Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 19:53
Static task
static1
Behavioral task
behavioral1
Sample
2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe
Resource
win10v2004-20240508-en
General
-
Target
2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe
-
Size
2.6MB
-
MD5
411a3af6ac95d7f3f0308f29bb40fffd
-
SHA1
bd87d2b0d738afe5ac4af9d5b17d58a73446f7a4
-
SHA256
2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a
-
SHA512
fb95f50b3188d87b1ee87073e4c3cf976dbe43fce311d4976be2055f813a85c53cb7a695bf36bcd49a5d4b1d3168055713c34780d406b05d6c9802216dd7c088
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBeB/bS:sxX7QnxrloE5dpUpVb
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe 2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe -
Executes dropped EXE 2 IoCs
Processes:
ecabod.exeadobloc.exepid process 3252 ecabod.exe 372 adobloc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZSA\\boddevloc.exe" 2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocKY\\adobloc.exe" 2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exeecabod.exeadobloc.exepid process 4392 2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe 4392 2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe 4392 2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe 4392 2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe 3252 ecabod.exe 3252 ecabod.exe 372 adobloc.exe 372 adobloc.exe 3252 ecabod.exe 3252 ecabod.exe 372 adobloc.exe 372 adobloc.exe 3252 ecabod.exe 3252 ecabod.exe 372 adobloc.exe 372 adobloc.exe 3252 ecabod.exe 3252 ecabod.exe 372 adobloc.exe 372 adobloc.exe 3252 ecabod.exe 3252 ecabod.exe 372 adobloc.exe 372 adobloc.exe 3252 ecabod.exe 3252 ecabod.exe 372 adobloc.exe 372 adobloc.exe 3252 ecabod.exe 3252 ecabod.exe 372 adobloc.exe 372 adobloc.exe 3252 ecabod.exe 3252 ecabod.exe 372 adobloc.exe 372 adobloc.exe 3252 ecabod.exe 3252 ecabod.exe 372 adobloc.exe 372 adobloc.exe 3252 ecabod.exe 3252 ecabod.exe 372 adobloc.exe 372 adobloc.exe 3252 ecabod.exe 3252 ecabod.exe 372 adobloc.exe 372 adobloc.exe 3252 ecabod.exe 3252 ecabod.exe 372 adobloc.exe 372 adobloc.exe 3252 ecabod.exe 3252 ecabod.exe 372 adobloc.exe 372 adobloc.exe 3252 ecabod.exe 3252 ecabod.exe 372 adobloc.exe 372 adobloc.exe 3252 ecabod.exe 3252 ecabod.exe 372 adobloc.exe 372 adobloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exedescription pid process target process PID 4392 wrote to memory of 3252 4392 2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe ecabod.exe PID 4392 wrote to memory of 3252 4392 2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe ecabod.exe PID 4392 wrote to memory of 3252 4392 2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe ecabod.exe PID 4392 wrote to memory of 372 4392 2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe adobloc.exe PID 4392 wrote to memory of 372 4392 2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe adobloc.exe PID 4392 wrote to memory of 372 4392 2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe adobloc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe"C:\Users\Admin\AppData\Local\Temp\2846487118e6d529062049e8d73daed5c1650249661faf4d2b4bf9fce3c23d2a.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3252
-
-
C:\IntelprocKY\adobloc.exeC:\IntelprocKY\adobloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3452,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=1300 /prefetch:81⤵PID:3704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD55c583e8ad9d7feb69a53d5f2e96acebd
SHA1326c23f66e999034c61d59ffc831aad2cb3c1a6c
SHA25640deffd73a533fae2d5d7b8d313d89bf6a0035c65f4caa9df5699728def84def
SHA51233ff2bdef0d4bcad3a9ff2e178f1e43d74b5ffe27264397865c2d4d2f29e7008b395442d2ba7fdf69c635c3171c2be279c997136b9c9e31d8db08ed23f4da83d
-
Filesize
2.6MB
MD56f4cab2a76a2d7242511fe772d2129de
SHA1672c7819eb737b4aab80e95a0c0ba25e0275f224
SHA256c8ae4193a4f0ea7f024bdc38f535d8dc5051bf8a67693f1975ef6965083a40fa
SHA512b0337f365cf74068ed3544d090fe025ec086d610ac7337953384d8cc0e927989340cc7743ed07b1cc51786267e2020ecf3c153ea670c73aa98ed61bd1dbcf3d0
-
Filesize
2.6MB
MD5c5894d0295fa9b5a9b0c49d3216b02c6
SHA1b33c065b8e0b4ff990557fa993a0c2102c4e5dec
SHA256897c6d4c5dc7cbf8ade89c8832a371ebe289c30f4618b227096e8838d77420c6
SHA512a4ebe90baa31fa5a36a4412a95ec02d4d37ccd738d6d48b45989659a8d3db84603cab55d92e26b39aa53f9c643ded861020de34d63d23384422d22a4e5dd2a38
-
Filesize
205B
MD577a7594500f32e56117ef1d7d19f0431
SHA1d1f0d98a483968f9ad24910395ed0ae579f7fe1d
SHA25615c0a1c3766e961672ab0fd163461c1e2ff2930a5f063622e979dcc97b5c4bf2
SHA5123b441510ed584f76ea6002535e54f77a60badae69e7b8f3ee4ddcbca44151430e5cf1ea543f477dd7d5ec13d73e9788c27ec8dfa58408e782d1f7f4282826743
-
Filesize
173B
MD51941f34944d6a0c9878e5b6e96e43c17
SHA14db2010326a8a0229edddfefa5054349025a9042
SHA256383f25d2ac746606a684f5f8062674d826935dcb3ea30b0f6795d7c10701c66b
SHA512809d04812f87ac389c28885a03e384d6a4c1e072050222070f60ef216d829e1d9221f904ccb97aa4f5a4263333459853050d8e21e0394994a8661b0fb4a4b213
-
Filesize
2.6MB
MD500b14c1135013394caddff53e355d934
SHA1042da24292ca99987d53965d2b3aa0392b32af84
SHA256cc02d58402e04d3ef934dd4f4283f7aa4ddc906658f644f9792b726ab165ef65
SHA512da950c4b4542c3d72b9456b12392eea993c854efd3b2a539968be38ee28b4eb0babaa70e7256dd5c70ae1b964821ee786220cbd41ffa12c5fc907a2988c0663d