Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 08:42
Static task
static1
Behavioral task
behavioral1
Sample
3e3e5bb4d57f73637517a045c1e380052b70874974a46131f18f5821423bd692N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3e3e5bb4d57f73637517a045c1e380052b70874974a46131f18f5821423bd692N.exe
Resource
win10v2004-20241007-en
General
-
Target
3e3e5bb4d57f73637517a045c1e380052b70874974a46131f18f5821423bd692N.exe
-
Size
2.6MB
-
MD5
f933d125440191af4707a83ee6ccb4b0
-
SHA1
8c4cf664801f31da6669cc9f6c4956272dc6f6de
-
SHA256
3e3e5bb4d57f73637517a045c1e380052b70874974a46131f18f5821423bd692
-
SHA512
bc7eba982c70e7c1f9e3cb735f8f2e3e289353155c1d3b20a7a57cfb27b2a9fcd6c14e8c1196fbf74f284ba370ba0ea63e3f3e909276b6ad4c277075ba2c2812
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBFB/bS:sxX7QnxrloE5dpUp2b
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
3e3e5bb4d57f73637517a045c1e380052b70874974a46131f18f5821423bd692N.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe 3e3e5bb4d57f73637517a045c1e380052b70874974a46131f18f5821423bd692N.exe -
Executes dropped EXE 2 IoCs
Processes:
locadob.exexbodloc.exepid Process 2532 locadob.exe 2544 xbodloc.exe -
Loads dropped DLL 2 IoCs
Processes:
3e3e5bb4d57f73637517a045c1e380052b70874974a46131f18f5821423bd692N.exepid Process 2252 3e3e5bb4d57f73637517a045c1e380052b70874974a46131f18f5821423bd692N.exe 2252 3e3e5bb4d57f73637517a045c1e380052b70874974a46131f18f5821423bd692N.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
3e3e5bb4d57f73637517a045c1e380052b70874974a46131f18f5821423bd692N.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeWK\\xbodloc.exe" 3e3e5bb4d57f73637517a045c1e380052b70874974a46131f18f5821423bd692N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintFW\\optialoc.exe" 3e3e5bb4d57f73637517a045c1e380052b70874974a46131f18f5821423bd692N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
xbodloc.exe3e3e5bb4d57f73637517a045c1e380052b70874974a46131f18f5821423bd692N.exelocadob.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbodloc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3e3e5bb4d57f73637517a045c1e380052b70874974a46131f18f5821423bd692N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locadob.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3e3e5bb4d57f73637517a045c1e380052b70874974a46131f18f5821423bd692N.exelocadob.exexbodloc.exepid Process 2252 3e3e5bb4d57f73637517a045c1e380052b70874974a46131f18f5821423bd692N.exe 2252 3e3e5bb4d57f73637517a045c1e380052b70874974a46131f18f5821423bd692N.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe 2532 locadob.exe 2544 xbodloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
3e3e5bb4d57f73637517a045c1e380052b70874974a46131f18f5821423bd692N.exedescription pid Process procid_target PID 2252 wrote to memory of 2532 2252 3e3e5bb4d57f73637517a045c1e380052b70874974a46131f18f5821423bd692N.exe 30 PID 2252 wrote to memory of 2532 2252 3e3e5bb4d57f73637517a045c1e380052b70874974a46131f18f5821423bd692N.exe 30 PID 2252 wrote to memory of 2532 2252 3e3e5bb4d57f73637517a045c1e380052b70874974a46131f18f5821423bd692N.exe 30 PID 2252 wrote to memory of 2532 2252 3e3e5bb4d57f73637517a045c1e380052b70874974a46131f18f5821423bd692N.exe 30 PID 2252 wrote to memory of 2544 2252 3e3e5bb4d57f73637517a045c1e380052b70874974a46131f18f5821423bd692N.exe 31 PID 2252 wrote to memory of 2544 2252 3e3e5bb4d57f73637517a045c1e380052b70874974a46131f18f5821423bd692N.exe 31 PID 2252 wrote to memory of 2544 2252 3e3e5bb4d57f73637517a045c1e380052b70874974a46131f18f5821423bd692N.exe 31 PID 2252 wrote to memory of 2544 2252 3e3e5bb4d57f73637517a045c1e380052b70874974a46131f18f5821423bd692N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e3e5bb4d57f73637517a045c1e380052b70874974a46131f18f5821423bd692N.exe"C:\Users\Admin\AppData\Local\Temp\3e3e5bb4d57f73637517a045c1e380052b70874974a46131f18f5821423bd692N.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2532
-
-
C:\AdobeWK\xbodloc.exeC:\AdobeWK\xbodloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD56ea8a178806ff42436688dae3e3d3afe
SHA1a9cd8a30b24a2121118034f2ee90f2c4a4a4f954
SHA256c0d68082161944c1256039d0950c55e480ee938cc895125af9e8598711d7bfe3
SHA5124c669d38e2ff99921e1ef77e5cbd87a32ed365b6644b487f3d9d1747c2a0baa258080ed83cceed10dfcd4c7977639778d8d742f33febf60f449b3e7be42b21bd
-
Filesize
1.6MB
MD5a23f73456cf57f6942ff1fe1441b4cae
SHA12dc6db7f1898ce8fe16042906a0cca3004bcc464
SHA25646a4a60f35788c824b4899fe1e178c160bc9f309a484bca43fa7273c2806a411
SHA512862f33ca57f221b0f66a5fe456eff7a2deab22c377d53af64984166a25ef631f136997e8e3f4ab64cd0c55a335e2ea69edcce5dbf987c795617883b972d8bbb4
-
Filesize
2.6MB
MD5d450057bb0b2d89dd7e2b7b659820634
SHA1fc1fa3ea2ceee9ee7003514ea27beb386904c5c5
SHA256c10d24c0b2c0b3f806f81911660a1a48b246e1e134d529efd977e7603697ed85
SHA5123a98c79321230a0c2045ca3ac864ca76fb1afa389551be75a7669b890ea8fcc04cc05a3dcd59aac00900239bb7dcd894f59f484ac304cfb1fb88f58fd886c224
-
Filesize
169B
MD53ca91c2e8cb7578f9c2d01459e5c7ecf
SHA14631c993f2c7ddb5bcc5f1b0fc3a2123f4003d51
SHA256471ade97bc61059c7caeeef0e5baf71e01def601371c13e9c0e15e74f47bca73
SHA5129b6241d4a35968d8351c9efbf4d12a77f7b468a48b56d76e0997d86f1e4cc5a678aa966096276e30264aac3e7410fd99c2e6846fee450b10c64a2686cac7c574
-
Filesize
201B
MD57b607d41d95cb59474d35298c5dd29be
SHA184a5f367f4194d8b0b47f85ca53628b9eab271d9
SHA256358e9cbe4cd10239a58562d2017f247b0323bc4df6232e5b628444833a8c462d
SHA51238ef11dad6c73058df60496c1481ac67ec59eeaf62050c56537b19484db7898388cb3a82842d18d7e5666548090e5989ebb85e22e297361e3ca9e225ce964592
-
Filesize
2.6MB
MD50c1b760c040fadadcb1fdbf170edf383
SHA1a9bb4b9279aeee50f20ceffae8da943ffd001160
SHA256925f7e7e89984a6587adf432247bb1f3ef9a236db2ca9a20fbbff6d115a05c37
SHA512a38dc8281811faf69f080a365273386456abdbb33cfde4160222916269c299b8820baf03239613b7d73247fbae96bff78824c6a1ee8f927be8b647845f547cca