Analysis

  • max time kernel
    150s
  • max time network
    51s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/06/2024, 19:24

General

  • Target

    1cb3036969df6bb04138d0b3ef525700927bd9bdc062780461df4bcc00c1e406.exe

  • Size

    2.6MB

  • MD5

    0b1f2ebd224c081ab73d762b3b8b1328

  • SHA1

    93b358aa780db54a25bc274318299b1ee62b6300

  • SHA256

    1cb3036969df6bb04138d0b3ef525700927bd9bdc062780461df4bcc00c1e406

  • SHA512

    7b65d1d86b88a622195f77231c70f4d8ce5a1b7a111033e9cd280693bd4cc1a2e78476aa603184d958a3c6824bcb5b71a40a20fec1938a7420511ba0e1a7ad34

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB3B/bS:sxX7QnxrloE5dpUpIb

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1cb3036969df6bb04138d0b3ef525700927bd9bdc062780461df4bcc00c1e406.exe
    "C:\Users\Admin\AppData\Local\Temp\1cb3036969df6bb04138d0b3ef525700927bd9bdc062780461df4bcc00c1e406.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1500
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2752
    • C:\SysDrvGO\adobsys.exe
      C:\SysDrvGO\adobsys.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1036

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\SysDrvGO\adobsys.exe

          Filesize

          2.6MB

          MD5

          7d4b83f40143e2e6f136d418f929c63e

          SHA1

          5cb7b1d302da3bf30d257bd35000306f260be0fc

          SHA256

          db761731b2f9cbcfdcb4a6fe446d3d5ceaf16f11f189e0a9750358446065a2f3

          SHA512

          aa4524d59633aa91e66fe011dd32cdd8304728485337b6aeea3ac607a2fc60bcc803840efadcd8f136d99ada0cead953c2ceb39d6b5c834092b74ae36fe779d7

        • C:\Users\Admin\253086396416_10.0_Admin.ini

          Filesize

          203B

          MD5

          2fafec1b1155f7b63eb3df32afab149c

          SHA1

          c432f9eaacdcb473cb8c04472b3f04298434f18b

          SHA256

          544e332444019366dbd92dba1d6404327439444d6a8967aeeb88b0fabe01d5c2

          SHA512

          b1b597eba0453ae5ea6e9af02298c92f2416e7307f76faf75bb381f41ba6e4b0576a217999c4b0fdf07193a3e07cedee3fdc632aea4f8dfc82522707a11fd5c2

        • C:\Users\Admin\253086396416_10.0_Admin.ini

          Filesize

          171B

          MD5

          2bb1509be575f7404841b0534a3761f1

          SHA1

          e2332772495b9792ffc1f7673bc1fc62601f3a9e

          SHA256

          9877ca07cdd4ff7e81b8910d352051d9be8657612f28f7f42aea852feab6f312

          SHA512

          25fba4455f91e525794b0db02b65c16732f55486cc77d9026c64c33ecb198f1108ae5d02a5e93474674d51259e44ec453bcee2b230313c5bff62f756b3b9c211

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe

          Filesize

          2.6MB

          MD5

          0349896c00bc9c44077ddc3906592386

          SHA1

          4222c2d0c420196202cc875e157dd9e3a0118a4d

          SHA256

          0b041d612725b82b3d036d7e9ca70710dca893d6aa4afd610736aa250ec2693d

          SHA512

          a67f455ebda9daaeb4188626b46ebfcb281bb98a64744bc5f966e2767bfabf396b75670d9d38d7b29b7787196714adf0e30e1f0eed29765d7fabff2de789dd97

        • C:\Vid0A\boddevloc.exe

          Filesize

          204KB

          MD5

          4afb0a1ba0f6ae51900643e324125383

          SHA1

          56e796deecd54f772be8e8beb946400231346413

          SHA256

          b43b188c3ca632164b4d7eebec2966edaf7c57d0b0f494eeaa4191265937f2be

          SHA512

          5705dc6fdaa2cd87cca9296e8c8ad803e6df3d7df2df1141b1eed6ff9ccda52ef2ea9db51476d947282fce85351551bdeb0a874f7998ded854f722a63ef3204c

        • C:\Vid0A\boddevloc.exe

          Filesize

          11KB

          MD5

          6e48912c750d2a4af218228dfe476e8a

          SHA1

          8f0359cb3b03fc05f8d0ae4252aa2f0f938f5489

          SHA256

          6b8e8492afa8a73802220d65a0081445b52649c7adb41c2a83e8b252554e2e40

          SHA512

          94858d91585a291b7d07057ddfab384639fda1d9cd40f60502ac2f6de5e4385ada01e9a1a17288f7fa3c69de4f3c0817e5f1fa0a63251ef7975ea060e3ee05f5