Analysis
-
max time kernel
119s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 03:51
Static task
static1
Behavioral task
behavioral1
Sample
015c43a631c8c9e838a19fa3011344160636652e6aaac6e102e9f157f78d772a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
015c43a631c8c9e838a19fa3011344160636652e6aaac6e102e9f157f78d772a.exe
Resource
win10v2004-20241007-en
General
-
Target
015c43a631c8c9e838a19fa3011344160636652e6aaac6e102e9f157f78d772a.exe
-
Size
2.6MB
-
MD5
6f9d64e55076b08fbc816c60b8ecf3bc
-
SHA1
6a6bfd4c89ca2527a223570a56362cff40071f5e
-
SHA256
015c43a631c8c9e838a19fa3011344160636652e6aaac6e102e9f157f78d772a
-
SHA512
fbf3a000b7995ef29ce533f642af017c5b3d8a27a614166a7ac16d5e36aed5eed5b6a0d608da991c552b4df01f1560aff7f24d5e318cb967a69acef3cd1934eb
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB1B/bSC:sxX7QnxrloE5dpUpCbF
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe 015c43a631c8c9e838a19fa3011344160636652e6aaac6e102e9f157f78d772a.exe -
Executes dropped EXE 2 IoCs
pid Process 2164 locxbod.exe 2912 adobec.exe -
Loads dropped DLL 2 IoCs
pid Process 2116 015c43a631c8c9e838a19fa3011344160636652e6aaac6e102e9f157f78d772a.exe 2116 015c43a631c8c9e838a19fa3011344160636652e6aaac6e102e9f157f78d772a.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeI6\\adobec.exe" 015c43a631c8c9e838a19fa3011344160636652e6aaac6e102e9f157f78d772a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Galax3U\\dobxec.exe" 015c43a631c8c9e838a19fa3011344160636652e6aaac6e102e9f157f78d772a.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 015c43a631c8c9e838a19fa3011344160636652e6aaac6e102e9f157f78d772a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locxbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2116 015c43a631c8c9e838a19fa3011344160636652e6aaac6e102e9f157f78d772a.exe 2116 015c43a631c8c9e838a19fa3011344160636652e6aaac6e102e9f157f78d772a.exe 2164 locxbod.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe 2912 adobec.exe 2164 locxbod.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2164 2116 015c43a631c8c9e838a19fa3011344160636652e6aaac6e102e9f157f78d772a.exe 30 PID 2116 wrote to memory of 2164 2116 015c43a631c8c9e838a19fa3011344160636652e6aaac6e102e9f157f78d772a.exe 30 PID 2116 wrote to memory of 2164 2116 015c43a631c8c9e838a19fa3011344160636652e6aaac6e102e9f157f78d772a.exe 30 PID 2116 wrote to memory of 2164 2116 015c43a631c8c9e838a19fa3011344160636652e6aaac6e102e9f157f78d772a.exe 30 PID 2116 wrote to memory of 2912 2116 015c43a631c8c9e838a19fa3011344160636652e6aaac6e102e9f157f78d772a.exe 31 PID 2116 wrote to memory of 2912 2116 015c43a631c8c9e838a19fa3011344160636652e6aaac6e102e9f157f78d772a.exe 31 PID 2116 wrote to memory of 2912 2116 015c43a631c8c9e838a19fa3011344160636652e6aaac6e102e9f157f78d772a.exe 31 PID 2116 wrote to memory of 2912 2116 015c43a631c8c9e838a19fa3011344160636652e6aaac6e102e9f157f78d772a.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\015c43a631c8c9e838a19fa3011344160636652e6aaac6e102e9f157f78d772a.exe"C:\Users\Admin\AppData\Local\Temp\015c43a631c8c9e838a19fa3011344160636652e6aaac6e102e9f157f78d772a.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2164
-
-
C:\AdobeI6\adobec.exeC:\AdobeI6\adobec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD525dab74e8a494faa158477a9c51d58ba
SHA1544e8370cb04dd6d02ae853eef8fa8924e321213
SHA256da225f00feaee25ae2df31e9259bf17cdb1747e3164050dafcf71fa1066a4965
SHA512d108e12c470cdfd75aa6499f8a0464e48f4d4f5af81715b380220da264d62b25242d9ccca0159fa1aacd40e6a5eefb418d0b900ce7d0c4a590901b511e194549
-
Filesize
2.6MB
MD5a9a7c3336b14cd795ffc8f6b6266bfd3
SHA1f987d6e8a617761aa72abd64c0cff51b0d9cac6e
SHA256f3e6c0df3ed8b300b15fb0429465d4e8c25b55543c3f739107547fa30921e661
SHA512b38cdef84b8570911a9205e506d1d02b71ec4f9cb3a0b68ea106ae016591aa38404d702350924bd6eb91f4cb4da4e82bcba5c2bfc6845aa7ec9a812822267bbb
-
Filesize
2.6MB
MD5d2fbacdb78afb2dcb460d0c7e18b96e2
SHA15354c87abd2886d6eefa48b21cf59dd231d33ff1
SHA256c1c3671690dc1c734102ef42c265e75138662a086a6a6b6c1af00a9e5d1aa054
SHA51245de36d2e1b781640dc766cc700616fec9feff7370ea8cf1f60f558d3769cdfc0bacf6bbb05270edc3072cf5938c05f1c99bcf9adfa5df12887a29b567341d5d
-
Filesize
167B
MD52938ff0c021bbf8b8a831b82d45a4c77
SHA18fff61575f235440c96d492b51d71cc9f44cb802
SHA256979ad828ded4f68a6f9539500420ad9b3baca6a56f87401c87bbac528846149d
SHA512d2926f4391b34281d865114edcfccba5c27fba73e88499b169741e72cd3a8619d3b4851fb1f1283c5604f76fe089d655f3250cc009fe69bf8a5ccd91e29c6794
-
Filesize
199B
MD5263c43d2e6d86267625aa6117b2b4c6e
SHA1324e6bcea2de2eff672b13b05d2c026cf8707157
SHA2560c27215eea764ea23233912d560ca60112c338172c9b38b202cdeccf29d88c36
SHA51219912d8a326070b944b6fce5ce7a232be7b57a383a94eb6ac28b6dcc9b1743309e12db2b2f60fc26f97279f9d30c8e74151707dd1f018ccc3ae0ed686e1c94b5
-
Filesize
2.6MB
MD52ad9271edcd6f419dbf804d32cfe0ca7
SHA164a9fe508fa4761bd9a2761830b89feda4696b2a
SHA25603bff27e2bfac7e8824c3a4c466c7135d1252b7dec2d1f50962e8bb2645ac2be
SHA512bf28c3919f7fe4a9b2aa4b5b0e9ca6394064d9dfb5661bfa02f1ace63f6dda4651b042998f924744d46a32d8a27195da637a807426641daa5e88f53c60051532