Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
83fb7c417e544ceb18fcabe8d7a7f3e5558628f8f9151d07fd8b3371e04189c0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
83fb7c417e544ceb18fcabe8d7a7f3e5558628f8f9151d07fd8b3371e04189c0.exe
Resource
win10v2004-20241007-en
General
-
Target
83fb7c417e544ceb18fcabe8d7a7f3e5558628f8f9151d07fd8b3371e04189c0.exe
-
Size
2.6MB
-
MD5
a5d4a8bde0f1c82bdc3eb9b10dbd2145
-
SHA1
43c91b1b5120b064440ea82e24fb645d82f78276
-
SHA256
83fb7c417e544ceb18fcabe8d7a7f3e5558628f8f9151d07fd8b3371e04189c0
-
SHA512
a18db9e07bf4f88d7551fdfe3b6b3c6e7470ceaf41d7e31b7e72076dbdadb23498980b25be481a4832efcd18d68c7a427d825fdf4ed31bffd2f443211a612fdb
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBvB/bSi:sxX7QnxrloE5dpUpIbl
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe 83fb7c417e544ceb18fcabe8d7a7f3e5558628f8f9151d07fd8b3371e04189c0.exe -
Executes dropped EXE 2 IoCs
pid Process 1120 locadob.exe 1428 xoptiloc.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesNL\\xoptiloc.exe" 83fb7c417e544ceb18fcabe8d7a7f3e5558628f8f9151d07fd8b3371e04189c0.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidU6\\dobxec.exe" 83fb7c417e544ceb18fcabe8d7a7f3e5558628f8f9151d07fd8b3371e04189c0.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locadob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xoptiloc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 83fb7c417e544ceb18fcabe8d7a7f3e5558628f8f9151d07fd8b3371e04189c0.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1076 83fb7c417e544ceb18fcabe8d7a7f3e5558628f8f9151d07fd8b3371e04189c0.exe 1076 83fb7c417e544ceb18fcabe8d7a7f3e5558628f8f9151d07fd8b3371e04189c0.exe 1076 83fb7c417e544ceb18fcabe8d7a7f3e5558628f8f9151d07fd8b3371e04189c0.exe 1076 83fb7c417e544ceb18fcabe8d7a7f3e5558628f8f9151d07fd8b3371e04189c0.exe 1120 locadob.exe 1120 locadob.exe 1428 xoptiloc.exe 1428 xoptiloc.exe 1120 locadob.exe 1120 locadob.exe 1428 xoptiloc.exe 1428 xoptiloc.exe 1120 locadob.exe 1120 locadob.exe 1428 xoptiloc.exe 1428 xoptiloc.exe 1120 locadob.exe 1120 locadob.exe 1428 xoptiloc.exe 1428 xoptiloc.exe 1120 locadob.exe 1120 locadob.exe 1428 xoptiloc.exe 1428 xoptiloc.exe 1120 locadob.exe 1120 locadob.exe 1428 xoptiloc.exe 1428 xoptiloc.exe 1120 locadob.exe 1120 locadob.exe 1428 xoptiloc.exe 1428 xoptiloc.exe 1120 locadob.exe 1120 locadob.exe 1428 xoptiloc.exe 1428 xoptiloc.exe 1120 locadob.exe 1120 locadob.exe 1428 xoptiloc.exe 1428 xoptiloc.exe 1120 locadob.exe 1120 locadob.exe 1428 xoptiloc.exe 1428 xoptiloc.exe 1120 locadob.exe 1120 locadob.exe 1428 xoptiloc.exe 1428 xoptiloc.exe 1120 locadob.exe 1120 locadob.exe 1428 xoptiloc.exe 1428 xoptiloc.exe 1120 locadob.exe 1120 locadob.exe 1428 xoptiloc.exe 1428 xoptiloc.exe 1120 locadob.exe 1120 locadob.exe 1428 xoptiloc.exe 1428 xoptiloc.exe 1120 locadob.exe 1120 locadob.exe 1428 xoptiloc.exe 1428 xoptiloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1076 wrote to memory of 1120 1076 83fb7c417e544ceb18fcabe8d7a7f3e5558628f8f9151d07fd8b3371e04189c0.exe 87 PID 1076 