Analysis
-
max time kernel
150s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19/06/2024, 19:24
Static task
static1
Behavioral task
behavioral1
Sample
1cb3036969df6bb04138d0b3ef525700927bd9bdc062780461df4bcc00c1e406.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1cb3036969df6bb04138d0b3ef525700927bd9bdc062780461df4bcc00c1e406.exe
Resource
win10v2004-20240508-en
General
-
Target
1cb3036969df6bb04138d0b3ef525700927bd9bdc062780461df4bcc00c1e406.exe
-
Size
2.6MB
-
MD5
0b1f2ebd224c081ab73d762b3b8b1328
-
SHA1
93b358aa780db54a25bc274318299b1ee62b6300
-
SHA256
1cb3036969df6bb04138d0b3ef525700927bd9bdc062780461df4bcc00c1e406
-
SHA512
7b65d1d86b88a622195f77231c70f4d8ce5a1b7a111033e9cd280693bd4cc1a2e78476aa603184d958a3c6824bcb5b71a40a20fec1938a7420511ba0e1a7ad34
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB3B/bS:sxX7QnxrloE5dpUpIb
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe 1cb3036969df6bb04138d0b3ef525700927bd9bdc062780461df4bcc00c1e406.exe -
Executes dropped EXE 2 IoCs
pid Process 2752 ecdevbod.exe 1036 adobsys.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvGO\\adobsys.exe" 1cb3036969df6bb04138d0b3ef525700927bd9bdc062780461df4bcc00c1e406.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Vid0A\\boddevloc.exe" 1cb3036969df6bb04138d0b3ef525700927bd9bdc062780461df4bcc00c1e406.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1500 1cb3036969df6bb04138d0b3ef525700927bd9bdc062780461df4bcc00c1e406.exe 1500 1cb3036969df6bb04138d0b3ef525700927bd9bdc062780461df4bcc00c1e406.exe 1500 1cb3036969df6bb04138d0b3ef525700927bd9bdc062780461df4bcc00c1e406.exe 1500 1cb3036969df6bb04138d0b3ef525700927bd9bdc062780461df4bcc00c1e406.exe 2752 ecdevbod.exe 2752 ecdevbod.exe 1036 adobsys.exe 1036 adobsys.exe 2752 ecdevbod.exe 2752 ecdevbod.exe 1036 adobsys.exe 1036 adobsys.exe 2752 ecdevbod.exe 2752 ecdevbod.exe 1036 adobsys.exe 1036 adobsys.exe 2752 ecdevbod.exe 2752 ecdevbod.exe 1036 adobsys.exe 1036 adobsys.exe 2752 ecdevbod.exe 2752 ecdevbod.exe 1036 adobsys.exe 1036 adobsys.exe 2752 ecdevbod.exe 2752 ecdevbod.exe 1036 adobsys.exe 1036 adobsys.exe 2752 ecdevbod.exe 2752 ecdevbod.exe 1036 adobsys.exe 1036 adobsys.exe 2752 ecdevbod.exe 2752 ecdevbod.exe 1036 adobsys.exe 1036 adobsys.exe 2752 ecdevbod.exe 2752 ecdevbod.exe 1036 adobsys.exe 1036 adobsys.exe 2752 ecdevbod.exe 2752 ecdevbod.exe 1036 adobsys.exe 1036 adobsys.exe 2752 ecdevbod.exe 2752 ecdevbod.exe 1036 adobsys.exe 1036 adobsys.exe 2752 ecdevbod.exe 2752 ecdevbod.exe 1036 adobsys.exe 1036 adobsys.exe 2752 ecdevbod.exe 2752 ecdevbod.exe 1036 adobsys.exe 1036 adobsys.exe 2752 ecdevbod.exe 2752 ecdevbod.exe 1036 adobsys.exe 1036 adobsys.exe 2752 ecdevbod.exe 2752 ecdevbod.exe 1036 adobsys.exe 1036 adobsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1500 wrote to memory of 