Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 04:08
Static task
static1
Behavioral task
behavioral1
Sample
e92ebd3e17088e9ecf9fa5c68013deabd37879c99a4f083b9d489e186f81ebe8.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
e92ebd3e17088e9ecf9fa5c68013deabd37879c99a4f083b9d489e186f81ebe8.exe
Resource
win10v2004-20240508-en
General
-
Target
e92ebd3e17088e9ecf9fa5c68013deabd37879c99a4f083b9d489e186f81ebe8.exe
-
Size
2.6MB
-
MD5
e42456cd503692c77a790d7d8a6edec3
-
SHA1
af6bf64b482e44feb223baa426393b883922c098
-
SHA256
e92ebd3e17088e9ecf9fa5c68013deabd37879c99a4f083b9d489e186f81ebe8
-
SHA512
c9ac8dadeb8fd3b35239f873fc64e5e4090f79caa0ac48cee436fbe5c0ec520e77c311207edee284ee55e02f5b39baf6ce6e8af0304717fe4771c36b8c060f98
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBPB/bS:sxX7QnxrloE5dpUp4b
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
e92ebd3e17088e9ecf9fa5c68013deabd37879c99a4f083b9d489e186f81ebe8.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe e92ebd3e17088e9ecf9fa5c68013deabd37879c99a4f083b9d489e186f81ebe8.exe -
Executes dropped EXE 2 IoCs
Processes:
locadob.exexoptiloc.exepid process 2972 locadob.exe 2716 xoptiloc.exe -
Loads dropped DLL 2 IoCs
Processes:
e92ebd3e17088e9ecf9fa5c68013deabd37879c99a4f083b9d489e186f81ebe8.exepid process 1848 e92ebd3e17088e9ecf9fa5c68013deabd37879c99a4f083b9d489e186f81ebe8.exe 1848 e92ebd3e17088e9ecf9fa5c68013deabd37879c99a4f083b9d489e186f81ebe8.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
e92ebd3e17088e9ecf9fa5c68013deabd37879c99a4f083b9d489e186f81ebe8.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocLY\\xoptiloc.exe" e92ebd3e17088e9ecf9fa5c68013deabd37879c99a4f083b9d489e186f81ebe8.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Mint0H\\dobaloc.exe" e92ebd3e17088e9ecf9fa5c68013deabd37879c99a4f083b9d489e186f81ebe8.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e92ebd3e17088e9ecf9fa5c68013deabd37879c99a4f083b9d489e186f81ebe8.exelocadob.exexoptiloc.exepid process 1848 e92ebd3e17088e9ecf9fa5c68013deabd37879c99a4f083b9d489e186f81ebe8.exe 1848 e92ebd3e17088e9ecf9fa5c68013deabd37879c99a4f083b9d489e186f81ebe8.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe 2972 locadob.exe 2716 xoptiloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
e92ebd3e17088e9ecf9fa5c68013deabd37879c99a4f083b9d489e186f81ebe8.exedescription pid process target process PID 1848 wrote to memory of 2972 1848 e92ebd3e17088e9ecf9fa5c68013deabd37879c99a4f083b9d489e186f81ebe8.exe locadob.exe PID 1848 wrote to memory of 2972 1848 e92ebd3e17088e9ecf9fa5c68013deabd37879c99a4f083b9d489e186f81ebe8.exe locadob.exe PID 1848 wrote to memory of 2972 1848 e92ebd3e17088e9ecf9fa5c68013deabd37879c99a4f083b9d489e186f81ebe8.exe locadob.exe PID 1848 wrote to memory of 2972 1848 e92ebd3e17088e9ecf9fa5c68013deabd37879c99a4f083b9d489e186f81ebe8.exe locadob.exe PID 1848 wrote