Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 09:03
Static task
static1
Behavioral task
behavioral1
Sample
d64df7bf381de5f3054ae07be7a10458509e99ba01f542606e8e377a8b8beae8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d64df7bf381de5f3054ae07be7a10458509e99ba01f542606e8e377a8b8beae8.exe
Resource
win10v2004-20241007-en
General
-
Target
d64df7bf381de5f3054ae07be7a10458509e99ba01f542606e8e377a8b8beae8.exe
-
Size
4.0MB
-
MD5
3e79f0a808cddbac65d78fd138dc9887
-
SHA1
4127b5318fdf0f807e1b04bc6d47709f2bfe488c
-
SHA256
d64df7bf381de5f3054ae07be7a10458509e99ba01f542606e8e377a8b8beae8
-
SHA512
c43feae9420d716b5fa291e92b0afd400d74a69e176c933b99301da3db0e525e8776b79d3181f4fe36e4a59b6a16847d476af4af1ca83967497c49daf18f47a6
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBrB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUpQbVz8eLFcz
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
d64df7bf381de5f3054ae07be7a10458509e99ba01f542606e8e377a8b8beae8.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysaopti.exe d64df7bf381de5f3054ae07be7a10458509e99ba01f542606e8e377a8b8beae8.exe -
Executes dropped EXE 2 IoCs
Processes:
sysaopti.exeabodloc.exepid Process 676 sysaopti.exe 1920 abodloc.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
d64df7bf381de5f3054ae07be7a10458509e99ba01f542606e8e377a8b8beae8.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxGH\\bodaloc.exe" d64df7bf381de5f3054ae07be7a10458509e99ba01f542606e8e377a8b8beae8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Adobe0Y\\abodloc.exe" d64df7bf381de5f3054ae07be7a10458509e99ba01f542606e8e377a8b8beae8.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d64df7bf381de5f3054ae07be7a10458509e99ba01f542606e8e377a8b8beae8.exesysaopti.exeabodloc.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d64df7bf381de5f3054ae07be7a10458509e99ba01f542606e8e377a8b8beae8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysaopti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abodloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d64df7bf381de5f3054ae07be7a10458509e99ba01f542606e8e377a8b8beae8.exesysaopti.exeabodloc.exepid Process 2844 d64df7bf381de5f3054ae07be7a10458509e99ba01f542606e8e377a8b8beae8.exe 2844 d64df7bf381de5f3054ae07be7a10458509e99ba01f542606e8e377a8b8beae8.exe 2844 d64df7bf381de5f3054ae07be7a10458509e99ba01f542606e8e377a8b8beae8.exe 2844 d64df7bf381de5f3054ae07be7a10458509e99ba01f542606e8e377a8b8beae8.exe 676 sysaopti.exe 676 sysaopti.exe 1920 abodloc.exe 1920 abodloc.exe 676 sysaopti.exe 676 sysaopti.exe 1920 abodloc.exe 1920 abodloc.exe 676 sysaopti.exe 676 sysaopti.exe 1920 abodloc.exe 1920 abodloc.exe 676 sysaopti.exe 676 sysaopti.exe 1920 abodloc.exe 1920 abodloc.exe 676 sysaopti.exe 676 sysaopti.exe 1920 abodloc.exe 1920 abodloc.exe 676 sysaopti.exe 676 sysaopti.exe 1920 abodloc.exe 1920 abodloc.exe 676 sysaopti.exe 676 sysaopti.exe 1920 abodloc.exe 1920 abodloc.exe 676 sysaopti.exe 676 sysaopti.exe 1920 abodloc.exe 1920 abodloc.exe 676 sysaopti.exe 676 sysaopti.exe 1920 abodloc.exe 1920 abodloc.exe 676 sysaopti.exe 676 sysaopti.exe 1920 abodloc.exe 1920 abodloc.exe 676 sysaopti.exe 676 sysaopti.exe 1920 abodloc.exe 1920 abodloc.exe 676 sysaopti.exe 676 sysaopti.exe 1920 abodloc.exe 1920 abodloc.exe 676 sysaopti.exe 676 sysaopti.exe 1920 abodloc.exe 1920 abodloc.exe 676 sysaopti.exe 676 sysaopti.exe 1920 abodloc.exe 1920 abodloc.exe 676 sysaopti.exe 676 sysaopti.exe 1920 abodloc.exe 1920 abodloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
