Analysis

  • max time kernel
    119s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 19:30

General

  • Target

    28a21b8d4d1d93478860f76cc9360d76497870757f9137528b2345ab4bf57f9f.exe

  • Size

    2.6MB

  • MD5

    f209c846e1a1b20508b5fe51356ec156

  • SHA1

    7bca8a1428780dd829507ed882072dd4476cb802

  • SHA256

    28a21b8d4d1d93478860f76cc9360d76497870757f9137528b2345ab4bf57f9f

  • SHA512

    7f6cb697759e3da1e7843f547d6fc1fad50cd4a9a912123239ef20984e93a10a4e2179ae220defb7e9169a7f6ab4bd5b3404633e9b9bdda5a81452d3fa6a42fb

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBpB/bS2:sxX7QnxrloE5dpUp+bP

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28a21b8d4d1d93478860f76cc9360d76497870757f9137528b2345ab4bf57f9f.exe
    "C:\Users\Admin\AppData\Local\Temp\28a21b8d4d1d93478860f76cc9360d76497870757f9137528b2345ab4bf57f9f.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4732
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxdob.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxdob.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1996
    • C:\Intelproc32\abodec.exe
      C:\Intelproc32\abodec.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Intelproc32\abodec.exe

    Filesize

    1.7MB

    MD5

    82ebf7840cfe0255068c47ca40828333

    SHA1

    cf736c602e876b30c6bf84d8cef5c1f6373a7970

    SHA256

    01577d122a1a888b3305e48a57e78ce49088f2617c633badd84c66400b7460b1

    SHA512

    3127b4cf857614070fc5812a4483d83d2c897b2214d4d3a287cf35a25de1c09da3ff109ff60038d88d4deba1be71a633fd8d1388faff53d9345239bb9536c169

  • C:\Intelproc32\abodec.exe

    Filesize

    2.6MB

    MD5

    2b8b42826b0d59fc301a21d538d2f876

    SHA1

    e565b905007cad51e13fe5c5cfe2f054a557248b

    SHA256

    29d0656d0867e9a09369c0489b432ffd1de0cd622bb5a136c0305907b3317fd3

    SHA512

    176612ccce496d6cf90715629a8489d56af333440993ce43c056027813826d2e9dc021fdd3ccd33b45b85270b5442297fd4b71a74ce2545ec7a59e4d8f8a4094

  • C:\KaVBZL\optialoc.exe

    Filesize

    1.4MB

    MD5

    7c5963517e2b0213795f7145ac9ae382

    SHA1

    f522a567638cea28dbe1b98345586bd606bd5a74

    SHA256

    c03d3900a97973c09bd7953f0d57f06b34340eb808452cf0d9682ecc37b8d10b

    SHA512

    6e375f554be013555dae46698989a251f08b8e99b78f9cce64e838dfb39fbd71eccdc27967c08ea1477d8dc6baba8e1c1db4395735866c4046b21d3d5c3519be

  • C:\KaVBZL\optialoc.exe

    Filesize

    2.0MB

    MD5

    0318746f864b174d9bb3ffc362703be1

    SHA1

    0bf6fe313bacec1636cfadbbf571e2e378f299c8

    SHA256

    a20ff5eec11f5a402bfda37dea463477654155c84955c1b1f2d819bd50809a27

    SHA512

    1497298e29524f1843a8a7f7baa520708347dc5f7c387436074be29230ff2411073f89d92ce17e1cad7037c08f33df5df9ab7cec2794d1c49a3b596446c1190c

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    204B

    MD5

    9adb4fe3cc2b6f0d5d7692c3b3b93265

    SHA1

    c6d0f18f7dc475d28158a671309403e5865ced46

    SHA256

    0211a76fdaf18480b0e1f5bb69bf7db8981cee20534bbe309615d451add2e42e

    SHA512

    7ca8212e66a37949e9a449cccb2d42a90c34cb4a250f62237f0353e4180d93b7a31eec5492ca90b2cee99144833bbe66e4a99b695ad27cb41e60ab18fa165c22

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    172B

    MD5

    20bd4d521be1a5848d7b290d90c83995

    SHA1

    36970e12eb5b607940aa4dca37dfe7a81ad13138

    SHA256

    612898694fb94b9ad14fad9d159e148ecd017f44c399cb91b03e35baf5484791

    SHA512

    e7ad6a9848267bc45158848a1152ef2f0f354ebca6251fc27d8b2764843e209782a5c4c5f16f6774276525ec49e39f3d780d7cf33b6dd628c4e3438632f93f64

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxdob.exe

    Filesize

    2.6MB

    MD5

    51af1dc6179bed15fad97df238d0211b

    SHA1

    f66d1c381a197798022727688a4f52223606d530

    SHA256

    d407944c78c507dbc12eea009ca52c95530bd718c949b169faed3656accc81f5

    SHA512

    b89c20d455a27e03bf94222a167c669aad8f96d02755ef6f9c331036a034183d6a54da7468fc72545fc9ef7a7639b99d57487f66648b005267b42e8d4b1f803a