Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 02:49
Static task
static1
Behavioral task
behavioral1
Sample
c99c30cdf00214ef2f6c64abb61dc510aec114b0ebb5e5adf0cb154a4dca0a43.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c99c30cdf00214ef2f6c64abb61dc510aec114b0ebb5e5adf0cb154a4dca0a43.exe
Resource
win10v2004-20240412-en
General
-
Target
c99c30cdf00214ef2f6c64abb61dc510aec114b0ebb5e5adf0cb154a4dca0a43.exe
-
Size
3.0MB
-
MD5
1cb9a8abdaa6e1dc4adbf768fb79789f
-
SHA1
e8282f5c84989fc844f545f349142f9bf33cda0f
-
SHA256
c99c30cdf00214ef2f6c64abb61dc510aec114b0ebb5e5adf0cb154a4dca0a43
-
SHA512
2ba44bb4352b143445d994c5c0283392bc5617751d9456d4a94857fae2ef08c294a44c68fbf6dfda96bc35709db2da066e586b7a2bbc5e837327727534ca93a0
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBxB/bSqz8:sxX7QnxrloE5dpUpybVz8
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevbod.exe c99c30cdf00214ef2f6c64abb61dc510aec114b0ebb5e5adf0cb154a4dca0a43.exe -
Executes dropped EXE 2 IoCs
pid Process 2660 locdevbod.exe 2496 abodec.exe -
Loads dropped DLL 2 IoCs
pid Process 2952 c99c30cdf00214ef2f6c64abb61dc510aec114b0ebb5e5adf0cb154a4dca0a43.exe 2952 c99c30cdf00214ef2f6c64abb61dc510aec114b0ebb5e5adf0cb154a4dca0a43.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Intelproc5V\\abodec.exe" c99c30cdf00214ef2f6c64abb61dc510aec114b0ebb5e5adf0cb154a4dca0a43.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Galax0G\\dobdevsys.exe" c99c30cdf00214ef2f6c64abb61dc510aec114b0ebb5e5adf0cb154a4dca0a43.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2952 c99c30cdf00214ef2f6c64abb61dc510aec114b0ebb5e5adf0cb154a4dca0a43.exe 2952 c99c30cdf00214ef2f6c64abb61dc510aec114b0ebb5e5adf0cb154a4dca0a43.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe 2660 locdevbod.exe 2496 abodec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2660 2952 c99c30cdf00214ef2f6c64abb61dc510aec114b0ebb5e5adf0cb154a4dca0a43.exe 28 PID 2952 wrote to memory of 2660 2952 c99c30cdf00214ef2f6c64abb61dc510aec114b0ebb5e5adf0cb154a4dca0a43.exe 28 PID 2952 wrote to memory of 2660 2952 c99c30cdf00214ef2f6c64abb61dc510aec114b0ebb5e5adf0cb154a4dca0a43.exe 28 PID 2952 wrote to memory of 2660 2952 c99c30cdf00214ef2f6c64abb61dc510aec114b0ebb5e5adf0cb154a4dca0a43.exe 28 PID 2952 wrote to memory of 2496 2952 c99c30cdf00214ef2f6c64abb61dc510aec114b0ebb5e5adf0cb154a4dca0a43.exe 29 PID 2952 wrote to memory of 2496 2952 c99c30cdf00214ef2f6c64abb61dc510aec114b0ebb5e5adf0cb154a4dca0a43.exe 29 PID 2952 wrote to memory of 2496 2952 c99c30cdf00214ef2f6c64abb61dc510aec114b0ebb5e5adf0cb154a4dca0a43.exe 29 PID 2952 wrote to memory of 2496 2952 c99c30cdf00214ef2f6c64abb61dc510aec114b0ebb5e5adf0cb154a4dca0a43.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c99c30cdf00214ef2f6c64abb61dc510aec114b0ebb5e5adf0cb154a4dca0a43.exe"C:\Users\Admin\AppData\Local\Temp\c99c30cdf00214ef2f6c64abb61dc510aec114b0ebb5e5adf0cb154a4dca0a43.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevbod.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2660
-
-
C:\Intelproc5V\abodec.exeC:\Intelproc5V\abodec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD51e8f2794adad491136bb01a7ec77a6bb
SHA15629408c96db9891959f97a2d4ec2a39e3655231
SHA256aababac0fcf13dc2e235a232b80d31dc533fd97a583797d3501396e480c2676c
SHA512762c2e286d1abf21ed36f62584e90f8068c684da1353eb7ab17d0bc21069e37123973b115b06e189e0fb32ae9b5a940ba7f3e6124618b1ced8079447100f0ea3
-
Filesize
3.0MB
MD57f65ea140d30e2ba46599eab905c2f83
SHA18bfad31bdc8abd4f07c70f81ff8b1b772cc07ad0
SHA25675d917b74ef1c45376526eb0f123dad20b22bad20e2a671dd54306a5cdb1f029
SHA5128190dc0280a323ad276043ff1b623a82370512c250a0c347612ad747913cf10f3e8df402e6a875ca8157dc1425bf5f0b821ee17119f3a0db64e233601b86a115
-
Filesize
176B
MD50bab846e313217a04bfc0fba9fe981f9
SHA1070ee2b809947c92dfed59269d4c4845b8bc0306
SHA256160f95fb112f9917b2fe2885ef0539ff97e914bb5705c48cbef63de12432e3b4
SHA512f1b5d887fa7473422ababf99da996f97e3fafcc4db1b828dba671abe81b40711461d13d8eeb7b0570d1e77c8c190e6f7d06870ed415fac4ab5146054fbf01259
-
Filesize
208B
MD5df69540fedab0e7099c74e7713c6eac6
SHA1a843362e27d9da63b742cf55bddf560b85ee057d
SHA256b63cdbd6fc715691e9141cbeeb272cc535c66c26f72010de2c9c8fd163e76f49
SHA5123ff0b27233f68461ff1302d75956454513c41d0a15b4168887d37e469651ef71ab191c8c86c06509162fab155c0f7dd2c43fa4672403ca752e659c7b1c13bcba
-
Filesize
3.0MB
MD5cde242d27ace9cb85fa0b710e3dbebd7
SHA1e4078c023ee7aa2fa84fdc0b37cf951d6552891a
SHA256e208b0ee1e01e5ffc502f0bf0e77cbf9581e14fb6a83f7b200b2faa551838696
SHA512b77779ea2963beba414e70f7f687b39173198b0bc412a69c3a9a1e813af7080d1a5677fff3b749a01c09e7aeee937661eea83230705d4c29512bcab380538a74