Analysis

  • max time kernel
    149s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    03-05-2024 21:33

General

  • Target

    4d56835dbc59a5143390f2fc14475c5815a6d66a2658d55bbd242174082189fd.exe

  • Size

    3.2MB

  • MD5

    ec6846f3af911edd9b87f8b4f6ae1388

  • SHA1

    0535f71272c59fa4ab93d60f3c57726ab22249fa

  • SHA256

    4d56835dbc59a5143390f2fc14475c5815a6d66a2658d55bbd242174082189fd

  • SHA512

    85fa7c07fcd1e6ab62a0de15acb1f0222d5e354f748402ebccffc600fc9a531f24b3ed32fd63710a79220a30f52475a71b3810d187dfa67b1ee5416cf4cfce20

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB0B/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUpTbVz8eLFcz

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d56835dbc59a5143390f2fc14475c5815a6d66a2658d55bbd242174082189fd.exe
    "C:\Users\Admin\AppData\Local\Temp\4d56835dbc59a5143390f2fc14475c5815a6d66a2658d55bbd242174082189fd.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevbod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevbod.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2392
    • C:\UserDotQK\abodec.exe
      C:\UserDotQK\abodec.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\UserDotQK\abodec.exe

    Filesize

    3.2MB

    MD5

    dd9118d8d229c38beab96b609656d83b

    SHA1

    c71060ccc5bfa36696f05c48831a2968052733d4

    SHA256

    ea93f8c58cd6e9c81e00283ad2a5f0254c47ddf4a44419aec0e48672f69753d1

    SHA512

    cffe297fa78a22f908506c11e353ed52f34075528b227ae70bbe2948eb4101d4560318dfb5298c88b96a1cfe3022fb9d11ef2b8c738f41d5ecad59adc3c2c224

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    171B

    MD5

    ccecdb40628c1bffc9d64ac4a0e126ca

    SHA1

    6d50cf3c9d479b48154392106bf75593212fbe96

    SHA256

    2b2c0d2179471a39c31c079c6f9ac4a0b071adb12ea0a776bd6e93997b96413e

    SHA512

    4a828c30a8ee0d1567d47e6f584083ac940f1d1a6c3e4820efe515a1123aef14dda197cf4c48430ca69949a66e8a03318e2bd62b2ab721d2fe9cea7412b063ac

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    203B

    MD5

    65b7577a1b0ed294b779a540058774fd

    SHA1

    22a67bf3d43f18fa36b486034e312f49166cba13

    SHA256

    cb42af56761c561825e7c6056a9f29139857849ae9f475bc9cfc661759e5ef8d

    SHA512

    4cd2ff24726671a4821f08603bcb24bdb608a6bc4ac2c6bef7d977eb9cd0f40e08fb287f30874c424b58758a5b524be3df1910e41d86ab27fa748a53d5a367d3

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevbod.exe

    Filesize

    3.2MB

    MD5

    968233b408d1d17807ff843417566b51

    SHA1

    cb2557d77944b21305bcfc35f03f83838cacd5f8

    SHA256

    f8297fa131f76b2e840aac08683dc4b088cd731428c3f5c768877e5ed8e9e2bb

    SHA512

    1d01c241d26f6f930b9f154e4e93edcd03e2e0158420e5ed8333d6e121c5e43b4c2de8928b4f2f07cb83ae3dc39dbc76350c959ce27ec2222557609ede9384e7

  • C:\VidTT\optialoc.exe

    Filesize

    3.2MB

    MD5

    c403147d635b2dc73e1e767a50a7d2e6

    SHA1

    be0dc40a9774b5f7259f21d8533afb00a659a75e

    SHA256

    8cd8c60328dcc05b3f7a4cfede38b7b435fc9c992ce86ebd6aa0bba2c9df8e3b

    SHA512

    80989bbbd54b1233a368c9b9461ff7d191030942ed0244cfb59a7edeeaae313e9c80c9691f7359d7e854f36d9092c72cfc8da7e655ac5103d0fd20c100e769d4