Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 20:41
Static task
static1
Behavioral task
behavioral1
Sample
3b409decd09409a083ebf29e2f5bc8b57b2899ef7eadaa4fdc689cc5d341d3a7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3b409decd09409a083ebf29e2f5bc8b57b2899ef7eadaa4fdc689cc5d341d3a7.exe
Resource
win10v2004-20240508-en
General
-
Target
3b409decd09409a083ebf29e2f5bc8b57b2899ef7eadaa4fdc689cc5d341d3a7.exe
-
Size
4.0MB
-
MD5
0bc2a6be9c70c4b4a8c3a4e1c8b6fd58
-
SHA1
6d76ba30b6723ee6036470aea1d26d52edb3f2af
-
SHA256
3b409decd09409a083ebf29e2f5bc8b57b2899ef7eadaa4fdc689cc5d341d3a7
-
SHA512
f1eeeb2aa921ffe0b04f287c1c1e3aef4b59a191c4239629f3d32ad9917f29e72d99f9e78962536f65f8ef8c40bb663a8fc41758003816a0ea3d400bdb5f92b2
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBmB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUplbVz8eLFcz
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
3b409decd09409a083ebf29e2f5bc8b57b2899ef7eadaa4fdc689cc5d341d3a7.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecaopti.exe 3b409decd09409a083ebf29e2f5bc8b57b2899ef7eadaa4fdc689cc5d341d3a7.exe -
Executes dropped EXE 2 IoCs
Processes:
ecaopti.exedevbodloc.exepid process 2780 ecaopti.exe 2548 devbodloc.exe -
Loads dropped DLL 2 IoCs
Processes:
3b409decd09409a083ebf29e2f5bc8b57b2899ef7eadaa4fdc689cc5d341d3a7.exepid process 2156 3b409decd09409a083ebf29e2f5bc8b57b2899ef7eadaa4fdc689cc5d341d3a7.exe 2156 3b409decd09409a083ebf29e2f5bc8b57b2899ef7eadaa4fdc689cc5d341d3a7.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
3b409decd09409a083ebf29e2f5bc8b57b2899ef7eadaa4fdc689cc5d341d3a7.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocZ1\\devbodloc.exe" 3b409decd09409a083ebf29e2f5bc8b57b2899ef7eadaa4fdc689cc5d341d3a7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Vid9U\\optixec.exe" 3b409decd09409a083ebf29e2f5bc8b57b2899ef7eadaa4fdc689cc5d341d3a7.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3b409decd09409a083ebf29e2f5bc8b57b2899ef7eadaa4fdc689cc5d341d3a7.exeecaopti.exedevbodloc.exepid process 2156 3b409decd09409a083ebf29e2f5bc8b57b2899ef7eadaa4fdc689cc5d341d3a7.exe 2156 3b409decd09409a083ebf29e2f5bc8b57b2899ef7eadaa4fdc689cc5d341d3a7.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe 2780 ecaopti.exe 2548 devbodloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
3b409decd09409a083ebf29e2f5bc8b57b2899ef7eadaa4fdc689cc5d341d3a7.exedescription pid process target process PID 2156 wrote to memory of 2780 2156 3b409decd09409a083ebf29e2f5bc8b57b2899ef7eadaa4fdc689cc5d341d3a7.exe ecaopti.exe PID 2156 wrote to memory of 2780 2156 3b409decd09409a083ebf29e2f5bc8b57b2899ef7eadaa4fdc689cc5d341d3a7.exe ecaopti.exe PID 2156 wrote to memory of 2780 2156 3b409decd09409a083ebf29e2f5bc8b57b2899ef7eadaa4fdc689cc5d341d3a7.exe ecaopti.exe PID 2156 wrote to memory of 2780 2156 3b409decd09409a083ebf29e2f5bc8b57b2899ef7eadaa4fdc689cc5d341d3a7.exe ecaopti.exe PID 2156 wrote to memory of 2548 2156 