14dd7a2f80b86afd6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysxbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3732 3c4f11c94b5caee15552b4f7ca7c061313182e7c035b98c14dd7a2f80b86afd6N.exe 3732 3c4f11c94b5caee15552b4f7ca7c061313182e7c035b98c14dd7a2f80b86afd6N.exe 3732 3c4f11c94b5caee15552b4f7ca7c061313182e7c035b98c14dd7a2f80b86afd6N.exe 3732 3c4f11c94b5caee15552b4f7ca7c061313182e7c035b98c14dd7a2f80b86afd6N.exe 2120 sysxbod.exe 2120 sysxbod.exe 5096 adobloc.exe 5096 adobloc.exe 2120 sysxbod.exe 2120 sysxbod.exe 5096 adobloc.exe 5096 adobloc.exe 2120 sysxbod.exe 2120 sysxbod.exe 5096 adobloc.exe 5096 adobloc.exe 2120 sysxbod.exe 2120 sysxbod.exe 5096 adobloc.exe 5096 adobloc.exe 2120 sysxbod.exe 2120 sysxbod.exe 5096 adobloc.exe 5096 adobloc.exe 2120 sysxbod.exe 2120 sysxbod.exe 5096 adobloc.exe 5096 adobloc.exe 2120 sysxbod.exe 2120 sysxbod.exe 5096 adobloc.exe 5096 adobloc.exe 2120 sysxbod.exe 2120 sysxbod.exe 5096 adobloc.exe 5096 adobloc.exe 2120 sysxbod.exe 2120 sysxbod.exe 5096 adobloc.exe 5096 adobloc.exe 2120 sysxbod.exe 2120 sysxbod.exe 5096 adobloc.exe 5096 adobloc.exe 2120 sysxbod.exe 2120 sysxbod.exe 5096 adobloc.exe 5096 adobloc.exe 2120 sysxbod.exe 2120 sysxbod.exe 5096 adobloc.exe 5096 adobloc.exe 2120 sysxbod.exe 2120 sysxbod.exe 5096 adobloc.exe 5096 adobloc.exe 2120 sysxbod.exe 2120 sysxbod.exe 5096 adobloc.exe 5096 adobloc.exe 2120 sysxbod.exe 2120 sysxbod.exe 5096 adobloc.exe 5096 adobloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3732 wrote to memory of 2120 3732 3c4f11c94b5caee15552b4f7ca7c061313182e7c035b98c14dd7a2f80b86afd6N.exe 85 PID 3732 wrote to memory of 2120 3732 3c4f11c94b5caee15552b4f7ca7c061313182e7c035b98c14dd7a2f80b86afd6N.exe 85 PID 3732 wrote to memory of 2120 3732 3c4f11c94b5caee15552b4f7ca7c061313182e7c035b98c14dd7a2f80b86afd6N.exe 85 PID 3732 wrote to memory of 5096 3732 3c4f11c94b5caee15552b4f7ca7c061313182e7c035b98c14dd7a2f80b86afd6N.exe 86 PID 3732 wrote to memory of 5096 3732 3c4f11c94b5caee15552b4f7ca7c061313182e7c035b98c14dd7a2f80b86afd6N.exe 86 PID 3732 wrote to memory of 5096 3732 3c4f11c94b5caee15552b4f7ca7c061313182e7c035b98c14dd7a2f80b86afd6N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c4f11c94b5caee15552b4f7ca7c061313182e7c035b98c14dd7a2f80b86afd6N.exe"C:\Users\Admin\AppData\Local\Temp\3c4f11c94b5caee15552b4f7ca7c061313182e7c035b98c14dd7a2f80b86afd6N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxbod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2120
-
-
C:\FilesS0\adobloc.exeC:\FilesS0\adobloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5197240a98908f21503065b142fcbfbcb
SHA1e4d1f70166d507e5512a97da7de736de187a08a1
SHA256e827eea3ef23556dc895e4fc5ba770da3c0b9e8cc28f2d4cae31376d5e35fd3f
SHA512d538af26aa8836ee88ce7101fd62c1688bfc8e1f67f15b3c6abf5f6df4705b62191dbef0e14e8fffd8091c6b8b855794bceba28157bdcd3b11153cc7c403d834
-
Filesize
2.6MB
MD57b1bae9e1fdb0446b8d88a5ccbf50e53
SHA1c4041bdb2b47a49fb47db61f5a735bf4bdcaf9c9
SHA256dd7d85f203cde445acded7edb392466f59578c8c1f3766bf55332e11b474859b
SHA512ee37e08da69fa663f50cff5f4ecaf2c1cea82dbcad5915a963636b08ff6af37331acfa7813492d8e3b11e9ab6e705d9eaef8de9adfab3e560c42e8071a0f6d29
-
Filesize
2.6MB
MD54eae7fdd6920ac0ec0b72d09d4c6f6b5
SHA18626b16bca266856c9a136bb6fb12538f68e9856
SHA256e56bf75ff42b624d0ee406b3fa0def70d75aec9a33b798c0cdd303a41778d87d
SHA512d6565a6e343927c5cdd7e951ad3293ad38fe5a8d5a4fc9a98324cddb376ec260da767d6ebbe23a75274ece3c835a2984e7b410b3b615b692fd79138326963ce4
-
Filesize
2KB
MD5d0c1cfb1bc751f796263e7f6ddb68f7b
SHA1e35ef7c594cb6baa90f3b77146b71e296e56c4e9
SHA2561a6c015cd3f38350b98a4f16e42869a081c8c2b12faf73546f606cb722413f4a
SHA512cae3f67e99cde353b575ad9336db1f03f0a932d3a54e204190c32c3ac66e11ce387b2173bee5874627fd1c416b95406b774b630d0f3a6fd4b69f5987598a54cf
-
Filesize
202B
MD5a16485711faac294c928fcbbd5b6aac0
SHA103fc4462d99ae463c1fc41ca73e7382a2def13d2
SHA256d6914fb21eb330a763fbd6e68c7d41fe22ac8b9899a4b695bdc9cdb772d4b4c2
SHA512cf6c9ab10245d9a6c9c82445a9085f5507738b445e5f2d2ad52d45377c64213c5d2d8b8297e26c5957dd0d6d703b9eb04462db4a8bfe4fdcd0db2a430c84c7af
-
Filesize
170B
MD5b4e23756659ea37f50fb8b8d7ec99a49
SHA1f0397fa10de6b690c71be53fd05a6f555e18c902
SHA256de0627524078953e8e8889a260f9a432d073c95e599e7306a91a81acdc3662bb
SHA5129c88220a3824305f48b37443b65a79c8e1a9138df2c4fc37c7bdb2b52bfa72cffaabbf697a1ed4c19c4d90bd55d3b75f5bb37e386e3d48696843d35753a8154c
-
Filesize
2.6MB
MD53daac59d8b091389f6b57ba810e27be4
SHA10bbb1b2b2883b15ffa91c43d501ddffe21cce6d7
SHA256ce537dcf62009d210bcbb1c2e0e978746f8a8ea0ca1d4bf505b2839e1ae87060
SHA512c14e44fe337421e556cc24e8a84dbb1842e46e8983d75caa7cf0a589b0f740c781728642e5af8180a2a829c50fff688121a362d46ad2069ecc625f1cee688489