Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 14:13

General

  • Target

    39483dccedf6b9d8a49f6ed8979adea12f338d1199bfa906366ee9449cdab8a9N.exe

  • Size

    3.4MB

  • MD5

    db0b02629d030e233ca2aac36c1e6950

  • SHA1

    d53bbd959df4c897b1783b733cf77b50a4312753

  • SHA256

    39483dccedf6b9d8a49f6ed8979adea12f338d1199bfa906366ee9449cdab8a9

  • SHA512

    a658640fc13a6b4597ce9bc9c4d1612cb2d71e258c7b9a6a4dce8577cc8d0481a5274114dcffff13e439610f21eaea3a4a740c1af8aa09501d85c6454ce4364e

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBXB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUp0bVz8eLFcz

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39483dccedf6b9d8a49f6ed8979adea12f338d1199bfa906366ee9449cdab8a9N.exe
    "C:\Users\Admin\AppData\Local\Temp\39483dccedf6b9d8a49f6ed8979adea12f338d1199bfa906366ee9449cdab8a9N.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3312
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxbod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxbod.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:312
    • C:\IntelprocQH\devoptiloc.exe
      C:\IntelprocQH\devoptiloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\IntelprocQH\devoptiloc.exe

    Filesize

    3.4MB

    MD5

    ea334fb438a14a2c079d28d160e87a53

    SHA1

    faf9cf6efc3a5b39f9488c490d7556641f10e225

    SHA256

    237305472c0ae45b5757d06b23a92a907991e0ba0118e597abbacf3bec931086

    SHA512

    d1683b0964c94aa4150d01972abb40e3a9671a1c4a35a5517780708024542ef266328330c10e3082f28e1b6c5df9b9fa29b464b2c08f668b341cc72d478c2765

  • C:\LabZGF\optialoc.exe

    Filesize

    3.4MB

    MD5

    f7932f409a4d1d7b5ac7a673b8ed07e6

    SHA1

    e8eacf11f255facb86336c6c5650c598e62147f2

    SHA256

    69c1cba0dc8d25bcf6f50198c104caf375d72e7259179a0e065d14a12b8e660b

    SHA512

    473062ff117b847ce9ee20ec3b024f6abb5ab5683bc0c30baa94af4a57b567414e0a17709df6c6b72e498e07e02fabe46f2f30a8138d939d8fb89034a0ef13c2

  • C:\LabZGF\optialoc.exe

    Filesize

    3.4MB

    MD5

    094f14483fae6378f1ed97e0b19b6d48

    SHA1

    29b8f956cad64f5f05f59910a3ca5019c8644ca7

    SHA256

    4fb3b6bcafbd8baa0e8b660389a101d619e2cbbe5a7478bc5ce085bf0e997f3f

    SHA512

    17757512ff641016d514f04c8e126d19cfab80cff846d33c9a1b465652e3f0f89072e7e2eb0a114374c49877c1fa8f1a8714a00112538b8f3103b666d6a956b5

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    208B

    MD5

    74d2e7f734d21bd2eb747810427160d3

    SHA1

    0f4e1b78f4e81dff8da5684e942109809d86dd54

    SHA256

    43b4005affaba6590c94114a3c1013eeb5885cbabb58d6842ee51a89f20e52e3

    SHA512

    f741e3d16e9378bcec3cff0df3020410d2b9684619c723ef03f3524ca820a93b4cf66ecb73873c463e11c56f641de42831a47a84d94e1fa1e6ee14b1463196ed

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    176B

    MD5

    8b4b5f5006a08cb48b7101a2f24a57c4

    SHA1

    e48dce014384054c7e3cbac572b625aa0b58c3ab

    SHA256

    0ec8e8cc708fced01a22590fbe5b68265070bbbb0a3338085d36f49da63be611

    SHA512

    7a8c4cfc296735246e6f51c97d7e91beef4c15f26545c4ef1ebec172f348ab2a75f682200f8ec5995acbd1b326b38fb5d08cd758e72376b2ae5fdc023a73c5d2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxbod.exe

    Filesize

    3.4MB

    MD5

    03b24bef3888918716834719836dc903

    SHA1

    145f26e1bf5b3c622e23170b0624eb43c3aeae92

    SHA256

    97c1b6350ca75c4344bb1d029dbfa57a5ea80cf494a77d8a5bd128a7df0bf5f2

    SHA512

    981f786f94a1a1b65e02ebf5096c71e57e2b37e492ef5c642d52760989c1859ab52f08f7b0d886ef3b8fe91a1d7d8883abfffe4ed0ececcb2d041ca020b05482