wrote to memory of 1120 1076 83fb7c417e544ceb18fcabe8d7a7f3e5558628f8f9151d07fd8b3371e04189c0.exe 87 PID 1076 wrote to memory of 1120 1076 83fb7c417e544ceb18fcabe8d7a7f3e5558628f8f9151d07fd8b3371e04189c0.exe 87 PID 1076 wrote to memory of 1428 1076 83fb7c417e544ceb18fcabe8d7a7f3e5558628f8f9151d07fd8b3371e04189c0.exe 90 PID 1076 wrote to memory of 1428 1076 83fb7c417e544ceb18fcabe8d7a7f3e5558628f8f9151d07fd8b3371e04189c0.exe 90 PID 1076 wrote to memory of 1428 1076 83fb7c417e544ceb18fcabe8d7a7f3e5558628f8f9151d07fd8b3371e04189c0.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\83fb7c417e544ceb18fcabe8d7a7f3e5558628f8f9151d07fd8b3371e04189c0.exe"C:\Users\Admin\AppData\Local\Temp\83fb7c417e544ceb18fcabe8d7a7f3e5558628f8f9151d07fd8b3371e04189c0.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1120
-
-
C:\FilesNL\xoptiloc.exeC:\FilesNL\xoptiloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
455KB
MD5f420d92f829bd3a1a92d4f0361a597bd
SHA18e41451beb4f579a8ac1253f1b36c05b5cf43cfe
SHA256213ac42267330a06c89fd3635fac8b7bf1f7fe27de009bf426458d661afddce9
SHA512b726cd061128f5e4102a91121e484d90b65dafad066c5b5d00364243fcb2bafa0cb91931418472ccb6bc361df8e7f32c2cd37630b41198606a636f11938e0dc3
-
Filesize
2.6MB
MD571eef4796e71c6bc8b30a46c36a03edd
SHA1a1430c86e154531b38741cd658a93d353f853677
SHA256f600f8b24f4ac5a30670b3ba3ab2a9e615405bfbe37da45b2571bb3a177526aa
SHA5123be74c2e8024b2cc81aa9166c71af26f3a5187f87e0788538dcb12c90347d71c09eae862a533b5afe31886309725ac0f64b22d44263d8e4a195758fe160747cd
-
Filesize
199B
MD58d450c5278e69370596539fbb52f1d92
SHA1efadf7292de97b659a3a2c25cea75b8a79ab7600
SHA25603c9228c5d513f561a9147a638fd9c792739a1db1c609955add33d60a3b2ce33
SHA5121474e2bef270af34e1afab5b7f5611bc32f19a8e422b6498afa8f7cb844233a0e33ab1522500012a34a543ecdb8f2313d9292b65349e50f2e5d7391d54f32f81
-
Filesize
167B
MD5c74fb3a991fd102e060e77e577dc81e9
SHA16335d37e0a29a829857e5e8d1dab86af2a8fb84f
SHA2564c88590da3c9e1b5ce7565a36cac4d84733b4818eaeeb4d4bc304549370c00d1
SHA512b776cec75889ec198fc2d020610e4733a2e02a61050f7265a7f78ad2023f7f304175e9996db6b504612acc096832cf0cc20a2ee2f76edd039b0bdff98f4a23b8
-
Filesize
2.6MB
MD549dc40268f1bca2475096133a950d775
SHA1ae697e3e06d469a319ff22700c8280c57e9808ee
SHA2568ae9034d0458c9ec779ecd57cde1578976c2c622bde28e674fe7a0a285c0537e
SHA512fe069731600ce86301d8c708688d7ba3f268c784d483003ca36c0bb11a722afb7e5b412535f2694ebe61f1e696f73c076e2ecd82b7cf49399724f7e216c16833
-
Filesize
1.1MB
MD5d93844d9c5c6829c9a4f88eb8706a042
SHA1dcb7b8ad585124d360b139a0e9d1f35a011da4e7
SHA256e2a7d665563f2d81e7efa0af6e185c2f23ef1994a9170fbd9604e349603a7e0a
SHA512f5b5e401561e584ddc0c03969ee48b70e82671f9404f33fe697c384e68b6fdf0a477354e2cf58359db45adee535db75200923441f3d023ae1445abf0d6f737a7
-
Filesize
2.6MB
MD5900f80b09b474602df3b42a399d71c3e
SHA1cd35490a10f043d7185ed55833b73e1b0f1ba0d5
SHA256943d2797c805d03b6d0ba3146d774c49846628960b454b04e5e03000d526ebde
SHA512c7e86ca717f9265b013f2329dab59a6c291ba8c4c628861c02dcd22b9d82b10ac31595f093e75f008d8b3e6137e8856a7ce79aa53589300ef4258019bad4e3ab