Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 19:41
Static task
static1
Behavioral task
behavioral1
Sample
1c038320a600ab6050f491ec728a001d86e7ca1d0594ba252651cfb9baf5e0aa.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1c038320a600ab6050f491ec728a001d86e7ca1d0594ba252651cfb9baf5e0aa.exe
Resource
win10v2004-20241007-en
General
-
Target
1c038320a600ab6050f491ec728a001d86e7ca1d0594ba252651cfb9baf5e0aa.exe
-
Size
2.6MB
-
MD5
83d78da539fa8f040ecef3a80c8fe5b3
-
SHA1
e1d6f12477524a14099ee0c1cdfc2d1ee5b0dcc4
-
SHA256
1c038320a600ab6050f491ec728a001d86e7ca1d0594ba252651cfb9baf5e0aa
-
SHA512
1d35ea309d8416b92081d370b4f7ff9712d788d8ce7dbe77385c10aa0213ef10145c243e5adee53fd79b3ffca696ba0a28597cb64c39ccb1c25145fb8d97e5be
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBtB/bSq/:sxX7QnxrloE5dpUpGbV/
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevbod.exe 1c038320a600ab6050f491ec728a001d86e7ca1d0594ba252651cfb9baf5e0aa.exe -
Executes dropped EXE 2 IoCs
pid Process 2172 sysdevbod.exe 2908 adobloc.exe -
Loads dropped DLL 2 IoCs
pid Process 1128 1c038320a600ab6050f491ec728a001d86e7ca1d0594ba252651cfb9baf5e0aa.exe 1128 1c038320a600ab6050f491ec728a001d86e7ca1d0594ba252651cfb9baf5e0aa.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesZ7\\adobloc.exe" 1c038320a600ab6050f491ec728a001d86e7ca1d0594ba252651cfb9baf5e0aa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidSP\\optixloc.exe" 1c038320a600ab6050f491ec728a001d86e7ca1d0594ba252651cfb9baf5e0aa.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c038320a600ab6050f491ec728a001d86e7ca1d0594ba252651cfb9baf5e0aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysdevbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1128 1c038320a600ab6050f491ec728a001d86e7ca1d0594ba252651cfb9baf5e0aa.exe 1128 1c038320a600ab6050f491ec728a001d86e7ca1d0594ba252651cfb9baf5e0aa.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe 2172 sysdevbod.exe 2908 adobloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1128 wrote to memory of 2172 1128 1c038320a600ab6050f491ec728a001d86e7ca1d0594ba252651cfb9baf5e0aa.exe 30 PID 1128 wrote to memory of 2172 1128 1c038320a600ab6050f491ec728a001d86e7ca1d0594ba252651cfb9baf5e0aa.exe 30 PID 1128 wrote to memory of 2172 1128 1c038320a600ab6050f491ec728a001d86e7ca1d0594ba252651cfb9baf5e0aa.exe 30 PID 1128 wrote to memory of 2172 1128 1c038320a600ab6050f491ec728a001d86e7ca1d0594ba252651cfb9baf5e0aa.exe 30 PID 1128 wrote to memory of 2908 1128 1c038320a600ab6050f491ec728a001d86e7ca1d0594ba252651cfb9baf5e0aa.exe 31 PID 1128 wrote to memory of 2908 1128 1c038320a600ab6050f491ec728a001d86e7ca1d0594ba252651cfb9baf5e0aa.exe 31 PID 1128 wrote to memory of 2908 1128 1c038320a600ab6050f491ec728a001d86e7ca1d0594ba252651cfb9baf5e0aa.exe 31 PID 1128 wrote to memory of 2908 1128 1c038320a600ab6050f491ec728a001d86e7ca1d0594ba252651cfb9baf5e0aa.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c038320a600ab6050f491ec728a001d86e7ca1d0594ba252651cfb9baf5e0aa.exe"C:\Users\Admin\AppData\Local\Temp\1c038320a600ab6050f491ec728a001d86e7ca1d0594ba252651cfb9baf5e0aa.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevbod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2172
-
-
C:\FilesZ7\adobloc.exeC:\FilesZ7\adobloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD531b70b77caadabdbebaf9f5721c009b7
SHA13af33cb56bc73f18d4880350a2b5f6f52fdb2490
SHA2561f1ec0689a162e4e8934fdb8b9816e236ab9dc8c4abaf27fa1e77122fb9090cf
SHA5123e342b4345af5f9f50eb84014080893d05f9b43b7d9801a8075c7f4383dc34fb5270682753a8a1a7a6bbb990115bdc079eff0ec492ace85892c9740ae563823d
-
Filesize
170B
MD5c4ad7782cc82358f4feeabc1894ed067
SHA1ca64cd27378f7e5ba9a6e517d570b5842226df23
SHA256d0c958dee8bca0e5eae85edf5f5f0c62ca36dcc9c4677c381d1542337171fb6d
SHA512c0baf2c73e5a28a7f46ac2054f70e51c3bf6672e64eff10c13e4ac799a5adf69bbe7fff23e30a7751645fc3bf3968a4ff91f52ce0718d714f090ac9de7b1da3d
-
Filesize
202B
MD5fa8f9e3b9690acb650ab522a8dd9d71a
SHA1239997da01760b76103355bd828265a1dc7e3e88
SHA256425aa457c9ff016213c70e331abbcf83a2cc14d3b4d0a11fb89615fc7abb8a97
SHA512143307e067b75aa25f089920ed547e56ac2b7e3ba009838dfbba36ab96c2521511b1cac60e5d825f21d892089dd7d5cf7fd35cec852bd54b5d1994f3c0729cc0
-
Filesize
2.6MB
MD54d931283afd7228b1ba8bbcb350d20aa
SHA193737ecb1f7844ff469d32823a7ccb0f95278da6
SHA256d9d27115eef9439f0ec86290ae9b957cc68687e3dfe2924f14d2f9f62aa909d0
SHA512e5b942c516baa511a9315bb9d26e3cab10c8cefe91bea8718fd6d2e94816d336e04da5402437069882222cab0c87453de91124f61271d6f7c502279d2e2e8f8a
-
Filesize
2.6MB
MD554fc4c2d0dfa3c7c66fc039fa6dc4ddb
SHA1df5295e7eb079bb6e18363a466fa6dff39b4131c
SHA25614e19c92603e6f38f2a08fd9bafe3fd5317b417bb60dca4c726071304c83a95a
SHA51245364b9203d14612b433c841ec37c6ac19aaac9a3231d8045ad648c084e8b7d5b2d72493f5ee79c2ee2aef046ac86a56258c49ef4b30910a42e1b62cdb125594
-
Filesize
2.6MB
MD57d63ddfc1aa1e6ea55d6e160a5804caf
SHA1b7136289f5f3c8451bbe22d7115c77ffca15e64b
SHA2564409c4c9d0fc284416c847bb7b105de782bf7b6d698d434a31b494049a69c0e0
SHA51242bad2d1922a0fffaeea4cc32aac4645b2660891d53b032142c593745a3adc0a6590bd8a2524b5ad31814f780d9196ba0c0ece43529fa24fcb728cabefbb8256