Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 01:49
Static task
static1
Behavioral task
behavioral1
Sample
89606ea9cc1e017b813d55868d8bd980.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
89606ea9cc1e017b813d55868d8bd980.exe
Resource
win10v2004-20240508-en
General
-
Target
89606ea9cc1e017b813d55868d8bd980.exe
-
Size
4.1MB
-
MD5
89606ea9cc1e017b813d55868d8bd980
-
SHA1
aff596ddbb9d76ad31411df9166ba17bea8c4ca3
-
SHA256
9e07639e1f063dc70b20af9bfb469658064915b0c814494f12cc28c1348613e8
-
SHA512
c95df2d0739539a6edaf8cf29477590be14183d7a910131d1cdceb3ad195dd11067ae69fe3be2a15db4e28af6ee0737a4c539730cbfbde5449ffeddf51605fde
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBTB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUpcbVz8eLFcz
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe 89606ea9cc1e017b813d55868d8bd980.exe -
Executes dropped EXE 2 IoCs
pid Process 4780 ecabod.exe 4188 devoptisys.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Adobe1R\\devoptisys.exe" 89606ea9cc1e017b813d55868d8bd980.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidRD\\dobasys.exe" 89606ea9cc1e017b813d55868d8bd980.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 392 89606ea9cc1e017b813d55868d8bd980.exe 392 89606ea9cc1e017b813d55868d8bd980.exe 392 89606ea9cc1e017b813d55868d8bd980.exe 392 89606ea9cc1e017b813d55868d8bd980.exe 4780 ecabod.exe 4780 ecabod.exe 4188 devoptisys.exe 4188 devoptisys.exe 4780 ecabod.exe 4780 ecabod.exe 4188 devoptisys.exe 4188 devoptisys.exe 4780 ecabod.exe 4780 ecabod.exe 4188 devoptisys.exe 4188 devoptisys.exe 4780 ecabod.exe 4780 ecabod.exe 4188 devoptisys.exe 4188 devoptisys.exe 4780 ecabod.exe 4780 ecabod.exe 4188 devoptisys.exe 4188 devoptisys.exe 4780 ecabod.exe 4780 ecabod.exe 4188 devoptisys.exe 4188 devoptisys.exe 4780 ecabod.exe 4780 ecabod.exe 4188 devoptisys.exe 4188 devoptisys.exe 4780 ecabod.exe 4780 ecabod.exe 4188 devoptisys.exe 4188 devoptisys.exe 4780 ecabod.exe 4780 ecabod.exe 4188 devoptisys.exe 4188 devoptisys.exe 4780 ecabod.exe 4780 ecabod.exe 4188 devoptisys.exe 4188 devoptisys.exe 4780 ecabod.exe 4780 ecabod.exe 4188 devoptisys.exe 4188 devoptisys.exe 4780 ecabod.exe 4780 ecabod.exe 4188 devoptisys.exe 4188 devoptisys.exe 4780 ecabod.exe 4780 ecabod.exe 4188 devoptisys.exe 4188 devoptisys.exe 4780 ecabod.exe 4780 ecabod.exe 4188 devoptisys.exe 4188 devoptisys.exe 4780 ecabod.exe 4780 ecabod.exe 4188 devoptisys.exe 4188 devoptisys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 392 wrote to memory of 4780 392 89606ea9cc1e017b813d55868d8bd980.exe 93 PID 392 wrote to memory of 4780 392 89606ea9cc1e017b813d55868d8bd980.exe 93 PID 392 wrote to memory of 4780 392 89606ea9cc1e017b813d55868d8bd980.exe 93 PID 392 wrote to memory of 4188 392 89606ea9cc1e017b813d55868d8bd980.exe 94 PID 392 wrote to memory of 4188 392 89606ea9cc1e017b813d55868d8bd980.exe 94 PID 392 wrote to memory of 4188 392 89606ea9cc1e017b813d55868d8bd980.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\89606ea9cc1e017b813d55868d8bd980.exe"C:\Users\Admin\AppData\Local\Temp\89606ea9cc1e017b813d55868d8bd980.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4780
