Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-05-2024 21:33
Static task
static1
Behavioral task
behavioral1
Sample
4d56835dbc59a5143390f2fc14475c5815a6d66a2658d55bbd242174082189fd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4d56835dbc59a5143390f2fc14475c5815a6d66a2658d55bbd242174082189fd.exe
Resource
win10v2004-20240426-en
General
-
Target
4d56835dbc59a5143390f2fc14475c5815a6d66a2658d55bbd242174082189fd.exe
-
Size
3.2MB
-
MD5
ec6846f3af911edd9b87f8b4f6ae1388
-
SHA1
0535f71272c59fa4ab93d60f3c57726ab22249fa
-
SHA256
4d56835dbc59a5143390f2fc14475c5815a6d66a2658d55bbd242174082189fd
-
SHA512
85fa7c07fcd1e6ab62a0de15acb1f0222d5e354f748402ebccffc600fc9a531f24b3ed32fd63710a79220a30f52475a71b3810d187dfa67b1ee5416cf4cfce20
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB0B/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUpTbVz8eLFcz
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevbod.exe 4d56835dbc59a5143390f2fc14475c5815a6d66a2658d55bbd242174082189fd.exe -
Executes dropped EXE 2 IoCs
pid Process 2392 locdevbod.exe 1612 abodec.exe -
Loads dropped DLL 2 IoCs
pid Process 2228 4d56835dbc59a5143390f2fc14475c5815a6d66a2658d55bbd242174082189fd.exe 2228 4d56835dbc59a5143390f2fc14475c5815a6d66a2658d55bbd242174082189fd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotQK\\abodec.exe" 4d56835dbc59a5143390f2fc14475c5815a6d66a2658d55bbd242174082189fd.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidTT\\optialoc.exe" 4d56835dbc59a5143390f2fc14475c5815a6d66a2658d55bbd242174082189fd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2228 4d56835dbc59a5143390f2fc14475c5815a6d66a2658d55bbd242174082189fd.exe 2228 4d56835dbc59a5143390f2fc14475c5815a6d66a2658d55bbd242174082189fd.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe 2392 locdevbod.exe 1612 abodec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2392 2228 4d56835dbc59a5143390f2fc14475c5815a6d66a2658d55bbd242174082189fd.exe 30 PID 2228 wrote to memory of 2392 2228 4d56835dbc59a5143390f2fc14475c5815a6d66a2658d55bbd242174082189fd.exe 30 PID 2228 wrote to memory of 2392 2228 4d56835dbc59a5143390f2fc14475c5815a6d66a2658d55bbd242174082189fd.exe 30 PID 2228 wrote to memory of 2392 2228 4d56835dbc59a5143390f2fc14475c5815a6d66a2658d55bbd242174082189fd.exe 30 PID 2228 wrote to memory of 1612 2228 4d56835dbc59a5143390f2fc14475c5815a6d66a2658d55bbd242174082189fd.exe 31 PID 2228 wrote to memory of 1612 2228 4d56835dbc59a5143390f2fc14475c5815a6d66a2658d55bbd242174082189fd.exe 31 PID 2228 wrote to memory of 1612 2228 4d56835dbc59a5143390f2fc14475c5815a6d66a2658d55bbd242174082189fd.exe 31 PID 2228 wrote to memory of 1612 2228 4d56835dbc59a5143390f2fc14475c5815a6d66a2658d55bbd242174082189fd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d56835dbc59a5143390f2fc14475c5815a6d66a2658d55bbd242174082189fd.exe"C:\Users\Admin\AppData\Local\Temp\4d56835dbc59a5143390f2fc14475c5815a6d66a2658d55bbd242174082189fd.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevbod.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2392
-
-
C:\UserDotQK\abodec.exeC:\UserDotQK\abodec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5dd9118d8d229c38beab96b609656d83b
SHA1c71060ccc5bfa36696f05c48831a2968052733d4
SHA256ea93f8c58cd6e9c81e00283ad2a5f0254c47ddf4a44419aec0e48672f69753d1
SHA512cffe297fa78a22f908506c11e353ed52f34075528b227ae70bbe2948eb4101d4560318dfb5298c88b96a1cfe3022fb9d11ef2b8c738f41d5ecad59adc3c2c224
-
Filesize
171B
MD5ccecdb40628c1bffc9d64ac4a0e126ca
SHA16d50cf3c9d479b48154392106bf75593212fbe96
SHA2562b2c0d2179471a39c31c079c6f9ac4a0b071adb12ea0a776bd6e93997b96413e
SHA5124a828c30a8ee0d1567d47e6f584083ac940f1d1a6c3e4820efe515a1123aef14dda197cf4c48430ca69949a66e8a03318e2bd62b2ab721d2fe9cea7412b063ac
-
Filesize
203B
MD565b7577a1b0ed294b779a540058774fd
SHA122a67bf3d43f18fa36b486034e312f49166cba13
SHA256cb42af56761c561825e7c6056a9f29139857849ae9f475bc9cfc661759e5ef8d
SHA5124cd2ff24726671a4821f08603bcb24bdb608a6bc4ac2c6bef7d977eb9cd0f40e08fb287f30874c424b58758a5b524be3df1910e41d86ab27fa748a53d5a367d3
-
Filesize
3.2MB
MD5968233b408d1d17807ff843417566b51
SHA1cb2557d77944b21305bcfc35f03f83838cacd5f8
SHA256f8297fa131f76b2e840aac08683dc4b088cd731428c3f5c768877e5ed8e9e2bb
SHA5121d01c241d26f6f930b9f154e4e93edcd03e2e0158420e5ed8333d6e121c5e43b4c2de8928b4f2f07cb83ae3dc39dbc76350c959ce27ec2222557609ede9384e7
-
Filesize
3.2MB
MD5c403147d635b2dc73e1e767a50a7d2e6
SHA1be0dc40a9774b5f7259f21d8533afb00a659a75e
SHA2568cd8c60328dcc05b3f7a4cfede38b7b435fc9c992ce86ebd6aa0bba2c9df8e3b
SHA51280989bbbd54b1233a368c9b9461ff7d191030942ed0244cfb59a7edeeaae313e9c80c9691f7359d7e854f36d9092c72cfc8da7e655ac5103d0fd20c100e769d4