Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 19:29

General

  • Target

    83fb7c417e544ceb18fcabe8d7a7f3e5558628f8f9151d07fd8b3371e04189c0.exe

  • Size

    2.6MB

  • MD5

    a5d4a8bde0f1c82bdc3eb9b10dbd2145

  • SHA1

    43c91b1b5120b064440ea82e24fb645d82f78276

  • SHA256

    83fb7c417e544ceb18fcabe8d7a7f3e5558628f8f9151d07fd8b3371e04189c0

  • SHA512

    a18db9e07bf4f88d7551fdfe3b6b3c6e7470ceaf41d7e31b7e72076dbdadb23498980b25be481a4832efcd18d68c7a427d825fdf4ed31bffd2f443211a612fdb

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBvB/bSi:sxX7QnxrloE5dpUpIbl

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83fb7c417e544ceb18fcabe8d7a7f3e5558628f8f9151d07fd8b3371e04189c0.exe
    "C:\Users\Admin\AppData\Local\Temp\83fb7c417e544ceb18fcabe8d7a7f3e5558628f8f9151d07fd8b3371e04189c0.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1076
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1120
    • C:\FilesNL\xoptiloc.exe
      C:\FilesNL\xoptiloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\FilesNL\xoptiloc.exe

    Filesize

    455KB

    MD5

    f420d92f829bd3a1a92d4f0361a597bd

    SHA1

    8e41451beb4f579a8ac1253f1b36c05b5cf43cfe

    SHA256

    213ac42267330a06c89fd3635fac8b7bf1f7fe27de009bf426458d661afddce9

    SHA512

    b726cd061128f5e4102a91121e484d90b65dafad066c5b5d00364243fcb2bafa0cb91931418472ccb6bc361df8e7f32c2cd37630b41198606a636f11938e0dc3

  • C:\FilesNL\xoptiloc.exe

    Filesize

    2.6MB

    MD5

    71eef4796e71c6bc8b30a46c36a03edd

    SHA1

    a1430c86e154531b38741cd658a93d353f853677

    SHA256

    f600f8b24f4ac5a30670b3ba3ab2a9e615405bfbe37da45b2571bb3a177526aa

    SHA512

    3be74c2e8024b2cc81aa9166c71af26f3a5187f87e0788538dcb12c90347d71c09eae862a533b5afe31886309725ac0f64b22d44263d8e4a195758fe160747cd

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    199B

    MD5

    8d450c5278e69370596539fbb52f1d92

    SHA1

    efadf7292de97b659a3a2c25cea75b8a79ab7600

    SHA256

    03c9228c5d513f561a9147a638fd9c792739a1db1c609955add33d60a3b2ce33

    SHA512

    1474e2bef270af34e1afab5b7f5611bc32f19a8e422b6498afa8f7cb844233a0e33ab1522500012a34a543ecdb8f2313d9292b65349e50f2e5d7391d54f32f81

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    167B

    MD5

    c74fb3a991fd102e060e77e577dc81e9

    SHA1

    6335d37e0a29a829857e5e8d1dab86af2a8fb84f

    SHA256

    4c88590da3c9e1b5ce7565a36cac4d84733b4818eaeeb4d4bc304549370c00d1

    SHA512

    b776cec75889ec198fc2d020610e4733a2e02a61050f7265a7f78ad2023f7f304175e9996db6b504612acc096832cf0cc20a2ee2f76edd039b0bdff98f4a23b8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe

    Filesize

    2.6MB

    MD5

    49dc40268f1bca2475096133a950d775

    SHA1

    ae697e3e06d469a319ff22700c8280c57e9808ee

    SHA256

    8ae9034d0458c9ec779ecd57cde1578976c2c622bde28e674fe7a0a285c0537e

    SHA512

    fe069731600ce86301d8c708688d7ba3f268c784d483003ca36c0bb11a722afb7e5b412535f2694ebe61f1e696f73c076e2ecd82b7cf49399724f7e216c16833

  • C:\VidU6\dobxec.exe

    Filesize

    1.1MB

    MD5

    d93844d9c5c6829c9a4f88eb8706a042

    SHA1

    dcb7b8ad585124d360b139a0e9d1f35a011da4e7

    SHA256

    e2a7d665563f2d81e7efa0af6e185c2f23ef1994a9170fbd9604e349603a7e0a

    SHA512

    f5b5e401561e584ddc0c03969ee48b70e82671f9404f33fe697c384e68b6fdf0a477354e2cf58359db45adee535db75200923441f3d023ae1445abf0d6f737a7

  • C:\VidU6\dobxec.exe

    Filesize

    2.6MB

    MD5

    900f80b09b474602df3b42a399d71c3e

    SHA1

    cd35490a10f043d7185ed55833b73e1b0f1ba0d5

    SHA256

    943d2797c805d03b6d0ba3146d774c49846628960b454b04e5e03000d526ebde

    SHA512

    c7e86ca717f9265b013f2329dab59a6c291ba8c4c628861c02dcd22b9d82b10ac31595f093e75f008d8b3e6137e8856a7ce79aa53589300ef4258019bad4e3ab