Analysis
-
max time kernel
119s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 05:32
Static task
static1
Behavioral task
behavioral1
Sample
6afc3509b816e91592d915001ce75dbe55ab5edc270d562e9ac19d477f1b5d90N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6afc3509b816e91592d915001ce75dbe55ab5edc270d562e9ac19d477f1b5d90N.exe
Resource
win10v2004-20241007-en
General
-
Target
6afc3509b816e91592d915001ce75dbe55ab5edc270d562e9ac19d477f1b5d90N.exe
-
Size
2.6MB
-
MD5
b403201123a1a1a5c84207054518c140
-
SHA1
79ae6b453b1f9e4e14497af839d4576c66160f7b
-
SHA256
6afc3509b816e91592d915001ce75dbe55ab5edc270d562e9ac19d477f1b5d90
-
SHA512
ebfc6234eab14a4f90e110d5ccb528c4bcc958f6f73d7f6aeaa1ffe843a4752f3876fb727c93340d404df6e9506057473c6eb5aac7aa1c6b428b4f00b2e73cb3
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBoB/bS:sxX7QnxrloE5dpUp/b
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe 6afc3509b816e91592d915001ce75dbe55ab5edc270d562e9ac19d477f1b5d90N.exe -
Executes dropped EXE 2 IoCs
pid Process 3444 sysadob.exe 4640 aoptiec.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidY7\\optidevsys.exe" 6afc3509b816e91592d915001ce75dbe55ab5edc270d562e9ac19d477f1b5d90N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeZ8\\aoptiec.exe" 6afc3509b816e91592d915001ce75dbe55ab5edc270d562e9ac19d477f1b5d90N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6afc3509b816e91592d915001ce75dbe55ab5edc270d562e9ac19d477f1b5d90N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysadob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aoptiec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4860 6afc3509b816e91592d915001ce75dbe55ab5edc270d562e9ac19d477f1b5d90N.exe 4860 6afc3509b816e91592d915001ce75dbe55ab5edc270d562e9ac19d477f1b5d90N.exe 4860 6afc3509b816e91592d915001ce75dbe55ab5edc270d562e9ac19d477f1b5d90N.exe 4860 6afc3509b816e91592d915001ce75dbe55ab5edc270d562e9ac19d477f1b5d90N.exe 3444 sysadob.exe 3444 sysadob.exe 4640 aoptiec.exe 4640 aoptiec.exe 3444 sysadob.exe 3444 sysadob.exe 4640 aoptiec.exe 4640 aoptiec.exe 3444 sysadob.exe 3444 sysadob.exe 4640 aoptiec.exe 4640 aoptiec.exe 3444 sysadob.exe 3444 sysadob.exe 4640 aoptiec.exe 4640 aoptiec.exe 3444 sysadob.exe 3444 sysadob.exe 4640 aoptiec.exe 4640 aoptiec.exe 3444 sysadob.exe 3444 sysadob.exe 4640 aoptiec.exe 4640 aoptiec.exe 3444 sysadob.exe 3444 sysadob.exe 4640 aoptiec.exe 4640 aoptiec.exe 3444 sysadob.exe 3444 sysadob.exe 4640 aoptiec.exe 4640 aoptiec.exe 3444 sysadob.exe 3444 sysadob.exe 4640 aoptiec.exe 4640 aoptiec.exe 3444 sysadob.exe 3444 sysadob.exe 4640 aoptiec.exe 4640 aoptiec.exe 3444 sysadob.exe 3444 sysadob.exe 4640 aoptiec.exe 4640 aoptiec.exe 3444 sysadob.exe 3444 sysadob.exe 4640 aoptiec.exe 4640 aoptiec.exe 3444 sysadob.exe 3444 sysadob.exe 4640 aoptiec.exe 4640 aoptiec.exe 3444 sysadob.exe 3444 sysadob.exe 4640 aoptiec.exe 4640 aoptiec.exe 3444 sysadob.exe 3444 sysadob.exe 4640 aoptiec.exe 4640 aoptiec.