Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 19:30
Static task
static1
Behavioral task
behavioral1
Sample
28a21b8d4d1d93478860f76cc9360d76497870757f9137528b2345ab4bf57f9f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
28a21b8d4d1d93478860f76cc9360d76497870757f9137528b2345ab4bf57f9f.exe
Resource
win10v2004-20241007-en
General
-
Target
28a21b8d4d1d93478860f76cc9360d76497870757f9137528b2345ab4bf57f9f.exe
-
Size
2.6MB
-
MD5
f209c846e1a1b20508b5fe51356ec156
-
SHA1
7bca8a1428780dd829507ed882072dd4476cb802
-
SHA256
28a21b8d4d1d93478860f76cc9360d76497870757f9137528b2345ab4bf57f9f
-
SHA512
7f6cb697759e3da1e7843f547d6fc1fad50cd4a9a912123239ef20984e93a10a4e2179ae220defb7e9169a7f6ab4bd5b3404633e9b9bdda5a81452d3fa6a42fb
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBpB/bS2:sxX7QnxrloE5dpUp+bP
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxdob.exe 28a21b8d4d1d93478860f76cc9360d76497870757f9137528b2345ab4bf57f9f.exe -
Executes dropped EXE 2 IoCs
pid Process 1996 sysxdob.exe 4076 abodec.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBZL\\optialoc.exe" 28a21b8d4d1d93478860f76cc9360d76497870757f9137528b2345ab4bf57f9f.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Intelproc32\\abodec.exe" 28a21b8d4d1d93478860f76cc9360d76497870757f9137528b2345ab4bf57f9f.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysxdob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abodec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28a21b8d4d1d93478860f76cc9360d76497870757f9137528b2345ab4bf57f9f.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4732 28a21b8d4d1d93478860f76cc9360d76497870757f9137528b2345ab4bf57f9f.exe 4732 28a21b8d4d1d93478860f76cc9360d76497870757f9137528b2345ab4bf57f9f.exe 4732 28a21b8d4d1d93478860f76cc9360d76497870757f9137528b2345ab4bf57f9f.exe 4732 28a21b8d4d1d93478860f76cc9360d76497870757f9137528b2345ab4bf57f9f.exe 1996 sysxdob.exe 1996 sysxdob.exe 4076 abodec.exe 4076 abodec.exe 1996 sysxdob.exe 1996 sysxdob.exe 4076 abodec.exe 4076 abodec.exe 1996 sysxdob.exe 1996 sysxdob.exe 4076 abodec.exe 4076 abodec.exe 1996 sysxdob.exe 1996 sysxdob.exe 4076 abodec.exe 4076 abodec.exe 1996 sysxdob.exe 1996 sysxdob.exe 4076 abodec.exe 4076 abodec.exe 1996 sysxdob.exe 1996 sysxdob.exe 4076 abodec.exe 4076 abodec.exe 1996 sysxdob.exe 1996 sysxdob.exe 4076 abodec.exe 4076 abodec.exe 1996 sysxdob.exe 1996 sysxdob.exe 4076 abodec.exe 4076 abodec.exe 1996 sysxdob.exe 1996 sysxdob.exe 4076 abodec.exe 4076 abodec.exe 1996 sysxdob.exe 1996 sysxdob.exe 4076 abodec.exe 4076 abodec.exe 1996 sysxdob.exe 1996 sysxdob.exe 4076 abodec.exe 4076 abodec.exe 1996 sysxdob.exe 1996 sysxdob.exe 4076 abodec.exe 4076 abodec.exe 1996 sysxdob.exe 1996 sysxdob.exe 4076 abodec.exe 4076 abodec.exe 1996 sysxdob.exe 1996 sysxdob.exe 4076 abodec.exe 4076 abodec.exe 1996 sysxdob.exe 1996 sysxdob.exe 4076 abodec.exe 4076 abodec.