Analysis
-
max time kernel
119s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 02:44
Static task
static1
Behavioral task
behavioral1
Sample
ccc1a8c837a376ed6b76ea79e3a93ed41e989246ca86a95b6b7cb31a27d3f32fN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ccc1a8c837a376ed6b76ea79e3a93ed41e989246ca86a95b6b7cb31a27d3f32fN.exe
Resource
win10v2004-20241007-en
General
-
Target
ccc1a8c837a376ed6b76ea79e3a93ed41e989246ca86a95b6b7cb31a27d3f32fN.exe
-
Size
2.6MB
-
MD5
eff7b4d48313f3e470f61bdfa5194330
-
SHA1
325331a07cf4b21b447d2acb3850a97af5773759
-
SHA256
ccc1a8c837a376ed6b76ea79e3a93ed41e989246ca86a95b6b7cb31a27d3f32f
-
SHA512
375548ec6177b7639bbfdb3ac022ea08345899239345f5ff0c9ed9dba127d0bbf348b83fc3bfee2fb6267d8c3e11087e0ed2b8d7f81654325c4aae4c47f4aac6
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBaB/bS:sxX7QnxrloE5dpUpFb
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysaopti.exe ccc1a8c837a376ed6b76ea79e3a93ed41e989246ca86a95b6b7cb31a27d3f32fN.exe -
Executes dropped EXE 2 IoCs
pid Process 4192 sysaopti.exe 3356 devbodsys.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotHC\\devbodsys.exe" ccc1a8c837a376ed6b76ea79e3a93ed41e989246ca86a95b6b7cb31a27d3f32fN.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintWX\\bodaec.exe" ccc1a8c837a376ed6b76ea79e3a93ed41e989246ca86a95b6b7cb31a27d3f32fN.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccc1a8c837a376ed6b76ea79e3a93ed41e989246ca86a95b6b7cb31a27d3f32fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysaopti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devbodsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2444 ccc1a8c837a376ed6b76ea79e3a93ed41e989246ca86a95b6b7cb31a27d3f32fN.exe 2444 ccc1a8c837a376ed6b76ea79e3a93ed41e989246ca86a95b6b7cb31a27d3f32fN.exe 2444 ccc1a8c837a376ed6b76ea79e3a93ed41e989246ca86a95b6b7cb31a27d3f32fN.exe 2444 ccc1a8c837a376ed6b76ea79e3a93ed41e989246ca86a95b6b7cb31a27d3f32fN.exe 4192 sysaopti.exe 4192 sysaopti.exe 3356 devbodsys.exe 3356 devbodsys.exe 4192 sysaopti.exe 4192 sysaopti.exe 3356 devbodsys.exe 3356 devbodsys.exe 4192 sysaopti.exe 4192 sysaopti.exe 3356 devbodsys.exe 3356 devbodsys.exe 4192 sysaopti.exe 4192 sysaopti.exe 3356 devbodsys.exe 3356 devbodsys.exe 4192 sysaopti.exe 4192 sysaopti.exe 3356 devbodsys.exe 3356 devbodsys.exe 4192 sysaopti.exe 4192 sysaopti.exe 3356 devbodsys.exe 3356 devbodsys.exe 4192 sysaopti.exe 4192 sysaopti.exe 3356 devbodsys.exe 3356 devbodsys.exe 4192 sysaopti.exe 4192 sysaopti.exe 3356 devbodsys.exe 3356 devbodsys.exe 4192 sysaopti.exe 4192 sysaopti.exe 3356 devbodsys.exe 3356 devbodsys.exe 4192 sysaopti.exe 4192 sysaopti.exe 3356 devbodsys.exe 3356 devbodsys.exe 4192 sysaopti.exe 4192 sysaopti.exe 3356 devbodsys.exe 3356 devbodsys.exe 4192 sysaopti.exe 4192 sysaopti.exe 3356 devbodsys.exe 3356 devbodsys.exe 4192 sysaopti.exe 4192 sysaopti.exe 3356 devbodsys.exe 3356 devbodsys.exe 4192 sysaopti.exe 4192 sysaopti.exe 3356 devbodsys.exe 3356 devbodsys.exe 4192 sysaopti.exe 4192 sysaopti.exe 3356 devbodsys.exe 3356 devbodsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2444 wrote to memory of 4192 2444 ccc1a8c837a376ed6b76ea79e3a93ed41e989246ca86a95b6b7cb31a27d3f32fN.exe 87 PID 2444 wrote to memory of 4192 2444 ccc1a8c837a376ed6b76ea79e3a93ed41e989246ca86a95b6b7cb31a27d3f32fN.exe 87 PID 2444 wrote to memory of 4192 2444 ccc1a8c837a376ed6b76ea79e3a93ed41e989246ca86a95b6b7cb31a27d3f32fN.exe 87 PID 2444 wrote to memory of 3356 2444 ccc1a8c837a376ed6b76ea79e3a93ed41e989246ca86a95b6b7cb31a27d3f32fN.exe 89 PID 2444 wrote to memory of 3356 2444 ccc1a8c837a376ed6b76ea79e3a93ed41e989246ca86a95b6b7cb31a27d3f32fN.exe 89 PID 2444 wrote to memory of 3356 2444 ccc1a8c837a376ed6b76ea79e3a93ed41e989246ca86a95b6b7cb31a27d3f32fN.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccc1a8c837a376ed6b76ea79e3a93ed41e989246ca86a95b6b7cb31a27d3f32fN.exe"C:\Users\Admin\AppData\Local\Temp\ccc1a8c837a376ed6b76ea79e3a93ed41e989246ca86a95b6b7cb31a27d3f32fN.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysaopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysaopti.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4192
-
-
C:\UserDotHC\devbodsys.exeC:\UserDotHC\devbodsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5854d7024d6a3690861a5e13adeeebc56
SHA12ac1cc8c12d24dba6b5be96438f764753e2534af
SHA2567bee14ad9ce88140df4a16649b935961e01da085178d766133129df3d97623d4
SHA51283e4768567adea2aa5df900d4c232d5f8ccf5bfaeb8524a7641aa8d27412adf71a2c90d307b2a7c43f43dbc803b2ee2754ce4035888a928c3543f1c8912422a0
-
Filesize
2.6MB
MD526dd36abdcfb8b493ea5fbcb6b1248ad
SHA17645bf428c33f72b02e7260a7ee339f4c93c86d8
SHA2560c873eafe68360fb87762b9b71623bf0b7d84b4bcf21faa2c4791a5f272d67ab
SHA512071f0062993c3fdcdd2f11b2a642379c3134ecb03bfdaecdfade469c873f8e1dc664d0d1e6dfd09a99746824f17bf011c5b4656594d0e5caa251f4f81020c216
-
Filesize
2.6MB
MD5cebec7ebb873af9b28f6a162507e96a3
SHA16ee807f4f78a9428245aebbac100ab53ecfa7fbc
SHA2567e25c5c3dfb8280eb06c006fc20a9744e04f6daf4232e37746df01db1e0310b9
SHA5121e6c89beb5b2df73497ddf038645b74bfbcabfca1a0c3a743c2f1be2036291e5a41b5d6c75fdd53cb752e97f8aaea715bd8f69247421d5e8daafad05b079d65d
-
Filesize
204B
MD55f4a79b769b013766d2c91d903b339d4
SHA15f707b9c52716fb66bbad87c5b1025dc188adf63
SHA256c100621a3bde495c5bc91390678ccbf9a1f9766aa18606f6823bb3eea9ed2d54
SHA512eea56eb457c491ceececd35fefc23178ba7d9b46503b11498f519f2af665b5e0eb88f8c47d69e9ff019efc2f9d209c6e5897df0c86d1148b83e5910ae7686cb7
-
Filesize
172B
MD5b3861377d940a7e420ca0ac52d7cac88
SHA1d264b47faba522aed8af590ff5626a282ad5f20b
SHA256ddf553f8723e93fb88c0fb9b6e8d10a33b9658092ea242c953e6a18fce12b73f
SHA512767e93e44b70dfed602199f68ca7059162b9ba1f2d4a2f026f28441f4305bb5fc6df7c9bfe8f934a4f49ff2e12c2f80dc69f7b9a3b4fb8068ef9a0968f7dbd76
-
Filesize
2.6MB
MD592c6754b8eaf8c4cd80f700f4a46005c
SHA15ee36fc0ce2157273a40365dc0a99f11ad066775
SHA256ab809d8cd932a3b65c81fe9498904ffbfbaf0bf26ef0ab89179b4c4de1a31768
SHA512ce092474c70edb00fc8126fa628f0970d7bacb53e833641d26d81c9a9730dd4b04e184a619debc4e62ed699ee93ccfc145e33ee1ea88239782bf133c46450718