Analysis

  • max time kernel
    149s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 03:36

General

  • Target

    c6bd9b3d4e67988b468bb3d3af355710a9324791fbdfdcb540ed6c9254e57701.exe

  • Size

    2.6MB

  • MD5

    0bb555e0ed8ece8c7c84afe427529665

  • SHA1

    c94aec32a6ce6d8423ed02ca1ca8a3915ff34724

  • SHA256

    c6bd9b3d4e67988b468bb3d3af355710a9324791fbdfdcb540ed6c9254e57701

  • SHA512

    53bbbac1eba57dd984473f8cfe016aa982b46a1c13af5f1888810dea2f1d8f27d33e5557444831d887be65dfdd74ead7b7139fbf0ef5a7f2af5c30f040a89d9e

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB1B/bS:sxX7QnxrloE5dpUpOb

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6bd9b3d4e67988b468bb3d3af355710a9324791fbdfdcb540ed6c9254e57701.exe
    "C:\Users\Admin\AppData\Local\Temp\c6bd9b3d4e67988b468bb3d3af355710a9324791fbdfdcb540ed6c9254e57701.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxdob.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxdob.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2892
    • C:\IntelprocDA\devoptiloc.exe
      C:\IntelprocDA\devoptiloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\IntelprocDA\devoptiloc.exe

    Filesize

    2.6MB

    MD5

    4d38fe69ab007ddb0a062f001bd120e5

    SHA1

    c225c8320ff0f270e22e53b2da21ee3d5d292090

    SHA256

    4f8620e9ec4a332e77847c785843a707f054182336ea7e31bc60b766a9be7249

    SHA512

    b3a9d12974afd6419fbc0ed9cd4cbb1f86f26ae751defb3f28fed5fd08a0857de46c11cf894ce93067e60b903595e5e4e74138ea0a119f79f4893be7104d8962

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    177B

    MD5

    246990f3df5ee902e609070782234d87

    SHA1

    baa7294ec0b081c8a4afbd3b3b5d3ae883b6378d

    SHA256

    ef07da7d2ec485faf199040633d4cc2410c586d5c01d49e8d0ee70b6c0eea449

    SHA512

    388f423f0be98c33e94798f3b5fc63912a77a099b78baa1096d5b4dc98fb7408f97d09f0e0ba16b04dcb734039057158b5c7a99a6a1f7df567bcf71d6534998c

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    209B

    MD5

    17e1756e81b9ccbd5c8310a1eb95a4c7

    SHA1

    a0daa095a6c26c89e6463218152c376cb5f13997

    SHA256

    ad90ab695789e54adbda35b86076ffa560ca798d5dc90a4dbe4315c0fb30a4c0

    SHA512

    c8bca9425ca12f4ad860601dae79645469997215746b9ddc1b246eb23de3430bb88ab95d5b823f28acb23c697a4d951fbc9ba2cbf6dfd7f644e9a3af159ba776

  • C:\VidOV\optidevloc.exe

    Filesize

    2.6MB

    MD5

    49f0cee9750f35b74a928ba0e78cf379

    SHA1

    4354315d612d7afad6a9ff73922dc135ebec6080

    SHA256

    dea996ec743fd70a67c41486d7556864d8916b35f03232ad38d04a3a5dd33834

    SHA512

    1ff434df4ca407889a2619bd3eef2d3fc079c53116732e44114b9e079e208daf727e85d9ca03857b18ccea62719032e94574e52a23312f61dcb568a3a21a4886

  • C:\VidOV\optidevloc.exe

    Filesize

    2.6MB

    MD5

    46d6dbc796855cdaa6ceacb2abcfa976

    SHA1

    5d3b898367d563977d393db23cefa7bc5e1af262

    SHA256

    f611c366a991df8018f1d5e899f4e5a14f98a89cda181451843452baa3f76f76

    SHA512

    44c838763953ac745b66144fff0e6289da4b72b50944e2be46ab815915652f02731b56eee70af57408cbaedadd35961b79eccbfe7cefe7178cda7dc11ec82ea6

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxdob.exe

    Filesize

    2.6MB

    MD5

    f7e0c371a1733d27446e07449c687fff

    SHA1

    e590139d88b23c63a5890f63e05ae54950a12b94

    SHA256

    39f7832e41f40b4bacb903dcda0404a7a839cd41c73d04af4125560a92870f08

    SHA512

    5e17ac2bd52fae2c59424f2a9e012c730264facc9184b90ddca378d09b59cffb5d9268e78bb3c55bdfb22810188d9b5b7d17b94426ed07edba88421cd5851694