d64df7bf381de5f3054ae07be7a10458509e99ba01f542606e8e377a8b8beae8.exedescription pid Process procid_target PID 2844 wrote to memory of 676 2844 d64df7bf381de5f3054ae07be7a10458509e99ba01f542606e8e377a8b8beae8.exe 84 PID 2844 wrote to memory of 676 2844 d64df7bf381de5f3054ae07be7a10458509e99ba01f542606e8e377a8b8beae8.exe 84 PID 2844 wrote to memory of 676 2844 d64df7bf381de5f3054ae07be7a10458509e99ba01f542606e8e377a8b8beae8.exe 84 PID 2844 wrote to memory of 1920 2844 d64df7bf381de5f3054ae07be7a10458509e99ba01f542606e8e377a8b8beae8.exe 85 PID 2844 wrote to memory of 1920 2844 d64df7bf381de5f3054ae07be7a10458509e99ba01f542606e8e377a8b8beae8.exe 85 PID 2844 wrote to memory of 1920 2844 d64df7bf381de5f3054ae07be7a10458509e99ba01f542606e8e377a8b8beae8.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\d64df7bf381de5f3054ae07be7a10458509e99ba01f542606e8e377a8b8beae8.exe"C:\Users\Admin\AppData\Local\Temp\d64df7bf381de5f3054ae07be7a10458509e99ba01f542606e8e377a8b8beae8.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysaopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysaopti.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:676
-
-
C:\Adobe0Y\abodloc.exeC:\Adobe0Y\abodloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD5bbe262b1d81648586b683abb80f51ea5
SHA17ba5e3df2f59a51bb1b82d0c6b753b703bafc54c
SHA2565c877901b81c4cc2635940dabdcbbc7a989cdb546a9ae18782380820ef676060
SHA5122b37f6d9743299945193c9499f71060ea222ad2f978ae24bda1b4f82d2024fab332c26787ef76c669689b3c1e1985d36af6527c220d49a43ae1c3446144823a6
-
Filesize
744KB
MD551ea65980bdcef15b7d6fb06cb4a33f0
SHA1ad42db2a610c235ea186f49828aafc71a431ada4
SHA256175b5ba676c379ad025bcfc3e712c00d6abd01e0d9405353533a0e049e730371
SHA5126a276af2b9e36b489f7a2f2a4987a44606f7b7d74577db39fe6baa9635a35279f11f8b343bb01d707c55a9f3d63b2ec9fa3a6ed6c31363d91e80f1c7cc0c76da
-
Filesize
4.0MB
MD53505950bebcc0faebc5438773722f1b3
SHA1ac720c2131987c17ac1160c9f9a2b4e380f96c1f
SHA25610c91be6d420a2325e1d1df0341ebf651dfd15a53e2edf4cf7f504b182709d8f
SHA512cd00bcbfafa4f9f1dbf9332342cb4e7233f69e9d03e8e698f340307671145493f70fbc045e1e85e035711f4a494048d8a0d05bd448b4ff33d8b68a97ce041ef7
-
Filesize
202B
MD5767341e0bd492e052b81c6e6300f9fa9
SHA14b0da939a05d8e3d1f6b8679ed07a27b175c26a4
SHA256770585356917142af7af0d43a6cd98be895d726169878c402686fcda268462ce
SHA5127985dcbf8c7c78df2e42a27bc239cd5cabc38df96ef55b6232167fc2f99621c78ab22297807e1df036febb1e31a0f50c11f3951fe963f68a0bcef17e15bf8c24
-
Filesize
170B
MD5b45eb6d020893e3712f470bd99921e3c
SHA11a2f326dc2b56579d8c7ba02016bafa55be0d598
SHA25601f14c7fdbbccbbc53c933387dc07bb4da150285358919281383ec064b117292
SHA5127b6e047cf9b3accf4e2daffea2024836521a8ceb353cb6c1a5dbb5ca50e524ac89027becf4e9ab082869627e91be4d4a22fb3eaa42b8150be8760cd6b536f4ff
-
Filesize
4.0MB
MD551423f573e937ea70cefa8d7dfc60b6e
SHA114c630086268fd72acf3ac240250df86d6012e0e
SHA25697b71d1be81903fd61126b536c75329be92442ea5e936673006a8c299dec2dde
SHA51218505ac63dcdec73fed3dd9364a9c8827fe2d81d3d5fc1ba20fcd5008bd15282f0fe7c13d18a17fc5601fb1f4f35e5105a2b63438ab9b9ed3651af1f00570ea2