Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 04:37
Static task
static1
Behavioral task
behavioral1
Sample
ea42bdaa4ea83af02de640a99df3a3b8bd51fa1a7a4e4512ea0f006d8dc52ca6.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
ea42bdaa4ea83af02de640a99df3a3b8bd51fa1a7a4e4512ea0f006d8dc52ca6.exe
Resource
win10v2004-20240426-en
General
-
Target
ea42bdaa4ea83af02de640a99df3a3b8bd51fa1a7a4e4512ea0f006d8dc52ca6.exe
-
Size
4.1MB
-
MD5
378c6ab3c3e71ac7d5539c32c295c9cb
-
SHA1
7ddc7c876c17b7d8d1474bd91827ff9f165e82e3
-
SHA256
ea42bdaa4ea83af02de640a99df3a3b8bd51fa1a7a4e4512ea0f006d8dc52ca6
-
SHA512
36df82cc81143dff7e672d7971362853148b3b895999f696c536d8b783ee9c4cf1b51c26e003129aab6d03e6c55e6aea45f74d2bda30812ca3f891db4f0d620c
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB2B/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUp5bVz8eLFcz
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevopti.exe ea42bdaa4ea83af02de640a99df3a3b8bd51fa1a7a4e4512ea0f006d8dc52ca6.exe -
Executes dropped EXE 2 IoCs
pid Process 2268 locdevopti.exe 992 abodec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeNJ\\abodec.exe" ea42bdaa4ea83af02de640a99df3a3b8bd51fa1a7a4e4512ea0f006d8dc52ca6.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Galax0I\\optidevsys.exe" ea42bdaa4ea83af02de640a99df3a3b8bd51fa1a7a4e4512ea0f006d8dc52ca6.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3740 ea42bdaa4ea83af02de640a99df3a3b8bd51fa1a7a4e4512ea0f006d8dc52ca6.exe 3740 ea42bdaa4ea83af02de640a99df3a3b8bd51fa1a7a4e4512ea0f006d8dc52ca6.exe 3740 ea42bdaa4ea83af02de640a99df3a3b8bd51fa1a7a4e4512ea0f006d8dc52ca6.exe 3740 ea42bdaa4ea83af02de640a99df3a3b8bd51fa1a7a4e4512ea0f006d8dc52ca6.exe 2268 locdevopti.exe 2268 locdevopti.exe 992 abodec.exe 992 abodec.exe 2268 locdevopti.exe 2268 locdevopti.exe 992 abodec.exe 992 abodec.exe 2268 locdevopti.exe 2268 locdevopti.exe 992 abodec.exe 992 abodec.exe 2268 locdevopti.exe 2268 locdevopti.exe 992 abodec.exe 992 abodec.exe 2268 locdevopti.exe 2268 locdevopti.exe 992 abodec.exe 992 abodec.exe 2268 locdevopti.exe 2268 locdevopti.exe 992 abodec.exe 992 abodec.exe 2268 locdevopti.exe 2268 locdevopti.exe 992 abodec.exe 992 abodec.exe 2268 locdevopti.exe 2268 locdevopti.exe 992 abodec.exe 992 abodec.exe 2268 locdevopti.exe 2268 locdevopti.exe 992 abodec.exe 992 abodec.exe 2268 locdevopti.exe 2268 locdevopti.exe 992 abodec.exe 992 abodec.exe 2268 locdevopti.exe 2268 locdevopti.exe 992 abodec.exe 992 abodec.exe 2268 locdevopti.exe 2268 locdevopti.exe 992 abodec.exe 992 abodec.exe 2268 locdevopti.exe 2268 locdevopti.exe 992 abodec.exe 992 abodec.exe 2268 locdevopti.exe 2268 locdevopti.exe 992 abodec.exe 992 abodec.exe 2268 locdevopti.exe 2268 locdevopti.exe 992 abodec.exe 992 abodec.