to memory of 2716 1848 e92ebd3e17088e9ecf9fa5c68013deabd37879c99a4f083b9d489e186f81ebe8.exe xoptiloc.exe PID 1848 wrote to memory of 2716 1848 e92ebd3e17088e9ecf9fa5c68013deabd37879c99a4f083b9d489e186f81ebe8.exe xoptiloc.exe PID 1848 wrote to memory of 2716 1848 e92ebd3e17088e9ecf9fa5c68013deabd37879c99a4f083b9d489e186f81ebe8.exe xoptiloc.exe PID 1848 wrote to memory of 2716 1848 e92ebd3e17088e9ecf9fa5c68013deabd37879c99a4f083b9d489e186f81ebe8.exe xoptiloc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e92ebd3e17088e9ecf9fa5c68013deabd37879c99a4f083b9d489e186f81ebe8.exe"C:\Users\Admin\AppData\Local\Temp\e92ebd3e17088e9ecf9fa5c68013deabd37879c99a4f083b9d489e186f81ebe8.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\IntelprocLY\xoptiloc.exeC:\IntelprocLY\xoptiloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\IntelprocLY\xoptiloc.exeFilesize
2.6MB
MD54061ca3ae4de54e194408cc3352c3320
SHA11def32489817d1edf15ed414861f008e00e45732
SHA256a440d1030f1d2eb0b541d49b9f1404088f1a38042d1603119763a1e3c02e17e5
SHA51208680d74277bf6d7acb655818fda73ca7de14de2925879e0f5e68932b3eebed1ac859f545e59e364ff7cb98ab412a3607eb619f74501fb3126a36ac3df799f31
-
C:\Mint0H\dobaloc.exeFilesize
2.0MB
MD52456e825ceeedb20f71206165d49e947
SHA1890f9632fef2a6bf43a9dfd735746c09de658961
SHA256bed445e013cfb98c10918a7d597b299d1361eedd9c130606df15e64bf7cc7606
SHA512970e403d499e2e6ce89292e5e79ed790e0a90bd1db7ff84e7bb8662441954b77395552a9eff23069355d32fb3163ba55b4761c48c45bc8f4ad37465dad63e20e
-
C:\Mint0H\dobaloc.exeFilesize
2.6MB
MD53bc872d35879afc867f85b725acc0e7c
SHA13b0d8511985a796de7e7cbfc3f4805e8e5459f9e
SHA2569e477a4dc49f352c63aaa5d5ff1bf2b153eedef71631ab4d38f7e7f76c968ca3
SHA512374f037837553301a751d454a0d2ebfb25a1fc32e5a2b1896fd6cd0a0a6db05d1a77b882eb29e53d63c8299b4440f379a628daead6609d2808b2c8f59cc04730
-
C:\Users\Admin\253086396416_6.1_Admin.iniFilesize
173B
MD55ad0573a0e9e2ca0612d6a716d260bb4
SHA1e746b995897753b23237e7216c1c41b3cea9d9c8
SHA25605b7423a7145ecd58e1d7af4a732bd70d0b19863d9a8269e18a651a0c2d0fb14
SHA512612136497e794f6040b4b96933a44da7fa2b159f14857e9ccbfa15b6e5ffa73b3c4b1ad85b3ca91f4a66a8ed9e5c74cdc2819ff14b8c8917ff8ffa8358eaf77b
-
C:\Users\Admin\253086396416_6.1_Admin.iniFilesize
205B
MD5ad82d1f8c3849959e4b778d3477a17ac
SHA16f223d4be843d118be3fdc0e94c8d10b3c74cf92
SHA25625800cc20173904a08476e404126da2fb82e589ad24834b49f2c4c93564537e3
SHA51245486322b4ba0ff6c8599eb99f651f1c59ec1c5bf65321aa73db334b967b6cc789a5f606546ea4d7e6d1c9e2ff4de4b7a32197209d0b897b844e2f8ac1f7da1c
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exeFilesize
2.6MB
MD5ba69bbc85da20c2554add316ef6f172f
SHA1a18060c547fc06ac8d0b95304ab00e92c8752b8f
SHA2565582e06510f0862d418f335c5cf21f5831aaa844da57dda1b43ccd0ccd9abfa7
SHA512fb9b9171c2c1d69be02cc758760783eaa913aa95cf94650f1f4608bc331d79569aeefac8e3aae7d26b275290b91b167f5b00501832de34bd42dfeb0ccc5d89de