Analysis

  • max time kernel
    150s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/06/2024, 04:37

General

  • Target

    ea42bdaa4ea83af02de640a99df3a3b8bd51fa1a7a4e4512ea0f006d8dc52ca6.exe

  • Size

    4.1MB

  • MD5

    378c6ab3c3e71ac7d5539c32c295c9cb

  • SHA1

    7ddc7c876c17b7d8d1474bd91827ff9f165e82e3

  • SHA256

    ea42bdaa4ea83af02de640a99df3a3b8bd51fa1a7a4e4512ea0f006d8dc52ca6

  • SHA512

    36df82cc81143dff7e672d7971362853148b3b895999f696c536d8b783ee9c4cf1b51c26e003129aab6d03e6c55e6aea45f74d2bda30812ca3f891db4f0d620c

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB2B/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUp5bVz8eLFcz

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea42bdaa4ea83af02de640a99df3a3b8bd51fa1a7a4e4512ea0f006d8dc52ca6.exe
    "C:\Users\Admin\AppData\Local\Temp\ea42bdaa4ea83af02de640a99df3a3b8bd51fa1a7a4e4512ea0f006d8dc52ca6.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3740
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevopti.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevopti.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2268
    • C:\AdobeNJ\abodec.exe
      C:\AdobeNJ\abodec.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:992

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\AdobeNJ\abodec.exe

          Filesize

          1.6MB

          MD5

          743e6962ef1e219147823720da17954a

          SHA1

          e974f1abe04d6427ec47586797dd875bc4aaab33

          SHA256

          0894d5d69d93d8e02753dab962c2ebb2f92407e07f5c70d09eaaaec774187d94

          SHA512

          a20e63c13af993951683cb8868fc76c68b2476ac16065fe72b49131a5de7c6bca3f66e1943f4dba2cc90439ca75e7ebf6d304ff256d90ed858b30aa3b0d1d211

        • C:\AdobeNJ\abodec.exe

          Filesize

          4.1MB

          MD5

          263d6d559ee2515c532cfa67786de05b

          SHA1

          bd9942de65a341267b925cc3c975c8b53e06dbc6

          SHA256

          14a6bc33d88163741c314c158a069eda3c0c85e1084c13c99bfc92aac7b393d5

          SHA512

          975122ddd1eebd88cd9f487b06c88452de4e685e9e17529330fca759cae969ed3b168f78f30c0bea206cb6268abb9fa319db18821600bf92f367624dd2ac1a71

        • C:\Galax0I\optidevsys.exe

          Filesize

          4.1MB

          MD5

          1acde337eae411a5dd1e04d19e34c3c3

          SHA1

          b8460bb60d3e46fec0914a233f71a57950d03daa

          SHA256

          5fd6686729f721b494d8dc002773e2487f291daab011e67402787173b602d069

          SHA512

          3da045d36b4c79a5d245ccb34c43876f2bba136dddd8b95b4db8caef1861c2eda6c895de7e30a8eb10ff2146cac00faaf3869102f06c17829e2577901eca4a95

        • C:\Galax0I\optidevsys.exe

          Filesize

          4.1MB

          MD5

          4040ea63791209bef87c4adf4cf0f264

          SHA1

          c90fadc19b20963b64bf9c6b12884d072702015d

          SHA256

          da191608adedcf6dcc76700c047eb0eecb1de7a0d1806c1dfd3f837ed4ed8bf9

          SHA512

          b5429da5a7093f5116b988e4192a063a22682d19209a5f80d63a2c475858c873560002795aa26dbfc266dc162096f6b9790fd6924fb11d3218efe40ca48244c1

        • C:\Users\Admin\253086396416_10.0_Admin.ini

          Filesize

          206B

          MD5

          00f82e4b2b9c0773bb24377f78e841e9

          SHA1

          dc04adc69e5d854d319ac24643cedcd923313915

          SHA256

          22b6063192480fe9e4083493174c073ae97c12d662a7f51da437672494457058

          SHA512

          0d18047882cb2e03a998f7ab164c91c96b0e238c840868cc5a8fc54ee555c9b55ec341adf38721cc885c2c44fa6ee7d7eaf37c3743da12556fc49253726bcc8b

        • C:\Users\Admin\253086396416_10.0_Admin.ini

          Filesize

          174B

          MD5

          72ad26bedad0e4a0786c3b9966b612d9

          SHA1

          76c5845c472e7ee3f43063651951d295a31704ea

          SHA256

          79532f2f62a552dc4671bf72404401318b93fadc749feadf37b389b09754aa0b

          SHA512

          4bcd5bdbe2dec32f0d004f79ffa70954617b0ab685da884a3bb4ebf0e653480cd460fc4feb185b589b68fe4bdab05fb614f556785634647bf2206e752d3b6d43

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevopti.exe

          Filesize

          4.1MB

          MD5

          866f4063f18c048ef8847684935b525f

          SHA1

          77e279d12e4866da157ccc43b93eee08eefefce1

          SHA256

          d23c359198d462d9507d0c9fb2d392d1499fbe63b525ac51ecd3a0c3aebbb030

          SHA512

          8455538bdbed1e6de37857eb4d70011ad638c073500a351a51475081772790d1a528c48651bab94ba86ecda472bf63a5e5b319c531dc9dc31b2cde3bb00f78da