3b409decd09409a083ebf29e2f5bc8b57b2899ef7eadaa4fdc689cc5d341d3a7.exe devbodloc.exe PID 2156 wrote to memory of 2548 2156 3b409decd09409a083ebf29e2f5bc8b57b2899ef7eadaa4fdc689cc5d341d3a7.exe devbodloc.exe PID 2156 wrote to memory of 2548 2156 3b409decd09409a083ebf29e2f5bc8b57b2899ef7eadaa4fdc689cc5d341d3a7.exe devbodloc.exe PID 2156 wrote to memory of 2548 2156 3b409decd09409a083ebf29e2f5bc8b57b2899ef7eadaa4fdc689cc5d341d3a7.exe devbodloc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b409decd09409a083ebf29e2f5bc8b57b2899ef7eadaa4fdc689cc5d341d3a7.exe"C:\Users\Admin\AppData\Local\Temp\3b409decd09409a083ebf29e2f5bc8b57b2899ef7eadaa4fdc689cc5d341d3a7.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecaopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecaopti.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\IntelprocZ1\devbodloc.exeC:\IntelprocZ1\devbodloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\IntelprocZ1\devbodloc.exeFilesize
4.0MB
MD5819fbf32902949b5079dc2d71e64f78a
SHA15e672158f9dbeb02596918231a9ff02ec660e584
SHA25645e93ed4e4f7e0f0b819b43917431bd931f47667ba6b62bbb082fdc29ae414d9
SHA512b26e9baf7df4814bdda8dd671899264a55452d46b9f92481dde3e9d8bd6f388dde096e0a640d70306b39ecdc4dfad81b6277e114e23ec9e9f5aa01fbb3c039eb
-
C:\Users\Admin\253086396416_6.1_Admin.iniFilesize
173B
MD57331ed14ebf91bcce77702a7a0656c61
SHA100b78ac53311472296a435090e79d3cc8cf0170a
SHA25684969b25d8b9a1650d631808d8ed8909400b894c2760f2df2a9ac7cc0c73c614
SHA51256a7e4b2526b72432b3cbed265996f55b81796e91c40b7cf915127693270204735357a959b31e58a5ade132037be441dae93445815dd0f9aca9e9aedf5d09b6a
-
C:\Users\Admin\253086396416_6.1_Admin.iniFilesize
205B
MD5e49d5e39a8471fdc7b2e6e70c138b203
SHA12917e20d024db03f2a63db8d24194e67ba2acc67
SHA2569b9e5971aa3fce0f38f444e1d9704442ac1e98eb10e828a56badbf8b584aeb89
SHA512225f3ab38a30fda56e32740c3ad009a9681adf48aeaec38b95fb52b9474a74f1cabc6d7d5e58b2b247627b0d2b5706c7fb153880182ee41bdccb62b3154ff110
-
C:\Vid9U\optixec.exeFilesize
1024KB
MD590ae4fede7abc64a0f6047848c4df1ed
SHA17d2c7ba2bad34d678099158587218c05d33d67a6
SHA25641632a9068f4384ad13766464bc2bb3a2e48d779857fa7bbd7fde485473c7a35
SHA51291595e3923179f9a9f869368413314be202c147352239d379c0c5cb1fbb9f070bfefbc1d4def79c74c8d4aaf1a11f31c6206ef87d200340b874d7fa7afdc93ec
-
C:\Vid9U\optixec.exeFilesize
4.0MB
MD51e1c2ebc53a8edfd94421afe3d5665cf
SHA18b57ab755aeb44b265321f17fd632fb1d7a56c29
SHA2567fa8140fd63e73553b31083bf4d14a8e53e15a5458696cfed4a2a26e9d9a67a0
SHA512fcc2a884955c657f8546e4fa9e217f41e1bfe7cc107a8708fb84623d0bae30ac1a8c2d7acd90ebefe30d8561ae4fb89e276dcf4d0079267ac9579d97872e812d
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecaopti.exeFilesize
4.0MB
MD5fae9190b5ba3cb913e36f28ff2ce204f
SHA114da075a7a8643e6e09241744b95b2cbd36ab91b
SHA25607ab8381fe6bd07da48a52dd0cf13e5b79f5037466d353f05f27a9d69d278289
SHA51261736ce9d5e1b5ad1d433890ba3ddbeea71b87b1b80a9f55b783f5fe3e6f8dbb3f864ff613046e4151d55104b3f34b0f975b594e4d8cc6f8386fbe4089e6e1c5