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4732 wrote to memory of 1996 4732 28a21b8d4d1d93478860f76cc9360d76497870757f9137528b2345ab4bf57f9f.exe 86 PID 4732 wrote to memory of 1996 4732 28a21b8d4d1d93478860f76cc9360d76497870757f9137528b2345ab4bf57f9f.exe 86 PID 4732 wrote to memory of 1996 4732 28a21b8d4d1d93478860f76cc9360d76497870757f9137528b2345ab4bf57f9f.exe 86 PID 4732 wrote to memory of 4076 4732 28a21b8d4d1d93478860f76cc9360d76497870757f9137528b2345ab4bf57f9f.exe 89 PID 4732 wrote to memory of 4076 4732 28a21b8d4d1d93478860f76cc9360d76497870757f9137528b2345ab4bf57f9f.exe 89 PID 4732 wrote to memory of 4076 4732 28a21b8d4d1d93478860f76cc9360d76497870757f9137528b2345ab4bf57f9f.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\28a21b8d4d1d93478860f76cc9360d76497870757f9137528b2345ab4bf57f9f.exe"C:\Users\Admin\AppData\Local\Temp\28a21b8d4d1d93478860f76cc9360d76497870757f9137528b2345ab4bf57f9f.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxdob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxdob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
-
C:\Intelproc32\abodec.exeC:\Intelproc32\abodec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD582ebf7840cfe0255068c47ca40828333
SHA1cf736c602e876b30c6bf84d8cef5c1f6373a7970
SHA25601577d122a1a888b3305e48a57e78ce49088f2617c633badd84c66400b7460b1
SHA5123127b4cf857614070fc5812a4483d83d2c897b2214d4d3a287cf35a25de1c09da3ff109ff60038d88d4deba1be71a633fd8d1388faff53d9345239bb9536c169
-
Filesize
2.6MB
MD52b8b42826b0d59fc301a21d538d2f876
SHA1e565b905007cad51e13fe5c5cfe2f054a557248b
SHA25629d0656d0867e9a09369c0489b432ffd1de0cd622bb5a136c0305907b3317fd3
SHA512176612ccce496d6cf90715629a8489d56af333440993ce43c056027813826d2e9dc021fdd3ccd33b45b85270b5442297fd4b71a74ce2545ec7a59e4d8f8a4094
-
Filesize
1.4MB
MD57c5963517e2b0213795f7145ac9ae382
SHA1f522a567638cea28dbe1b98345586bd606bd5a74
SHA256c03d3900a97973c09bd7953f0d57f06b34340eb808452cf0d9682ecc37b8d10b
SHA5126e375f554be013555dae46698989a251f08b8e99b78f9cce64e838dfb39fbd71eccdc27967c08ea1477d8dc6baba8e1c1db4395735866c4046b21d3d5c3519be
-
Filesize
2.0MB
MD50318746f864b174d9bb3ffc362703be1
SHA10bf6fe313bacec1636cfadbbf571e2e378f299c8
SHA256a20ff5eec11f5a402bfda37dea463477654155c84955c1b1f2d819bd50809a27
SHA5121497298e29524f1843a8a7f7baa520708347dc5f7c387436074be29230ff2411073f89d92ce17e1cad7037c08f33df5df9ab7cec2794d1c49a3b596446c1190c
-
Filesize
204B
MD59adb4fe3cc2b6f0d5d7692c3b3b93265
SHA1c6d0f18f7dc475d28158a671309403e5865ced46
SHA2560211a76fdaf18480b0e1f5bb69bf7db8981cee20534bbe309615d451add2e42e
SHA5127ca8212e66a37949e9a449cccb2d42a90c34cb4a250f62237f0353e4180d93b7a31eec5492ca90b2cee99144833bbe66e4a99b695ad27cb41e60ab18fa165c22
-
Filesize
172B
MD520bd4d521be1a5848d7b290d90c83995
SHA136970e12eb5b607940aa4dca37dfe7a81ad13138
SHA256612898694fb94b9ad14fad9d159e148ecd017f44c399cb91b03e35baf5484791
SHA512e7ad6a9848267bc45158848a1152ef2f0f354ebca6251fc27d8b2764843e209782a5c4c5f16f6774276525ec49e39f3d780d7cf33b6dd628c4e3438632f93f64
-
Filesize
2.6MB
MD551af1dc6179bed15fad97df238d0211b
SHA1f66d1c381a197798022727688a4f52223606d530
SHA256d407944c78c507dbc12eea009ca52c95530bd718c949b169faed3656accc81f5
SHA512b89c20d455a27e03bf94222a167c669aad8f96d02755ef6f9c331036a034183d6a54da7468fc72545fc9ef7a7639b99d57487f66648b005267b42e8d4b1f803a