Overview
overview
10Static
static
10virussign....b0.exe
windows7-x64
10virussign....b0.exe
windows10-2004-x64
10virussign....60.exe
windows7-x64
7virussign....60.exe
windows10-2004-x64
7virussign....40.exe
windows7-x64
7virussign....40.exe
windows10-2004-x64
7virussign....e0.exe
windows7-x64
7virussign....e0.exe
windows10-2004-x64
7virussign....00.exe
windows7-x64
10virussign....00.exe
windows10-2004-x64
10virussign....90.exe
windows7-x64
7virussign....90.exe
windows10-2004-x64
7virussign....40.exe
windows7-x64
7virussign....40.exe
windows10-2004-x64
7virussign....10.exe
windows7-x64
5virussign....10.exe
windows10-2004-x64
5virussign....60.exe
windows7-x64
7virussign....60.exe
windows10-2004-x64
7virussign....c0.exe
windows7-x64
10virussign....c0.exe
windows10-2004-x64
10virussign....d0.exe
windows7-x64
7virussign....d0.exe
windows10-2004-x64
7virussign....b0.exe
windows7-x64
10virussign....b0.exe
windows10-2004-x64
10virussign....10.exe
windows7-x64
7virussign....10.exe
windows10-2004-x64
7virussign....e0.exe
windows7-x64
7virussign....e0.exe
windows10-2004-x64
7virussign....20.exe
windows7-x64
7virussign....20.exe
windows10-2004-x64
7virussign....c0.exe
windows7-x64
7virussign....c0.exe
windows10-2004-x64
7Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2024 17:08
Behavioral task
behavioral1
Sample
virussign.com_b1d2087d1d88f80870106373da2011b0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
virussign.com_b1d2087d1d88f80870106373da2011b0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
virussign.com_b4a073dab1d51b27d63f81649310ab60.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
virussign.com_b4a073dab1d51b27d63f81649310ab60.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
virussign.com_b793dc2ed636fdaee1a701e05fde1640.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
virussign.com_b793dc2ed636fdaee1a701e05fde1640.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
virussign.com_ba1f70e629bc3e70fba35036be583ce0.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
virussign.com_ba1f70e629bc3e70fba35036be583ce0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
virussign.com_bcab6f30045483fd648d1924aba88b00.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
virussign.com_bcab6f30045483fd648d1924aba88b00.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
virussign.com_bf4239be7de1ad8dddc78d1aff0d6090.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
virussign.com_bf4239be7de1ad8dddc78d1aff0d6090.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
virussign.com_c251643a9964695966b3f7a545401440.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
virussign.com_c251643a9964695966b3f7a545401440.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
virussign.com_c3fa4d199e50171575cfa553fd205a10.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
virussign.com_c3fa4d199e50171575cfa553fd205a10.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
virussign.com_c527d92958bc1247a6471765e5449c60.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
virussign.com_c527d92958bc1247a6471765e5449c60.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
virussign.com_c7d033cce29ec681f70bfb5f2ec867c0.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
virussign.com_c7d033cce29ec681f70bfb5f2ec867c0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
virussign.com_ca6b0e41f6273b8c6a022729b7a7efd0.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
virussign.com_ca6b0e41f6273b8c6a022729b7a7efd0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
virussign.com_ccf2dfc7e36c604f207bf823231b57b0.exe
Resource
win7-20241023-en
Behavioral task
behavioral24
Sample
virussign.com_ccf2dfc7e36c604f207bf823231b57b0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
virussign.com_cf449b9fd99f5da93cbb91c84e64e710.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
virussign.com_cf449b9fd99f5da93cbb91c84e64e710.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
virussign.com_d2157a5e0405795aa865f9264e231ee0.exe
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
virussign.com_d2157a5e0405795aa865f9264e231ee0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
virussign.com_d4dd384ae38fed77098536c5b075c320.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
virussign.com_d4dd384ae38fed77098536c5b075c320.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
virussign.com_d7c1eea17ae01e04b622ede80b6732c0.exe
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
virussign.com_d7c1eea17ae01e04b622ede80b6732c0.exe
Resource
win10v2004-20241007-en
General
-
Target
virussign.com_b793dc2ed636fdaee1a701e05fde1640.exe
-
Size
2.6MB
-
MD5
b793dc2ed636fdaee1a701e05fde1640
-
SHA1
23741caf22809c1bfb9b9d803a070f45b95dfa26
-
SHA256
4e243bfc150e3df8b0b6c3f274c51e21a61c58b261c4ee963ff3cc1b000b55c9
-
SHA512
d4f0e7a3aea5cb7216cb7fa0a290845fcf92413c83edd3de3302ffda45a52ee3a28c7faa6da9391be03f7818441b68b96c1c95548e28dc1419eb79f469b92e94