-
-
C:\Adobe1R\devoptisys.exeC:\Adobe1R\devoptisys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4016,i,6593821857742176458,13646536021844995125,262144 --variations-seed-version --mojo-platform-channel-handle=4456 /prefetch:81⤵PID:4868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
474KB
MD5ecab870b640fe1665f7405bd8a12c1ca
SHA179ac0a23b41d2c6dcfe3d23ede47d88569f315ed
SHA2568665a23b9ad678774fe99948807e9251a824f4fa76635ba85f95577cc51b3471
SHA512e28c492b79021ce1b98d2ee0e86b12c599ee93c8ef26fbd054370f67259f3cc8242589cce55ef57616e8f0b4a6b366fc848a6224bc8e6c03e73f360bd532027b
-
Filesize
4.1MB
MD50200c3ec13d8ca750259e1f306fed331
SHA143321f631ae9fd022ffdf97b448ec2751cc4d00a
SHA256b992c6242cf5c4db1e1bf5641d40870e8ef0f5deb9fe44e41c12f291b6d9169a
SHA51224728c35cdd2ef6d043e14755d432497fd9326322906965940b5f13852f7ce1c6570b827744f7cd63a8c3f7bd9d7a5916ebfe6f64c1702ab7212dfeb28c70d5b
-
Filesize
201B
MD52d95b9e0196477b727abe296e672ae46
SHA15c8015101f82740ce3318bbea57584e4b01803d3
SHA256351d2a85f12784dcf151c6823613ef9c5d3c9ff59b90dfd739acf359091cdf0c
SHA51238b5d4a9bb2c20c3b040256692516f7f65d41cc2b0dacfd347645837617dc9efcebe74a790deb9774d92a920c37f1b46753eb302bb4f16279b2dfa73462e18e4
-
Filesize
169B
MD5df0d25aca8f7fe90dbd9f6db4fa87dd7
SHA1c5fd0b5309000ced4ed6e2e4ea3ae93dfd3688f4
SHA2561a309f90a8e38cadc8d9e211cccda582d944f5f9524a99388c8656a29914b0b4
SHA5126e33fd0cf494dc3cb6d757702bb3f47a2c9e6e5e42e36d5f06ee6b2263aefa25b61b9f91c70b74dd8f4fffb91401b942b549f1d634203b8e6984f7f3050daed1
-
Filesize
4.1MB
MD5a2c52bad27fdbf9b400c232942f9e764
SHA1ff8a11be8c03237c970374d2eceb76123ac75cb4
SHA2562c7850b7344a4834bb952af976ddb01dd90e38268ec019aa5ca6fa7952696798
SHA512c138c9ccbaead83882d67a327a1e384bda8f6a4e16a552b973f0fe8f4595f10895b87fff2240f46dbfb3d6be2414a3f444c106bd1495c218965455e2c95adf2b
-
Filesize
3.5MB
MD50fcb7aa14d6b07303bd55ab39dbfb0f7
SHA1a79174343482a67e077758beeb4c205765a52005
SHA2565dd3b4220725f5e6f9247a382029540f513e649f5b81b359c1112cd8eb12eda2
SHA512af5dad1ddd3ad64b8937d44dee480b7d0d46176f03bc72b03bbd9b72ec27bea38df5befb076db646b56a769de2fc308d3152a4b94de2ce65b472c6e1dc4595ec
-
Filesize
4.1MB
MD526d1cef9bbc9b2bcfaf2398e3e70a51c
SHA144c1b7ed670f6dcc1a2c6fa5b677ee1c4dad61a6
SHA25664974c3a51d111c9bea119c7571c38b330086b639640394fb2e29bbf67a8c00f
SHA51282622b8750c6ce7853f58f6df4141d9d6a7d102a8aa9cc90c8b7b2c85b4d24630e650484c0b2bfb4c3407ffb235ab873c2379292465d3a4b28576db2129fc6ad