Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 11:18
Static task
static1
Behavioral task
behavioral1
Sample
53679fa145966da511a477da350a0ea3869a87917075becdbbca8766aaf7a0f8N.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
53679fa145966da511a477da350a0ea3869a87917075becdbbca8766aaf7a0f8N.exe
Resource
win10v2004-20241007-en
General
-
Target
53679fa145966da511a477da350a0ea3869a87917075becdbbca8766aaf7a0f8N.exe
-
Size
2.6MB
-
MD5
280c423cdd148f050c1546f754afd450
-
SHA1
60b150f8efdd69e8b5c63cc63000e0f3fbf51e23
-
SHA256
53679fa145966da511a477da350a0ea3869a87917075becdbbca8766aaf7a0f8
-
SHA512
12bd97f19c50de3c28e590674e3ca18807c03b15c402f3c5635fd8d248594e3d6c3b3064594b12874b53cd423ca94ec63bfac771b5c8caf02d9d9f1ce6016ad3
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBfB/bS:sxX7QnxrloE5dpUpIb
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevdob.exe 53679fa145966da511a477da350a0ea3869a87917075becdbbca8766aaf7a0f8N.exe -
Executes dropped EXE 2 IoCs
pid Process 516 locdevdob.exe 4460 devdobsys.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesS8\\devdobsys.exe" 53679fa145966da511a477da350a0ea3869a87917075becdbbca8766aaf7a0f8N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxXO\\optixec.exe" 53679fa145966da511a477da350a0ea3869a87917075becdbbca8766aaf7a0f8N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53679fa145966da511a477da350a0ea3869a87917075becdbbca8766aaf7a0f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locdevdob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devdobsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2276 53679fa145966da511a477da350a0ea3869a87917075becdbbca8766aaf7a0f8N.exe 2276 53679fa145966da511a477da350a0ea3869a87917075becdbbca8766aaf7a0f8N.exe 2276 53679fa145966da511a477da350a0ea3869a87917075becdbbca8766aaf7a0f8N.exe 2276 53679fa145966da511a477da350a0ea3869a87917075becdbbca8766aaf7a0f8N.exe 516 locdevdob.exe 516 locdevdob.exe 4460 devdobsys.exe 4460 devdobsys.exe 516 locdevdob.exe 516 locdevdob.exe 4460 devdobsys.exe 4460 devdobsys.exe 516 locdevdob.exe 516 locdevdob.exe 4460 devdobsys.exe 4460 devdobsys.exe 516 locdevdob.exe 516 locdevdob.exe 4460 devdobsys.exe 4460 devdobsys.exe 516 locdevdob.exe 516 locdevdob.exe 4460 devdobsys.exe 4460 devdobsys.exe 516 locdevdob.exe 516 locdevdob.exe 4460 devdobsys.exe 4460 devdobsys.exe 516 locdevdob.exe 516 locdevdob.exe 4460 devdobsys.exe 4460 devdobsys.exe 516 locdevdob.exe 516 locdevdob.exe 4460 devdobsys.exe 4460 devdobsys.exe 516 locdevdob.exe 516 locdevdob.exe 4460 devdobsys.exe 4460 devdobsys.exe 516 locdevdob.exe 516 locdevdob.exe 4460 devdobsys.exe 4460 devdobsys.exe 516 locdevdob.exe 516 locdevdob.exe 4460 devdobsys.exe 4460 devdobsys.exe 516 locdevdob.exe 516 locdevdob.exe 4460 devdobsys.exe 4460 devdobsys.exe 516 locdevdob.exe 516 locdevdob.exe 4460 devdobsys.exe 4460 devdobsys.exe 516 locdevdob.exe 516 locdevdob.exe 4460 devdobsys.exe 4460 devdobsys.exe 516 locdevdob.exe 516 locdevdob.exe 4460 devdobsys.exe 4460 devdobsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2276 wrote to memory of 516 2276 53679fa145966da511a477da350a0ea3869a87917075becdbbca8766aaf7a0f8N.exe 86 PID 2276 wrote to memory of 516 2276 53679fa145966da511a477da350a0ea3869a87917075becdbbca8766aaf7a0f8N.exe 86 PID 2276 wrote to memory of 516 2276 53679fa145966da511a477da350a0ea3869a87917075becdbbca8766aaf7a0f8N.exe 86 PID 2276 wrote to memory of 4460 2276 53679fa145966da511a477da350a0ea3869a87917075becdbbca8766aaf7a0f8N.exe 89 PID 2276 wrote to memory of 4460 2276 53679fa145966da511a477da350a0ea3869a87917075becdbbca8766aaf7a0f8N.exe 89 PID 2276 wrote to memory of 4460 2276 53679fa145966da511a477da350a0ea3869a87917075becdbbca8766aaf7a0f8N.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\53679fa145966da511a477da350a0ea3869a87917075becdbbca8766aaf7a0f8N.exe"C:\Users\Admin\AppData\Local\Temp\53679fa145966da511a477da350a0ea3869a87917075becdbbca8766aaf7a0f8N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevdob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevdob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:516
-
-
C:\FilesS8\devdobsys.exeC:\FilesS8\devdobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5cbf8e208977e14a287be1d67d6dee8a6
SHA10ede991531206c4eedd5d3406f73d5b4b5ebb393
SHA256105b902640566a948be43c311bdec6ae7e6e9400a4e05e974e5b762d9d9ac9d7
SHA5127e42598c9254c1e127cb8c157e5fc544cce4abb3c041af9b0559eb98a9ea90ee2bd61bebbc7cca8380e8dc11431d3b9344a660fa7958e13996f2ad9530bbe9fb
-
Filesize
2.6MB
MD54ea42fa459b0834d81517f93b05e460f
SHA108df437005d87a2c122e7842427aa83ce5435d0d
SHA2566d94bf5b883280ca6da5c5c554d633bc4c97ee2b16fefdebcde6f45ce83e3625
SHA512b02708faddcac6c56336fc6cc50ba933bacaf626c15be4fe1debdae5aa251090ea441b993a40dad5b7ba2672739ab47f7090079b36a8785858e208e59f3f9c1a
-
Filesize
2.6MB
MD51ebc86c6f4845d065209f5c746e84983
SHA1501b2edb3b5d8d1b2deb317cb2d217c1cba290b8
SHA256105fa7b06b088f62f5a5c340cd21a1b3d8ae3ad068955db2686f0f8369ac437b
SHA512d5adb65a71009aa3c93f6e07914b76ce8dcb865c68c287a01a72f1fb617bcf6f247a5b3ad43878164c0ffe187ecaff46406af02d9a6c40fae10e95ea16887ea1
-
Filesize
205B
MD5200ea02341ddfc84ba615ece8d5174c0
SHA1fc8d3f0dc0a9bc70f876832fc7ad03903a6f80f0
SHA2569ce654dbca6bcf99f4ce4a50dfa2c70bde35ac30f215e905fb842cc6476543dc
SHA51201d9f41aaae02ca16b4788d1f3988ecb9084af8392855463c5d7f796b4a5446748001fc633b9c8df644a444a99e16273fc07bfbe0ab365fb44bf294efb3e5c65
-
Filesize
173B
MD5796a1c5535b887fcdac0c0197c66a01a
SHA17311427595e5162d089cf541aac63a8f60a5bbc8
SHA256f9c81a9201186ca7a8b3af008a93b82073d9d2aaf562d0cae0db1ba8943c88c7
SHA51240eeef94467cda85469affe823de578e38681edd82cdfa8484e35c92ccd7d1b16bd739d550559203f5395029392ce9e54864c43239d02d55d239c0eb5c3ff576
-
Filesize
2.6MB
MD5713c133eaec6e2e4e0923b08e0456eb6
SHA17c9e821a995099c89497d85bbb26afe9039e3973
SHA256f0cebac562ebda2759f3ce1864aacdf80cf5a1902cdc718f4b84165fb753c45f
SHA512f41b761de732aa12dc9961ab6edc2b63c30504ac330ec1bf98972e6d859cb0f3a2a220e7bd40a303b863addd7b5eb42c33c55bc15e383ff1620d54dcc840e547