Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/06/2024, 03:59
Static task
static1
Behavioral task
behavioral1
Sample
882494401c57b52fa37b291e52ec01f9bbd32eed4ede91e17e7d1f79e885c5fd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
882494401c57b52fa37b291e52ec01f9bbd32eed4ede91e17e7d1f79e885c5fd.exe
Resource
win10v2004-20240226-en
General
-
Target
882494401c57b52fa37b291e52ec01f9bbd32eed4ede91e17e7d1f79e885c5fd.exe
-
Size
3.6MB
-
MD5
1324d818b8971b32a7c9de480ac1f64a
-
SHA1
e5eb70ffbc50ec3f77cf94e1f84611f479b33f94
-
SHA256
882494401c57b52fa37b291e52ec01f9bbd32eed4ede91e17e7d1f79e885c5fd
-
SHA512
e354d796a37a6289b93672adcd16002fe93f5b57b3999d7d0ee0fae8e758bd81a0380813f8faa9d1bb7564429adf02351df856f2dcaef8bf8f5be386ea31e269
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB/B/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUpUbVz8eLFcz
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe 882494401c57b52fa37b291e52ec01f9bbd32eed4ede91e17e7d1f79e885c5fd.exe -
Executes dropped EXE 2 IoCs
pid Process 1432 ecxopti.exe 3316 xdobsys.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBR3\\dobdevloc.exe" 882494401c57b52fa37b291e52ec01f9bbd32eed4ede91e17e7d1f79e885c5fd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeZW\\xdobsys.exe" 882494401c57b52fa37b291e52ec01f9bbd32eed4ede91e17e7d1f79e885c5fd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 628 882494401c57b52fa37b291e52ec01f9bbd32eed4ede91e17e7d1f79e885c5fd.exe 628 882494401c57b52fa37b291e52ec01f9bbd32eed4ede91e17e7d1f79e885c5fd.exe 628 882494401c57b52fa37b291e52ec01f9bbd32eed4ede91e17e7d1f79e885c5fd.exe 628 882494401c57b52fa37b291e52ec01f9bbd32eed4ede91e17e7d1f79e885c5fd.exe 1432 ecxopti.exe 1432 ecxopti.exe 3316 xdobsys.exe 3316 xdobsys.exe 1432 ecxopti.exe 1432 ecxopti.exe 3316 xdobsys.exe 3316 xdobsys.exe 1432 ecxopti.exe 1432 ecxopti.exe 3316 xdobsys.exe 3316 xdobsys.exe 1432 ecxopti.exe 1432 ecxopti.exe 3316 xdobsys.exe 3316 xdobsys.exe 1432 ecxopti.exe 1432 ecxopti.exe 3316 xdobsys.exe 3316 xdobsys.exe 1432 ecxopti.exe 1432 ecxopti.exe 3316 xdobsys.exe 3316 xdobsys.exe 1432 ecxopti.exe 1432 ecxopti.exe 3316 xdobsys.exe 3316 xdobsys.exe 1432 ecxopti.exe 1432 ecxopti.exe 3316 xdobsys.exe 3316 xdobsys.exe 1432 ecxopti.exe 1432 ecxopti.exe 3316 xdobsys.exe 3316 xdobsys.exe 1432 ecxopti.exe 1432 ecxopti.exe 3316 xdobsys.exe 3316 xdobsys.exe 1432 ecxopti.exe 1432 ecxopti.exe 3316 xdobsys.exe 3316 xdobsys.exe 1432 ecxopti.exe 1432 ecxopti.exe 3316 xdobsys.exe 3316 xdobsys.exe 1432 ecxopti.exe 1432 ecxopti.exe 3316 xdobsys.exe 3316 xdobsys.exe 1432 ecxopti.exe 1432 ecxopti.exe 3316 xdobsys.exe 3316 xdobsys.exe 1432 ecxopti.exe 1432 ecxopti.exe 3316 xdobsys.exe 3316 xdobsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 628 wrote to memory of 1432 628 882494401c57b52fa37b291e52ec01f9bbd32eed4ede91e17e7d1f79e885c5fd.exe 