2752 1500 1cb3036969df6bb04138d0b3ef525700927bd9bdc062780461df4bcc00c1e406.exe 85 PID 1500 wrote to memory of 2752 1500 1cb3036969df6bb04138d0b3ef525700927bd9bdc062780461df4bcc00c1e406.exe 85 PID 1500 wrote to memory of 2752 1500 1cb3036969df6bb04138d0b3ef525700927bd9bdc062780461df4bcc00c1e406.exe 85 PID 1500 wrote to memory of 1036 1500 1cb3036969df6bb04138d0b3ef525700927bd9bdc062780461df4bcc00c1e406.exe 86 PID 1500 wrote to memory of 1036 1500 1cb3036969df6bb04138d0b3ef525700927bd9bdc062780461df4bcc00c1e406.exe 86 PID 1500 wrote to memory of 1036 1500 1cb3036969df6bb04138d0b3ef525700927bd9bdc062780461df4bcc00c1e406.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cb3036969df6bb04138d0b3ef525700927bd9bdc062780461df4bcc00c1e406.exe"C:\Users\Admin\AppData\Local\Temp\1cb3036969df6bb04138d0b3ef525700927bd9bdc062780461df4bcc00c1e406.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
-
C:\SysDrvGO\adobsys.exeC:\SysDrvGO\adobsys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD57d4b83f40143e2e6f136d418f929c63e
SHA15cb7b1d302da3bf30d257bd35000306f260be0fc
SHA256db761731b2f9cbcfdcb4a6fe446d3d5ceaf16f11f189e0a9750358446065a2f3
SHA512aa4524d59633aa91e66fe011dd32cdd8304728485337b6aeea3ac607a2fc60bcc803840efadcd8f136d99ada0cead953c2ceb39d6b5c834092b74ae36fe779d7
-
Filesize
203B
MD52fafec1b1155f7b63eb3df32afab149c
SHA1c432f9eaacdcb473cb8c04472b3f04298434f18b
SHA256544e332444019366dbd92dba1d6404327439444d6a8967aeeb88b0fabe01d5c2
SHA512b1b597eba0453ae5ea6e9af02298c92f2416e7307f76faf75bb381f41ba6e4b0576a217999c4b0fdf07193a3e07cedee3fdc632aea4f8dfc82522707a11fd5c2
-
Filesize
171B
MD52bb1509be575f7404841b0534a3761f1
SHA1e2332772495b9792ffc1f7673bc1fc62601f3a9e
SHA2569877ca07cdd4ff7e81b8910d352051d9be8657612f28f7f42aea852feab6f312
SHA51225fba4455f91e525794b0db02b65c16732f55486cc77d9026c64c33ecb198f1108ae5d02a5e93474674d51259e44ec453bcee2b230313c5bff62f756b3b9c211
-
Filesize
2.6MB
MD50349896c00bc9c44077ddc3906592386
SHA14222c2d0c420196202cc875e157dd9e3a0118a4d
SHA2560b041d612725b82b3d036d7e9ca70710dca893d6aa4afd610736aa250ec2693d
SHA512a67f455ebda9daaeb4188626b46ebfcb281bb98a64744bc5f966e2767bfabf396b75670d9d38d7b29b7787196714adf0e30e1f0eed29765d7fabff2de789dd97
-
Filesize
204KB
MD54afb0a1ba0f6ae51900643e324125383
SHA156e796deecd54f772be8e8beb946400231346413
SHA256b43b188c3ca632164b4d7eebec2966edaf7c57d0b0f494eeaa4191265937f2be
SHA5125705dc6fdaa2cd87cca9296e8c8ad803e6df3d7df2df1141b1eed6ff9ccda52ef2ea9db51476d947282fce85351551bdeb0a874f7998ded854f722a63ef3204c
-
Filesize
11KB
MD56e48912c750d2a4af218228dfe476e8a
SHA18f0359cb3b03fc05f8d0ae4252aa2f0f938f5489
SHA2566b8e8492afa8a73802220d65a0081445b52649c7adb41c2a83e8b252554e2e40
SHA51294858d91585a291b7d07057ddfab384639fda1d9cd40f60502ac2f6de5e4385ada01e9a1a17288f7fa3c69de4f3c0817e5f1fa0a63251ef7975ea060e3ee05f5