Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 14:13
Static task
static1
Behavioral task
behavioral1
Sample
39483dccedf6b9d8a49f6ed8979adea12f338d1199bfa906366ee9449cdab8a9N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39483dccedf6b9d8a49f6ed8979adea12f338d1199bfa906366ee9449cdab8a9N.exe
Resource
win10v2004-20241007-en
General
-
Target
39483dccedf6b9d8a49f6ed8979adea12f338d1199bfa906366ee9449cdab8a9N.exe
-
Size
3.4MB
-
MD5
db0b02629d030e233ca2aac36c1e6950
-
SHA1
d53bbd959df4c897b1783b733cf77b50a4312753
-
SHA256
39483dccedf6b9d8a49f6ed8979adea12f338d1199bfa906366ee9449cdab8a9
-
SHA512
a658640fc13a6b4597ce9bc9c4d1612cb2d71e258c7b9a6a4dce8577cc8d0481a5274114dcffff13e439610f21eaea3a4a740c1af8aa09501d85c6454ce4364e
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBXB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUp0bVz8eLFcz
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxbod.exe 39483dccedf6b9d8a49f6ed8979adea12f338d1199bfa906366ee9449cdab8a9N.exe -
Executes dropped EXE 2 IoCs
pid Process 312 sysxbod.exe 4760 devoptiloc.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocQH\\devoptiloc.exe" 39483dccedf6b9d8a49f6ed8979adea12f338d1199bfa906366ee9449cdab8a9N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZGF\\optialoc.exe" 39483dccedf6b9d8a49f6ed8979adea12f338d1199bfa906366ee9449cdab8a9N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39483dccedf6b9d8a49f6ed8979adea12f338d1199bfa906366ee9449cdab8a9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysxbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devoptiloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3312 39483dccedf6b9d8a49f6ed8979adea12f338d1199bfa906366ee9449cdab8a9N.exe 3312 39483dccedf6b9d8a49f6ed8979adea12f338d1199bfa906366ee9449cdab8a9N.exe 3312 39483dccedf6b9d8a49f6ed8979adea12f338d1199bfa906366ee9449cdab8a9N.exe 3312 39483dccedf6b9d8a49f6ed8979adea12f338d1199bfa906366ee9449cdab8a9N.exe 312 sysxbod.exe 312 sysxbod.exe 4760 devoptiloc.exe 4760 devoptiloc.exe 312 sysxbod.exe 312 sysxbod.exe 4760 devoptiloc.exe 4760 devoptiloc.exe 312 sysxbod.exe 312 sysxbod.exe 4760 devoptiloc.exe 4760 devoptiloc.exe 312 sysxbod.exe 312 sysxbod.exe 4760 devoptiloc.exe 4760 devoptiloc.exe 312 sysxbod.exe 312 sysxbod.exe 4760 devoptiloc.exe 4760 devoptiloc.exe 312 sysxbod.exe 312 sysxbod.exe 4760 devoptiloc.exe 4760 devoptiloc.exe 312 sysxbod.exe 312 sysxbod.exe 4760 devoptiloc.exe 4760 devoptiloc.exe 312 sysxbod.exe 312 sysxbod.exe 4760 devoptiloc.exe 4760 devoptiloc.exe 312 sysxbod.exe 312 sysxbod.exe 4760 devoptiloc.exe 4760 devoptiloc.exe 312 sysxbod.exe 312 sysxbod.exe 4760 devoptiloc.exe 4760 devoptiloc.exe 312 sysxbod.exe 312 sysxbod.exe 4760 devoptiloc.exe 4760 devoptiloc.exe 312 sysxbod.exe 312 sysxbod.exe 4760 devoptiloc.exe 4760 devoptiloc.exe 312 sysxbod.exe 312 sysxbod.exe 4760 devoptiloc.exe 4760 devoptiloc.exe 312 sysxbod.exe 312 sysxbod.exe 4760 devoptiloc.exe 4760 devoptiloc.exe 312 sysxbod.exe 312 sysxbod.exe 4760 