91 PID 628 wrote to memory of 1432 628 882494401c57b52fa37b291e52ec01f9bbd32eed4ede91e17e7d1f79e885c5fd.exe 91 PID 628 wrote to memory of 1432 628 882494401c57b52fa37b291e52ec01f9bbd32eed4ede91e17e7d1f79e885c5fd.exe 91 PID 628 wrote to memory of 3316 628 882494401c57b52fa37b291e52ec01f9bbd32eed4ede91e17e7d1f79e885c5fd.exe 92 PID 628 wrote to memory of 3316 628 882494401c57b52fa37b291e52ec01f9bbd32eed4ede91e17e7d1f79e885c5fd.exe 92 PID 628 wrote to memory of 3316 628 882494401c57b52fa37b291e52ec01f9bbd32eed4ede91e17e7d1f79e885c5fd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\882494401c57b52fa37b291e52ec01f9bbd32eed4ede91e17e7d1f79e885c5fd.exe"C:\Users\Admin\AppData\Local\Temp\882494401c57b52fa37b291e52ec01f9bbd32eed4ede91e17e7d1f79e885c5fd.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1432
-
-
C:\AdobeZW\xdobsys.exeC:\AdobeZW\xdobsys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3976 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:81⤵PID:3652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5dde95a62541235bec6f1c3cc6ad5c416
SHA1075e2055b545a1f9aa79bb5218ef0af8cae9b3bb
SHA2567a32face3979bbb510b2778c6fb1c6dc4b538429779624473b36d9e031131d6f
SHA512fef68e452ba21e401b0c148c6cc5db8332580a20f4b4addef74c57987840c6efd5cfd59095a610d16852c3f136c9ee31aea31be8d813d2a90eff953fa35328a7
-
Filesize
2.9MB
MD5e550fb335a9e353924c5af7c2b51627e
SHA1bbaf12caf0c506d1da85f93da96806caaf08629e
SHA256c51d38a3ece9814f409dd775bd5025c9172cd4f33d43c5e5420247cce40855d2
SHA512e2772d7afe696e1f09882f3dcfebd3f288b17199fcba046458df0af891e31cb99b8f46cab215e73f453fed7e0e86428f22c9c0814a6a185ff92b1c20e77776b1
-
Filesize
6KB
MD5eca5ea25f6a32a95c09d2d11f140c43b
SHA1fc7c4ffc46b345747cc079073a62c80c129f2442
SHA2567d956fbd2f73b9d56dbb1fa91bb438857ce1495cd868cdc6d6daea38edfcff17
SHA51227d28a94c6c9d88714e07d1c5d856b348aaffe7164a680aa4aa760c4a738cf9fed9f373ea895b3dfa3e80ea1b8702679ff32bafeb7e84ada4fe30ff30b1add61
-
Filesize
202B
MD5b0f982260ed71855d8d99557c623b297
SHA1a500b9361a9d2100de16200932c90c65810997a5
SHA2561c16fa91d12b40ee9cc117bb794acca11819f32fc5394dceeb83417cf04e18bd
SHA5126f860730859aedbecdda503a9e26f3548a8c6887b64b43c7ae931f2b9234947e06c2472127a0ddc2ccc62a1a9fdcd7b25d10474f5a342dbd6f86a80a2d885912
-
Filesize
170B
MD56394766f2c0cc32b9fe1824399876f6e
SHA19b774ed8c36173bc0c7be7968a52975db612bc60
SHA2565e4e5bac88de342b1f1ffcb00d6d358decfef7dc2eb4526ff526cc65ed785598
SHA5129a38cf98d4d75a89466b2753214e3a42afe7a1a63b8783640f95f53dac2e405ea8fe475cb424c8a3b7c75dad55a9a21b915fa6d1ff4781f448dd4a1e7bb9ed54
-
Filesize
3.6MB
MD558d6ae14947cff252fad1592a0dda60e
SHA1210dbc9f8a1dd8524d416f199788e73fa7b8dccd
SHA256542f9ec4e018e17d4e61bb3d8c56be0ada3e5053f21614f1c9004628eccc5abb
SHA51279e5a4aa4117f8254b488e187b6c4bc579fdea1e2f0d6b844be540ed13cea6f56781b26e038f934866a39e108e86cd0bc24d70a781d69ef86de2181440463adf