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB+B/bS:sxX7QnxrloE5dpUpJb
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxdob.exe virussign.com_b793dc2ed636fdaee1a701e05fde1640.exe -
Executes dropped EXE 2 IoCs
pid Process 528 locxdob.exe 4652 devoptisys.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeJQ\\devoptisys.exe" virussign.com_b793dc2ed636fdaee1a701e05fde1640.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxLS\\bodaec.exe" virussign.com_b793dc2ed636fdaee1a701e05fde1640.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language virussign.com_b793dc2ed636fdaee1a701e05fde1640.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locxdob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devoptisys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1016 virussign.com_b793dc2ed636fdaee1a701e05fde1640.exe 1016 virussign.com_b793dc2ed636fdaee1a701e05fde1640.exe 1016 virussign.com_b793dc2ed636fdaee1a701e05fde1640.exe 1016 virussign.com_b793dc2ed636fdaee1a701e05fde1640.exe 528 locxdob.exe 528 locxdob.exe 4652 devoptisys.exe 4652 devoptisys.exe 528 locxdob.exe 528 locxdob.exe 4652 devoptisys.exe 4652 devoptisys.exe 528 locxdob.exe 528 locxdob.exe 4652 devoptisys.exe 4652 devoptisys.exe 528 locxdob.exe 528 locxdob.exe 4652 devoptisys.exe 4652 devoptisys.exe 528 locxdob.exe 528 locxdob.exe 4652 devoptisys.exe 4652 devoptisys.exe 528 locxdob.exe 528 locxdob.exe 4652 devoptisys.exe 4652 devoptisys.exe 528 locxdob.exe 528 locxdob.exe 4652 devoptisys.exe 4652 devoptisys.exe 528 locxdob.exe 528 locxdob.exe 4652 devoptisys.exe 4652 devoptisys.exe 528 locxdob.exe 528 locxdob.exe 4652 devoptisys.exe 4652 devoptisys.exe 528 locxdob.exe 528 locxdob.exe 4652 devoptisys.exe 4652 devoptisys.exe 528 locxdob.exe 528 locxdob.exe 4652 devoptisys.exe 4652 devoptisys.exe 528 locxdob.exe 528 locxdob.exe 4652 devoptisys.exe 4652 devoptisys.exe 528 locxdob.exe 528 locxdob.exe 4652 devoptisys.exe 4652 devoptisys.exe 528 locxdob.exe 528 locxdob.exe 4652 devoptisys.exe 4652 devoptisys.exe 528 locxdob.exe 528 locxdob.exe 4652 devoptisys.exe 4652 devoptisys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1016 wrote to memory of 528 1016 virussign.com_b793dc2ed636fdaee1a701e05fde1640.exe 85 PID 1016 wrote to memory of 528 1016 virussign.com_b793dc2ed636fdaee1a701e05fde1640.exe 85 PID 1016 wrote to memory of 528 1016 virussign.com_b793dc2ed636fdaee1a701e05fde1640.exe 85 PID 1016 wrote to memory of 4652 1016 virussign.com_b793dc2ed636fdaee1a701e05fde1640.exe 88 PID 1016 wrote to memory of 4652 1016 virussign.com_b793dc2ed636fdaee1a701e05fde1640.exe 88 PID 1016 wrote to memory of 4652 1016 virussign.com_b793dc2ed636fdaee1a701e05fde1640.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\virussign.com_b793dc2ed636fdaee1a701e05fde1640.exe"C:\Users\Admin\AppData\Local\Temp\virussign.com_b793dc2ed636fdaee1a701e05fde1640.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxdob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxdob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:528
-
-
C:\AdobeJQ\devoptisys.exeC:\AdobeJQ\devoptisys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5ce509cbd40d984e5775dfdd130e695e2
SHA13dae2494e9a436da6e29387050841263a88b8443
SHA25625d0392d640e61431d43e9056e8138acb9a1e6c510a46ef5c1591d8c606485f0
SHA51242b854c9a2709fb172ef8b6774b41b979c7c1770bd80e033ab0ea0448f24f25c6860765f681e8ad907a25dd8780350750cc7be4677df57d86432fa327701ab2f
-
Filesize
2.3MB
MD53180a5437b9c1e62c760afc944691a57
SHA16d6671803bc35dcb3704689278308f4a4ee23df2
SHA256f9b6dae1ac4e51f18f2e4811ba029bfe76bd9f8f612669a8ccea3d9f38e869f2
SHA512ad26f91c248cd6b4278c2beb72dd71c029e96c904dfc0409be1a2ee192760584915206a42896da84acf8b2b346deace16323d0eb383b24b37f10870750ef37c1
-
Filesize
2.6MB
MD5d47c49a0dcbee832378abc6acbd6bf1c
SHA196c5cf362ce09c6299cac6a52aa14083bd1125f4
SHA25618190dce2417387bba119a148b8f39ad0519e5b889e343c2833d74a6460f07ef
SHA512d064e7a6e335507c402df6ecad9f65f716af822712c597c8788d77272744d6118aefad4ba1bd0618d12156b1d6bb654a15bdc2018c5c654e33d2781ec91dbe0b
-
Filesize
203B
MD5d7ca3807138b91a49bea616e22010de8
SHA1014d34acdd27d5507bfdd5cc5f3ad1ae528b4087
SHA256bd6ce190e473a5ee3dc5ca3163324f9e5470f9463a9182419d49d23d64936161
SHA5121cbb16993f6fc7baf3409cda24796889e409acb1d82a6a04643b387b259f62a74906323b26096964059d0e2d0cf5f398c613591899110b908422463be257ec8a
-
Filesize
171B
MD5fa9181c94ebefb4a53bfc565fcf7e70c
SHA10805967de9cd165e93a59868986e7ec8ea4576a7
SHA256b50487aad5b487d34d03dd9fb8ca76060aa189815473a614ca827b179e6e91f4
SHA512d2ce1f3fce649986ee40834aaa17e53e640b280564ff2bcb7e040ceb0153669c03e8331aead534745f3bfc5f4fb1ac3af7fb63f8e86976d34264c8887dd57e22
-
Filesize
2.6MB
MD5aceef9ec609e78a7cab3227cd966f21b
SHA11c7ccfc45095acf6f14553cca92787f7cdaf3517
SHA256efc7d1e4bc1dfe380341891b4603ab9840b54edcf53e26d6b99591efbf1e74e7
SHA51276d2eb8029fab0f8ab5e360504b647b57c5c44e3f9cbd166a956eca501523145f26435555965f6ddf9f95d5f839a7d35d0f751d710af5ca787007144689a2f13