Analysis

  • max time kernel
    119s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 05:32

General

  • Target

    6afc3509b816e91592d915001ce75dbe55ab5edc270d562e9ac19d477f1b5d90N.exe

  • Size

    2.6MB

  • MD5

    b403201123a1a1a5c84207054518c140

  • SHA1

    79ae6b453b1f9e4e14497af839d4576c66160f7b

  • SHA256

    6afc3509b816e91592d915001ce75dbe55ab5edc270d562e9ac19d477f1b5d90

  • SHA512

    ebfc6234eab14a4f90e110d5ccb528c4bcc958f6f73d7f6aeaa1ffe843a4752f3876fb727c93340d404df6e9506057473c6eb5aac7aa1c6b428b4f00b2e73cb3

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBoB/bS:sxX7QnxrloE5dpUp/b

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6afc3509b816e91592d915001ce75dbe55ab5edc270d562e9ac19d477f1b5d90N.exe
    "C:\Users\Admin\AppData\Local\Temp\6afc3509b816e91592d915001ce75dbe55ab5edc270d562e9ac19d477f1b5d90N.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4860
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3444
    • C:\AdobeZ8\aoptiec.exe
      C:\AdobeZ8\aoptiec.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\AdobeZ8\aoptiec.exe

    Filesize

    2.6MB

    MD5

    29de8144f957e44d134ea595a8b2045a

    SHA1

    67c3315a399e477455c2cd6b9bb9f730af6b5609

    SHA256

    42eb555075ea2b86ac636c6a668e27186ba4303b7777463a58c0efb9adfc92c4

    SHA512

    36a796b1742648a4208d3037e4910dddac70f3ab02b67d700c23b94da170f669cdc311c3b5221f36944d67d1008ffe271c9995ba3c8a64e5cb44c333d731ef11

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    202B

    MD5

    79ded9a225e5edd59586437c91705a83

    SHA1

    00927bbf3b312deb041294619a0ccc9f3a261b84

    SHA256

    07652b862ce06b991990bd2ab8a6aa7dfe41013b7012b22c4ad76c68fa4dec64

    SHA512

    b8342ed13cc81aa04cccc92924fd868161b7d9e329fc82e744d181ae8e5ec377798456f86e60a8f3c1ca6872d37af44cd6f3f32b75489181114d91649d47a4f5

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    170B

    MD5

    735b4c1bcf04ef7b3323004f295a1c6b

    SHA1

    abdc828f6118b8e54d88f9224089c44a51a208e3

    SHA256

    320c2bfcbeb829195d7ab157ced953b631e0a6c5d396ce26a52fcf70717f0ed3

    SHA512

    0c73f0088abbe809ec161c54ad8dce624affe04816e2535dbaabb6fbcfc726b9ec5cdcc7d6112bb81c1eae96cf39f9ef49317d967892a4bd72099714f644847d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe

    Filesize

    2.6MB

    MD5

    f66166f56cd55fb507087d94082aeef7

    SHA1

    f85a84058f9b12be6272146395813536f4e1377d

    SHA256

    fd552a50cb005d8a158ff6cc48aae2788c56a9d45e7e51e43fef86ddf7fe295b

    SHA512

    60472759caed100f215a96470b87b98c6e42a824334d30c9b9c9bef11cde6cfc244d33afa8f4edcd09c639de7a7a41a7f907c193fe06eebbd774303908343fa6

  • C:\VidY7\optidevsys.exe

    Filesize

    2.6MB

    MD5

    09a982254476748e974d13d7aa9d68ad

    SHA1

    fcc4e5ca72528a959e879a109a3cedba540c6d98

    SHA256

    de9b8297c124e901cab126cfd8078a16181b3c8989e96382ec2a3ba4ea0ef4a3

    SHA512

    ead65635f95427e1ae0c78b1a2aa80f411aba8829bf19319c10e090e1674888153289570e24d20ff4539745e8a18989dd0dbe82d3e026ac5d571f281d71cadef

  • C:\VidY7\optidevsys.exe

    Filesize

    208KB

    MD5

    b5d0d977b82d8ac3b032a75a1f44f72b

    SHA1

    c417ad4b249ea68e43e7c799fbe892cff9821c3a

    SHA256

    c6f28d6c43511ac74a30ba109445a17d62210fb870961e076450206b2f705e48

    SHA512

    ebfc235f3a647bcd74c686978d00259c309762a1107dd74cee6c87d9a0e4bae67979df3e7f0621f6c2ed71b852715055b695bbcbea01f704d4b6d81a4f32ddaa