Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 19:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
odeme.exe
Resource
win7-20230831-en
windows7-x64
7 signatures
150 seconds
General
-
Target
odeme.exe
-
Size
315KB
-
MD5
5f7cb94f4ab08ee714d801d8cdb10342
-
SHA1
1eee64e698b780a13ab21d1dfb31a4dbeb43901b
-
SHA256
25a1ed4595e074cf8f898b5a0e505809372991f805aec43f205c254e8d1ec91d
-
SHA512
9346aa9910d012d926a2c6e7622797e3e4e2c7479514c64db037a4aea777bfcdede3875be3b4024366e96f6f86140c6b5c29209d623ad1b3b93a2a221960eb55
-
SSDEEP
6144:rbJyFMhIorW0wFndl3Swqk6/d1FPCiDPXcEfiu+kPHZnT:rUF4I0w4wqk6/d1FPVP/6TkPZn
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2244 set thread context of 1304 2244 odeme.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1304 odeme.exe 1304 odeme.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2244 odeme.exe Token: SeDebugPrivilege 1304 odeme.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2244 wrote to memory of 1304 2244 odeme.exe 28 PID 2244 wrote to memory of 1304 2244 odeme.exe 28 PID 2244 wrote to memory of 1304 2244 odeme.exe 28 PID 2244 wrote to memory of 1304 2244 odeme.exe 28 PID 2244 wrote to memory of 1304 2244 odeme.exe 28 PID 2244 wrote to memory of 1304 2244 odeme.exe 28 PID 2244 wrote to memory of 1304 2244 odeme.exe 28 PID 2244 wrote to memory of 1304 2244 odeme.exe 28 PID 2244 wrote to memory of 1304 2244 odeme.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\odeme.exe"C:\Users\Admin\AppData\Local\Temp\odeme.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\odeme.exeC:\Users\Admin\AppData\Local\Temp\odeme.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1304
-