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3740 wrote to memory of 2268 3740 ea42bdaa4ea83af02de640a99df3a3b8bd51fa1a7a4e4512ea0f006d8dc52ca6.exe 80 PID 3740 wrote to memory of 2268 3740 ea42bdaa4ea83af02de640a99df3a3b8bd51fa1a7a4e4512ea0f006d8dc52ca6.exe 80 PID 3740 wrote to memory of 2268 3740 ea42bdaa4ea83af02de640a99df3a3b8bd51fa1a7a4e4512ea0f006d8dc52ca6.exe 80 PID 3740 wrote to memory of 992 3740 ea42bdaa4ea83af02de640a99df3a3b8bd51fa1a7a4e4512ea0f006d8dc52ca6.exe 81 PID 3740 wrote to memory of 992 3740 ea42bdaa4ea83af02de640a99df3a3b8bd51fa1a7a4e4512ea0f006d8dc52ca6.exe 81 PID 3740 wrote to memory of 992 3740 ea42bdaa4ea83af02de640a99df3a3b8bd51fa1a7a4e4512ea0f006d8dc52ca6.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea42bdaa4ea83af02de640a99df3a3b8bd51fa1a7a4e4512ea0f006d8dc52ca6.exe"C:\Users\Admin\AppData\Local\Temp\ea42bdaa4ea83af02de640a99df3a3b8bd51fa1a7a4e4512ea0f006d8dc52ca6.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevopti.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2268
-
-
C:\AdobeNJ\abodec.exeC:\AdobeNJ\abodec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5743e6962ef1e219147823720da17954a
SHA1e974f1abe04d6427ec47586797dd875bc4aaab33
SHA2560894d5d69d93d8e02753dab962c2ebb2f92407e07f5c70d09eaaaec774187d94
SHA512a20e63c13af993951683cb8868fc76c68b2476ac16065fe72b49131a5de7c6bca3f66e1943f4dba2cc90439ca75e7ebf6d304ff256d90ed858b30aa3b0d1d211
-
Filesize
4.1MB
MD5263d6d559ee2515c532cfa67786de05b
SHA1bd9942de65a341267b925cc3c975c8b53e06dbc6
SHA25614a6bc33d88163741c314c158a069eda3c0c85e1084c13c99bfc92aac7b393d5
SHA512975122ddd1eebd88cd9f487b06c88452de4e685e9e17529330fca759cae969ed3b168f78f30c0bea206cb6268abb9fa319db18821600bf92f367624dd2ac1a71
-
Filesize
4.1MB
MD51acde337eae411a5dd1e04d19e34c3c3
SHA1b8460bb60d3e46fec0914a233f71a57950d03daa
SHA2565fd6686729f721b494d8dc002773e2487f291daab011e67402787173b602d069
SHA5123da045d36b4c79a5d245ccb34c43876f2bba136dddd8b95b4db8caef1861c2eda6c895de7e30a8eb10ff2146cac00faaf3869102f06c17829e2577901eca4a95
-
Filesize
4.1MB
MD54040ea63791209bef87c4adf4cf0f264
SHA1c90fadc19b20963b64bf9c6b12884d072702015d
SHA256da191608adedcf6dcc76700c047eb0eecb1de7a0d1806c1dfd3f837ed4ed8bf9
SHA512b5429da5a7093f5116b988e4192a063a22682d19209a5f80d63a2c475858c873560002795aa26dbfc266dc162096f6b9790fd6924fb11d3218efe40ca48244c1
-
Filesize
206B
MD500f82e4b2b9c0773bb24377f78e841e9
SHA1dc04adc69e5d854d319ac24643cedcd923313915
SHA25622b6063192480fe9e4083493174c073ae97c12d662a7f51da437672494457058
SHA5120d18047882cb2e03a998f7ab164c91c96b0e238c840868cc5a8fc54ee555c9b55ec341adf38721cc885c2c44fa6ee7d7eaf37c3743da12556fc49253726bcc8b
-
Filesize
174B
MD572ad26bedad0e4a0786c3b9966b612d9
SHA176c5845c472e7ee3f43063651951d295a31704ea
SHA25679532f2f62a552dc4671bf72404401318b93fadc749feadf37b389b09754aa0b
SHA5124bcd5bdbe2dec32f0d004f79ffa70954617b0ab685da884a3bb4ebf0e653480cd460fc4feb185b589b68fe4bdab05fb614f556785634647bf2206e752d3b6d43
-
Filesize
4.1MB
MD5866f4063f18c048ef8847684935b525f
SHA177e279d12e4866da157ccc43b93eee08eefefce1
SHA256d23c359198d462d9507d0c9fb2d392d1499fbe63b525ac51ecd3a0c3aebbb030
SHA5128455538bdbed1e6de37857eb4d70011ad638c073500a351a51475081772790d1a528c48651bab94ba86ecda472bf63a5e5b319c531dc9dc31b2cde3bb00f78da