Analysis
-
max time kernel
149s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 03:36
Static task
static1
Behavioral task
behavioral1
Sample
c6bd9b3d4e67988b468bb3d3af355710a9324791fbdfdcb540ed6c9254e57701.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c6bd9b3d4e67988b468bb3d3af355710a9324791fbdfdcb540ed6c9254e57701.exe
Resource
win10v2004-20241007-en
General
-
Target
c6bd9b3d4e67988b468bb3d3af355710a9324791fbdfdcb540ed6c9254e57701.exe
-
Size
2.6MB
-
MD5
0bb555e0ed8ece8c7c84afe427529665
-
SHA1
c94aec32a6ce6d8423ed02ca1ca8a3915ff34724
-
SHA256
c6bd9b3d4e67988b468bb3d3af355710a9324791fbdfdcb540ed6c9254e57701
-
SHA512
53bbbac1eba57dd984473f8cfe016aa982b46a1c13af5f1888810dea2f1d8f27d33e5557444831d887be65dfdd74ead7b7139fbf0ef5a7f2af5c30f040a89d9e
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB1B/bS:sxX7QnxrloE5dpUpOb
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxdob.exe c6bd9b3d4e67988b468bb3d3af355710a9324791fbdfdcb540ed6c9254e57701.exe -
Executes dropped EXE 2 IoCs
pid Process 2892 locxdob.exe 2856 devoptiloc.exe -
Loads dropped DLL 2 IoCs
pid Process 2936 c6bd9b3d4e67988b468bb3d3af355710a9324791fbdfdcb540ed6c9254e57701.exe 2936 c6bd9b3d4e67988b468bb3d3af355710a9324791fbdfdcb540ed6c9254e57701.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocDA\\devoptiloc.exe" c6bd9b3d4e67988b468bb3d3af355710a9324791fbdfdcb540ed6c9254e57701.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidOV\\optidevloc.exe" c6bd9b3d4e67988b468bb3d3af355710a9324791fbdfdcb540ed6c9254e57701.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c6bd9b3d4e67988b468bb3d3af355710a9324791fbdfdcb540ed6c9254e57701.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locxdob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devoptiloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2936 c6bd9b3d4e67988b468bb3d3af355710a9324791fbdfdcb540ed6c9254e57701.exe 2936 c6bd9b3d4e67988b468bb3d3af355710a9324791fbdfdcb540ed6c9254e57701.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe 2892 locxdob.exe 2856 devoptiloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2892 2936 c6bd9b3d4e67988b468bb3d3af355710a9324791fbdfdcb540ed6c9254e57701.exe 29 PID 2936 wrote to memory of 2892 2936 c6bd9b3d4e67988b468bb3d3af355710a9324791fbdfdcb540ed6c9254e57701.exe 29 PID 2936 wrote to memory of 2892 2936 c6bd9b3d4e67988b468bb3d3af355710a9324791fbdfdcb540ed6c9254e57701.exe 29 PID 2936 wrote to memory of 2892 2936 c6bd9b3d4e67988b468bb3d3af355710a9324791fbdfdcb540ed6c9254e57701.exe 29 PID 2936 wrote to memory of 2856 2936 c6bd9b3d4e67988b468bb3d3af355710a9324791fbdfdcb540ed6c9254e57701.exe 30 PID 2936 wrote to memory of 2856 2936 c6bd9b3d4e67988b468bb3d3af355710a9324791fbdfdcb540ed6c9254e57701.exe 30 PID 2936 wrote to memory of 2856 2936 c6bd9b3d4e67988b468bb3d3af355710a9324791fbdfdcb540ed6c9254e57701.exe 30 PID 2936 wrote to memory of 2856 2936 c6bd9b3d4e67988b468bb3d3af355710a9324791fbdfdcb540ed6c9254e57701.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6bd9b3d4e67988b468bb3d3af355710a9324791fbdfdcb540ed6c9254e57701.exe"C:\Users\Admin\AppData\Local\Temp\c6bd9b3d4e67988b468bb3d3af355710a9324791fbdfdcb540ed6c9254e57701.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxdob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxdob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2892
-
-
C:\IntelprocDA\devoptiloc.exeC:\IntelprocDA\devoptiloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD54d38fe69ab007ddb0a062f001bd120e5
SHA1c225c8320ff0f270e22e53b2da21ee3d5d292090
SHA2564f8620e9ec4a332e77847c785843a707f054182336ea7e31bc60b766a9be7249
SHA512b3a9d12974afd6419fbc0ed9cd4cbb1f86f26ae751defb3f28fed5fd08a0857de46c11cf894ce93067e60b903595e5e4e74138ea0a119f79f4893be7104d8962
-
Filesize
177B
MD5246990f3df5ee902e609070782234d87
SHA1baa7294ec0b081c8a4afbd3b3b5d3ae883b6378d
SHA256ef07da7d2ec485faf199040633d4cc2410c586d5c01d49e8d0ee70b6c0eea449
SHA512388f423f0be98c33e94798f3b5fc63912a77a099b78baa1096d5b4dc98fb7408f97d09f0e0ba16b04dcb734039057158b5c7a99a6a1f7df567bcf71d6534998c
-
Filesize
209B
MD517e1756e81b9ccbd5c8310a1eb95a4c7
SHA1a0daa095a6c26c89e6463218152c376cb5f13997
SHA256ad90ab695789e54adbda35b86076ffa560ca798d5dc90a4dbe4315c0fb30a4c0
SHA512c8bca9425ca12f4ad860601dae79645469997215746b9ddc1b246eb23de3430bb88ab95d5b823f28acb23c697a4d951fbc9ba2cbf6dfd7f644e9a3af159ba776
-
Filesize
2.6MB
MD549f0cee9750f35b74a928ba0e78cf379
SHA14354315d612d7afad6a9ff73922dc135ebec6080
SHA256dea996ec743fd70a67c41486d7556864d8916b35f03232ad38d04a3a5dd33834
SHA5121ff434df4ca407889a2619bd3eef2d3fc079c53116732e44114b9e079e208daf727e85d9ca03857b18ccea62719032e94574e52a23312f61dcb568a3a21a4886
-
Filesize
2.6MB
MD546d6dbc796855cdaa6ceacb2abcfa976
SHA15d3b898367d563977d393db23cefa7bc5e1af262
SHA256f611c366a991df8018f1d5e899f4e5a14f98a89cda181451843452baa3f76f76
SHA51244c838763953ac745b66144fff0e6289da4b72b50944e2be46ab815915652f02731b56eee70af57408cbaedadd35961b79eccbfe7cefe7178cda7dc11ec82ea6
-
Filesize
2.6MB
MD5f7e0c371a1733d27446e07449c687fff
SHA1e590139d88b23c63a5890f63e05ae54950a12b94
SHA25639f7832e41f40b4bacb903dcda0404a7a839cd41c73d04af4125560a92870f08
SHA5125e17ac2bd52fae2c59424f2a9e012c730264facc9184b90ddca378d09b59cffb5d9268e78bb3c55bdfb22810188d9b5b7d17b94426ed07edba88421cd5851694