Analysis
-
max time kernel
119s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 13:56
Static task
static1
Behavioral task
behavioral1
Sample
773b22c2d4eeb2521b311651c2473836f78502f768f54dbfc114a1e7784955d9N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
773b22c2d4eeb2521b311651c2473836f78502f768f54dbfc114a1e7784955d9N.exe
Resource
win10v2004-20241007-en
General
-
Target
773b22c2d4eeb2521b311651c2473836f78502f768f54dbfc114a1e7784955d9N.exe
-
Size
2.6MB
-
MD5
b53073527df4d7478f36adc5224fba20
-
SHA1
93d72e92facc83a99cfb53ca4bcf4d2e8920f0f0
-
SHA256
773b22c2d4eeb2521b311651c2473836f78502f768f54dbfc114a1e7784955d9
-
SHA512
381318224b5183b5368a8a3f365b18265f3db892846397969535fdaf6be5d00abb33f9b5fc785d344662b22cbd264ba47cb3ca08d6881a790e32aaa49311ae78
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBvB/bS:sxX7QnxrloE5dpUpIb
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxdob.exe 773b22c2d4eeb2521b311651c2473836f78502f768f54dbfc114a1e7784955d9N.exe -
Executes dropped EXE 2 IoCs
pid Process 2316 sysxdob.exe 1812 xoptiec.exe -
Loads dropped DLL 2 IoCs
pid Process 3012 773b22c2d4eeb2521b311651c2473836f78502f768f54dbfc114a1e7784955d9N.exe 3012 773b22c2d4eeb2521b311651c2473836f78502f768f54dbfc114a1e7784955d9N.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeOF\\xoptiec.exe" 773b22c2d4eeb2521b311651c2473836f78502f768f54dbfc114a1e7784955d9N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBZC\\optialoc.exe" 773b22c2d4eeb2521b311651c2473836f78502f768f54dbfc114a1e7784955d9N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 773b22c2d4eeb2521b311651c2473836f78502f768f54dbfc114a1e7784955d9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysxdob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xoptiec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3012 773b22c2d4eeb2521b311651c2473836f78502f768f54dbfc114a1e7784955d9N.exe 3012 773b22c2d4eeb2521b311651c2473836f78502f768f54dbfc114a1e7784955d9N.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe 2316 sysxdob.exe 1812 xoptiec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2316 3012 773b22c2d4eeb2521b311651c2473836f78502f768f54dbfc114a1e7784955d9N.exe 31 PID 3012 wrote to memory of 2316 3012 773b22c2d4eeb2521b311651c2473836f78502f768f54dbfc114a1e7784955d9N.exe 31 PID 3012 wrote to memory of 2316 3012 773b22c2d4eeb2521b311651c2473836f78502f768f54dbfc114a1e7784955d9N.exe 31 PID 3012 wrote to memory of 2316 3012 773b22c2d4eeb2521b311651c2473836f78502f768f54dbfc114a1e7784955d9N.exe 31 PID 3012 wrote to memory of 1812 3012 773b22c2d4eeb2521b311651c2473836f78502f768f54dbfc114a1e7784955d9N.exe 32 PID 3012 wrote to memory of 1812 3012 773b22c2d4eeb2521b311651c2473836f78502f768f54dbfc114a1e7784955d9N.exe 32 PID 3012 wrote to memory of 1812 3012 773b22c2d4eeb2521b311651c2473836f78502f768f54dbfc114a1e7784955d9N.exe 32 PID 3012 wrote to memory of 1812 3012 773b22c2d4eeb2521b311651c2473836f78502f768f54dbfc114a1e7784955d9N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\773b22c2d4eeb2521b311651c2473836f78502f768f54dbfc114a1e7784955d9N.exe"C:\Users\Admin\AppData\Local\Temp\773b22c2d4eeb2521b311651c2473836f78502f768f54dbfc114a1e7784955d9N.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxdob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxdob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2316
-
-
C:\AdobeOF\xoptiec.exeC:\AdobeOF\xoptiec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD544613f265dd7547bda31750a9a4c0293
SHA12e3c0db8e94c84196e817e8c8dc2375f4d332852
SHA256b31e50d69a4b8d974d249127ea5ac3d1eb68c1620485360ef830c4ffb52c4d12
SHA5120b7020b02bc4280109385aa16de4e78f5d5869f3d91e05944ddb64157488c332e13baac4f813a923bc0f6beea6a82ce651490af409a3203fb5e82b0577173687
-
Filesize
2.6MB
MD517b915ed3e39c2a5e1ee0d7072d7bcab
SHA14c8036fd5ce4a219ac05d430aca3ff131dd5e554
SHA256772db35809db01382fde2892a8d0a289dc8e0dc73a1a40d4bee02a21a3a29f0a
SHA5120efa3d2cef92a22e03137d0dd75f7fa642f8b495d4235071613b588057fc2ef54bc985a3c035d612fd9401bb811321b622bf8658df66b728623a2510ecf6b8f9
-
Filesize
2.6MB
MD5709bdba1c39004ab02c96d9a0550299e
SHA1a6885342a925b835608779695c26379f4e6bbe4d
SHA2568b4526c940163ce36de979993666b2c9fe133b5e998cd4a6fa4bbfb235c3c846
SHA51252f32fbb04600a3ee1f4dca179a9734538830930659cf319166f8529f68d2ab48b8e654ef3c5921a31395f9d2c35e9488fda5ee5937f2aa66774af069993ed7e
-
Filesize
169B
MD5a8d5bbecd89433f611d32dc4b11f337a
SHA1c3425f4a1a5e2a7887110a0b0501306cbae3242b
SHA256b259cab3d4a008c4848ea058cf5f23545a0e8f4d51a1a94f3efe082f8e20d317
SHA512fba03c220d88cab0c3a8e9f1bf5305c96ffa00671d6a4a4924d0431687c5b20856594320c6adcf1867947b5f386b019ceb4a1fc8bf4e5735f9f808fbc9c01237
-
Filesize
201B
MD5ac93743274a42d246f65a5cfe7f05302
SHA103b0fc45ffe4b8b575c3f1ce02d2c33b9bc55939
SHA256200cc9f02641fb08b61cb15e644ed18727ad4e748fb8d66aa40f044747098061
SHA512a7288d434ef62761567ffa837a7f94d2f57188731943e16a0c34bb18679ed6e29eb1c92f64b798257b345e92a41c863df1a402d263d76464ec2c08f5b3912887
-
Filesize
2.6MB
MD52d86766b437a739e4b6261f362ae88e8
SHA193ae8a06e8b009c98d6724e504588beb5c875d7c
SHA25695dbd4fa1823881f7720d561b4a1a688e832b2257676d3f0ef0f242a1053fc68
SHA51221591bb090b2fb97d747e74baffac916d7ea5975147afe9fe30861221a3f40587ef477817f15ade38b2de45e832dd5528664124e45bf32d90a387789ff8fd03b