Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/06/2024, 03:59

General

  • Target

    882494401c57b52fa37b291e52ec01f9bbd32eed4ede91e17e7d1f79e885c5fd.exe

  • Size

    3.6MB

  • MD5

    1324d818b8971b32a7c9de480ac1f64a

  • SHA1

    e5eb70ffbc50ec3f77cf94e1f84611f479b33f94

  • SHA256

    882494401c57b52fa37b291e52ec01f9bbd32eed4ede91e17e7d1f79e885c5fd

  • SHA512

    e354d796a37a6289b93672adcd16002fe93f5b57b3999d7d0ee0fae8e758bd81a0380813f8faa9d1bb7564429adf02351df856f2dcaef8bf8f5be386ea31e269

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB/B/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUpUbVz8eLFcz

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\882494401c57b52fa37b291e52ec01f9bbd32eed4ede91e17e7d1f79e885c5fd.exe
    "C:\Users\Admin\AppData\Local\Temp\882494401c57b52fa37b291e52ec01f9bbd32eed4ede91e17e7d1f79e885c5fd.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:628
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1432
    • C:\AdobeZW\xdobsys.exe
      C:\AdobeZW\xdobsys.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:3316
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3976 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3652

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\AdobeZW\xdobsys.exe

      Filesize

      3.6MB

      MD5

      dde95a62541235bec6f1c3cc6ad5c416

      SHA1

      075e2055b545a1f9aa79bb5218ef0af8cae9b3bb

      SHA256

      7a32face3979bbb510b2778c6fb1c6dc4b538429779624473b36d9e031131d6f

      SHA512

      fef68e452ba21e401b0c148c6cc5db8332580a20f4b4addef74c57987840c6efd5cfd59095a610d16852c3f136c9ee31aea31be8d813d2a90eff953fa35328a7

    • C:\KaVBR3\dobdevloc.exe

      Filesize

      2.9MB

      MD5

      e550fb335a9e353924c5af7c2b51627e

      SHA1

      bbaf12caf0c506d1da85f93da96806caaf08629e

      SHA256

      c51d38a3ece9814f409dd775bd5025c9172cd4f33d43c5e5420247cce40855d2

      SHA512

      e2772d7afe696e1f09882f3dcfebd3f288b17199fcba046458df0af891e31cb99b8f46cab215e73f453fed7e0e86428f22c9c0814a6a185ff92b1c20e77776b1

    • C:\KaVBR3\dobdevloc.exe

      Filesize

      6KB

      MD5

      eca5ea25f6a32a95c09d2d11f140c43b

      SHA1

      fc7c4ffc46b345747cc079073a62c80c129f2442

      SHA256

      7d956fbd2f73b9d56dbb1fa91bb438857ce1495cd868cdc6d6daea38edfcff17

      SHA512

      27d28a94c6c9d88714e07d1c5d856b348aaffe7164a680aa4aa760c4a738cf9fed9f373ea895b3dfa3e80ea1b8702679ff32bafeb7e84ada4fe30ff30b1add61

    • C:\Users\Admin\253086396416_10.0_Admin.ini

      Filesize

      202B

      MD5

      b0f982260ed71855d8d99557c623b297

      SHA1

      a500b9361a9d2100de16200932c90c65810997a5

      SHA256

      1c16fa91d12b40ee9cc117bb794acca11819f32fc5394dceeb83417cf04e18bd

      SHA512

      6f860730859aedbecdda503a9e26f3548a8c6887b64b43c7ae931f2b9234947e06c2472127a0ddc2ccc62a1a9fdcd7b25d10474f5a342dbd6f86a80a2d885912

    • C:\Users\Admin\253086396416_10.0_Admin.ini

      Filesize

      170B

      MD5

      6394766f2c0cc32b9fe1824399876f6e

      SHA1

      9b774ed8c36173bc0c7be7968a52975db612bc60

      SHA256

      5e4e5bac88de342b1f1ffcb00d6d358decfef7dc2eb4526ff526cc65ed785598

      SHA512

      9a38cf98d4d75a89466b2753214e3a42afe7a1a63b8783640f95f53dac2e405ea8fe475cb424c8a3b7c75dad55a9a21b915fa6d1ff4781f448dd4a1e7bb9ed54

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe

      Filesize

      3.6MB

      MD5

      58d6ae14947cff252fad1592a0dda60e

      SHA1

      210dbc9f8a1dd8524d416f199788e73fa7b8dccd

      SHA256

      542f9ec4e018e17d4e61bb3d8c56be0ada3e5053f21614f1c9004628eccc5abb

      SHA512

      79e5a4aa4117f8254b488e187b6c4bc579fdea1e2f0d6b844be540ed13cea6f56781b26e038f934866a39e108e86cd0bc24d70a781d69ef86de2181440463adf