Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/06/2024, 06:22
Static task
static1
Behavioral task
behavioral1
Sample
a5965533ccb855947e0a54f05ac4de72d358da6b44f737a835bc940e9975eba8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a5965533ccb855947e0a54f05ac4de72d358da6b44f737a835bc940e9975eba8.exe
Resource
win10v2004-20240426-en
General
-
Target
a5965533ccb855947e0a54f05ac4de72d358da6b44f737a835bc940e9975eba8.exe
-
Size
3.9MB
-
MD5
5b336d1fc4643b07f1065f3ce3cd6e33
-
SHA1
5619f103b46567fe6a1917fea048673bcc1db45a
-
SHA256
a5965533ccb855947e0a54f05ac4de72d358da6b44f737a835bc940e9975eba8
-
SHA512
8e6cd83e93d2fe720ddcb5a9660953aaf13fb5715a721396b7626181ac620b05016f98c6cd812ecab774cd6517b433ecfcaec244dbdb38f8a82f1517db3c1de9
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBGB/bSqz8:sxX7QnxrloE5dpUpFbVz8
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecaopti.exe a5965533ccb855947e0a54f05ac4de72d358da6b44f737a835bc940e9975eba8.exe -
Executes dropped EXE 2 IoCs
pid Process 1732 ecaopti.exe 3068 devoptiec.exe -
Loads dropped DLL 2 IoCs
pid Process 2340 a5965533ccb855947e0a54f05ac4de72d358da6b44f737a835bc940e9975eba8.exe 2340 a5965533ccb855947e0a54f05ac4de72d358da6b44f737a835bc940e9975eba8.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvAL\\devoptiec.exe" a5965533ccb855947e0a54f05ac4de72d358da6b44f737a835bc940e9975eba8.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZ1B\\dobaloc.exe" a5965533ccb855947e0a54f05ac4de72d358da6b44f737a835bc940e9975eba8.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2340 a5965533ccb855947e0a54f05ac4de72d358da6b44f737a835bc940e9975eba8.exe 2340 a5965533ccb855947e0a54f05ac4de72d358da6b44f737a835bc940e9975eba8.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe 1732 ecaopti.exe 3068 devoptiec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2340 wrote to memory of 1732 2340 a5965533ccb855947e0a54f05ac4de72d358da6b44f737a835bc940e9975eba8.exe 28 PID 2340 wrote to memory of 1732 2340 a5965533ccb855947e0a54f05ac4de72d358da6b44f737a835bc940e9975eba8.exe 28 PID 2340 wrote to memory of 1732 2340 a5965533ccb855947e0a54f05ac4de72d358da6b44f737a835bc940e9975eba8.exe 28 PID 2340 wrote to memory of 1732 2340 a5965533ccb855947e0a54f05ac4de72d358da6b44f737a835bc940e9975eba8.exe 28 PID 2340 wrote to memory of 3068 2340 a5965533ccb855947e0a54f05ac4de72d358da6b44f737a835bc940e9975eba8.exe 29 PID 2340 wrote to memory of 3068 2340 a5965533ccb855947e0a54f05ac4de72d358da6b44f737a835bc940e9975eba8.exe 29 PID 2340 wrote to memory of 3068 2340 a5965533ccb855947e0a54f05ac4de72d358da6b44f737a835bc940e9975eba8.exe 29 PID 2340 wrote to memory of 3068 2340 a5965533ccb855947e0a54f05ac4de72d358da6b44f737a835bc940e9975eba8.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5965533ccb855947e0a54f05ac4de72d358da6b44f737a835bc940e9975eba8.exe"C:\Users\Admin\AppData\Local\Temp\a5965533ccb855947e0a54f05ac4de72d358da6b44f737a835bc940e9975eba8.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecaopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecaopti.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1732
-
-
C:\SysDrvAL\devoptiec.exeC:\SysDrvAL\devoptiec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD5b3d03459761944e24ddc52f328612530
SHA1217cf5a94dc8d477a0a11cdfc1396de74cd22b99
SHA2564782c068861546dd8c0405316e884851916484411371ff36db18edb868d8332d
SHA512f26b49f6d06d964eac9a8073836ef8b6d6245e73a7269219575689070a7933d8f5883c15c516b5a46c7d81070f717d5455c50809ec5462dd632eec8f0863e37c
-
Filesize
12KB
MD55ce46de9d1c8ab23eeb8a98bb0b2232e
SHA1eb2b026ffaf5a7802065fa5971c5c4495fa6763a
SHA2560f99b7bc2b192971b8bed8dbf4f50389b59e62d5cae4d0fbbb58657c2730a6b0
SHA512173969eb6ea4e493f9c0d1c1df5c1080fb72fc38f0fc13e5eaffdd7eeae658b9464603a66d0a918d3f86bca65b97dccfd201cd7d66c1758e452476026a290712
-
Filesize
3.9MB
MD58a27838b3e5037c80709e6b92282e07a
SHA1cbae7aff6cca342ac7ab76a1e5637d5c8fbe38e0
SHA25641a33e26489358e5de94f8d7b917f707318ee0f05b1c0933b4cd5c66e62d891b
SHA512c40f81b4d90e20d0bb6c462c18f48256ae5486e6870b79407d17751fe7709e00fc801e1ae78e5522c0fe912cbac8148c62508f0ce6116bdf3a464abd749f61bd
-
Filesize
171B
MD55e664c93c94dab8139945c9039bdb9c0
SHA1131c2068435005fb73b227167ff69c5da7a9cc57
SHA25679362c3c61c344d44a6f7bf696f96c18793a42a1b757c0eb344a102ca36714c1
SHA512b10891ac2fe8d5769afb1ed0f846c00b1e402737b627cb61371ac8d1c60fadac229852db39bf812e7249c355740e4374a69de329028fac449925e40aa5062dfb
-
Filesize
203B
MD5300fe08944b8288980b5dc81809be264
SHA11331189b9b8c1cef30a01d7ce1263cd937344de0
SHA2566f92dbdd2284e5349957fb224fa0deb065ca0bb96628a7b3762c7237b25f5127
SHA512f9eb4d13d8d13ac8dc7ac6344c41c31ba4e68fcdc9a2116a352e72d9232de4c66d1b073744e041c0ea08457485c3bfeed002b0b8d6f6ea50c728dd40f9c6670e
-
Filesize
3.9MB
MD594407cbdfaae5e30946559c437e2b857
SHA19d47953a03f6b0110944fc198eae4c01693b75e0
SHA25610456107005a10aa5ec3db13c7a04488a074ba9faf06d3bd30ab4547d7f9a5a1
SHA512476e0a2378b1b29e6d48228c4be04a2dc1590f190e8bb9a9c6de420dc4d561cc1321cf01cfcda3ce2a6370287c2a52b9feca7d1d35a4450501f556ac21e8b79a