devoptiloc.exe 4760 devoptiloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3312 wrote to memory of 312 3312 39483dccedf6b9d8a49f6ed8979adea12f338d1199bfa906366ee9449cdab8a9N.exe 89 PID 3312 wrote to memory of 312 3312 39483dccedf6b9d8a49f6ed8979adea12f338d1199bfa906366ee9449cdab8a9N.exe 89 PID 3312 wrote to memory of 312 3312 39483dccedf6b9d8a49f6ed8979adea12f338d1199bfa906366ee9449cdab8a9N.exe 89 PID 3312 wrote to memory of 4760 3312 39483dccedf6b9d8a49f6ed8979adea12f338d1199bfa906366ee9449cdab8a9N.exe 92 PID 3312 wrote to memory of 4760 3312 39483dccedf6b9d8a49f6ed8979adea12f338d1199bfa906366ee9449cdab8a9N.exe 92 PID 3312 wrote to memory of 4760 3312 39483dccedf6b9d8a49f6ed8979adea12f338d1199bfa906366ee9449cdab8a9N.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\39483dccedf6b9d8a49f6ed8979adea12f338d1199bfa906366ee9449cdab8a9N.exe"C:\Users\Admin\AppData\Local\Temp\39483dccedf6b9d8a49f6ed8979adea12f338d1199bfa906366ee9449cdab8a9N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxbod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:312
-
-
C:\IntelprocQH\devoptiloc.exeC:\IntelprocQH\devoptiloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5ea334fb438a14a2c079d28d160e87a53
SHA1faf9cf6efc3a5b39f9488c490d7556641f10e225
SHA256237305472c0ae45b5757d06b23a92a907991e0ba0118e597abbacf3bec931086
SHA512d1683b0964c94aa4150d01972abb40e3a9671a1c4a35a5517780708024542ef266328330c10e3082f28e1b6c5df9b9fa29b464b2c08f668b341cc72d478c2765
-
Filesize
3.4MB
MD5f7932f409a4d1d7b5ac7a673b8ed07e6
SHA1e8eacf11f255facb86336c6c5650c598e62147f2
SHA25669c1cba0dc8d25bcf6f50198c104caf375d72e7259179a0e065d14a12b8e660b
SHA512473062ff117b847ce9ee20ec3b024f6abb5ab5683bc0c30baa94af4a57b567414e0a17709df6c6b72e498e07e02fabe46f2f30a8138d939d8fb89034a0ef13c2
-
Filesize
3.4MB
MD5094f14483fae6378f1ed97e0b19b6d48
SHA129b8f956cad64f5f05f59910a3ca5019c8644ca7
SHA2564fb3b6bcafbd8baa0e8b660389a101d619e2cbbe5a7478bc5ce085bf0e997f3f
SHA51217757512ff641016d514f04c8e126d19cfab80cff846d33c9a1b465652e3f0f89072e7e2eb0a114374c49877c1fa8f1a8714a00112538b8f3103b666d6a956b5
-
Filesize
208B
MD574d2e7f734d21bd2eb747810427160d3
SHA10f4e1b78f4e81dff8da5684e942109809d86dd54
SHA25643b4005affaba6590c94114a3c1013eeb5885cbabb58d6842ee51a89f20e52e3
SHA512f741e3d16e9378bcec3cff0df3020410d2b9684619c723ef03f3524ca820a93b4cf66ecb73873c463e11c56f641de42831a47a84d94e1fa1e6ee14b1463196ed
-
Filesize
176B
MD58b4b5f5006a08cb48b7101a2f24a57c4
SHA1e48dce014384054c7e3cbac572b625aa0b58c3ab
SHA2560ec8e8cc708fced01a22590fbe5b68265070bbbb0a3338085d36f49da63be611
SHA5127a8c4cfc296735246e6f51c97d7e91beef4c15f26545c4ef1ebec172f348ab2a75f682200f8ec5995acbd1b326b38fb5d08cd758e72376b2ae5fdc023a73c5d2
-
Filesize
3.4MB
MD503b24bef3888918716834719836dc903
SHA1145f26e1bf5b3c622e23170b0624eb43c3aeae92
SHA25697c1b6350ca75c4344bb1d029dbfa57a5ea80cf494a77d8a5bd128a7df0bf5f2
SHA512981f786f94a1a1b65e02ebf5096c71e57e2b37e492ef5c642d52760989c1859ab52f08f7b0d886ef3b8fe91a1d7d8883abfffe4ed0ececcb2d041ca020b05482