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4860 wrote to memory of 3444 4860 6afc3509b816e91592d915001ce75dbe55ab5edc270d562e9ac19d477f1b5d90N.exe 88 PID 4860 wrote to memory of 3444 4860 6afc3509b816e91592d915001ce75dbe55ab5edc270d562e9ac19d477f1b5d90N.exe 88 PID 4860 wrote to memory of 3444 4860 6afc3509b816e91592d915001ce75dbe55ab5edc270d562e9ac19d477f1b5d90N.exe 88 PID 4860 wrote to memory of 4640 4860 6afc3509b816e91592d915001ce75dbe55ab5edc270d562e9ac19d477f1b5d90N.exe 91 PID 4860 wrote to memory of 4640 4860 6afc3509b816e91592d915001ce75dbe55ab5edc270d562e9ac19d477f1b5d90N.exe 91 PID 4860 wrote to memory of 4640 4860 6afc3509b816e91592d915001ce75dbe55ab5edc270d562e9ac19d477f1b5d90N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\6afc3509b816e91592d915001ce75dbe55ab5edc270d562e9ac19d477f1b5d90N.exe"C:\Users\Admin\AppData\Local\Temp\6afc3509b816e91592d915001ce75dbe55ab5edc270d562e9ac19d477f1b5d90N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3444
-
-
C:\AdobeZ8\aoptiec.exeC:\AdobeZ8\aoptiec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD529de8144f957e44d134ea595a8b2045a
SHA167c3315a399e477455c2cd6b9bb9f730af6b5609
SHA25642eb555075ea2b86ac636c6a668e27186ba4303b7777463a58c0efb9adfc92c4
SHA51236a796b1742648a4208d3037e4910dddac70f3ab02b67d700c23b94da170f669cdc311c3b5221f36944d67d1008ffe271c9995ba3c8a64e5cb44c333d731ef11
-
Filesize
202B
MD579ded9a225e5edd59586437c91705a83
SHA100927bbf3b312deb041294619a0ccc9f3a261b84
SHA25607652b862ce06b991990bd2ab8a6aa7dfe41013b7012b22c4ad76c68fa4dec64
SHA512b8342ed13cc81aa04cccc92924fd868161b7d9e329fc82e744d181ae8e5ec377798456f86e60a8f3c1ca6872d37af44cd6f3f32b75489181114d91649d47a4f5
-
Filesize
170B
MD5735b4c1bcf04ef7b3323004f295a1c6b
SHA1abdc828f6118b8e54d88f9224089c44a51a208e3
SHA256320c2bfcbeb829195d7ab157ced953b631e0a6c5d396ce26a52fcf70717f0ed3
SHA5120c73f0088abbe809ec161c54ad8dce624affe04816e2535dbaabb6fbcfc726b9ec5cdcc7d6112bb81c1eae96cf39f9ef49317d967892a4bd72099714f644847d
-
Filesize
2.6MB
MD5f66166f56cd55fb507087d94082aeef7
SHA1f85a84058f9b12be6272146395813536f4e1377d
SHA256fd552a50cb005d8a158ff6cc48aae2788c56a9d45e7e51e43fef86ddf7fe295b
SHA51260472759caed100f215a96470b87b98c6e42a824334d30c9b9c9bef11cde6cfc244d33afa8f4edcd09c639de7a7a41a7f907c193fe06eebbd774303908343fa6
-
Filesize
2.6MB
MD509a982254476748e974d13d7aa9d68ad
SHA1fcc4e5ca72528a959e879a109a3cedba540c6d98
SHA256de9b8297c124e901cab126cfd8078a16181b3c8989e96382ec2a3ba4ea0ef4a3
SHA512ead65635f95427e1ae0c78b1a2aa80f411aba8829bf19319c10e090e1674888153289570e24d20ff4539745e8a18989dd0dbe82d3e026ac5d571f281d71cadef
-
Filesize
208KB
MD5b5d0d977b82d8ac3b032a75a1f44f72b
SHA1c417ad4b249ea68e43e7c799fbe892cff9821c3a
SHA256c6f28d6c43511ac74a30ba109445a17d62210fb870961e076450206b2f705e48
SHA512ebfc235f3a647bcd74c686978d00259c309762a1107dd74cee6c87d9a0e4bae67979df3e7f0621f6c2ed71b852715055b695bbcbea01f704d4b6d81a4f32ddaa