Analysis

  • max time kernel
    150s
  • max time network
    51s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/06/2024, 19:24

General

  • Target

    1cb3036969df6bb04138d0b3ef525700927bd9bdc062780461df4bcc00c1e406.exe

  • Size

    2.6MB

  • MD5

    0b1f2ebd224c081ab73d762b3b8b1328

  • SHA1

    93b358aa780db54a25bc274318299b1ee62b6300

  • SHA256

    1cb3036969df6bb04138d0b3ef525700927bd9bdc062780461df4bcc00c1e406

  • SHA512

    7b65d1d86b88a622195f77231c70f4d8ce5a1b7a111033e9cd280693bd4cc1a2e78476aa603184d958a3c6824bcb5b71a40a20fec1938a7420511ba0e1a7ad34

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB3B/bS:sxX7QnxrloE5dpUpIb

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1cb3036969df6bb04138d0b3ef525700927bd9bdc062780461df4bcc00c1e406.exe
    "C:\Users\Admin\AppData\Local\Temp\1cb3036969df6bb04138d0b3ef525700927bd9bdc062780461df4bcc00c1e406.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1500
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2752
    • C:\SysDrvGO\adobsys.exe
      C:\SysDrvGO\adobsys.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\SysDrvGO\adobsys.exe

    Filesize

    2.6MB

    MD5

    7d4b83f40143e2e6f136d418f929c63e

    SHA1

    5cb7b1d302da3bf30d257bd35000306f260be0fc

    SHA256

    db761731b2f9cbcfdcb4a6fe446d3d5ceaf16f11f189e0a9750358446065a2f3

    SHA512

    aa4524d59633aa91e66fe011dd32cdd8304728485337b6aeea3ac607a2fc60bcc803840efadcd8f136d99ada0cead953c2ceb39d6b5c834092b74ae36fe779d7

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    203B

    MD5

    2fafec1b1155f7b63eb3df32afab149c

    SHA1

    c432f9eaacdcb473cb8c04472b3f04298434f18b

    SHA256

    544e332444019366dbd92dba1d6404327439444d6a8967aeeb88b0fabe01d5c2

    SHA512

    b1b597eba0453ae5ea6e9af02298c92f2416e7307f76faf75bb381f41ba6e4b0576a217999c4b0fdf07193a3e07cedee3fdc632aea4f8dfc82522707a11fd5c2

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    171B

    MD5

    2bb1509be575f7404841b0534a3761f1

    SHA1

    e2332772495b9792ffc1f7673bc1fc62601f3a9e

    SHA256

    9877ca07cdd4ff7e81b8910d352051d9be8657612f28f7f42aea852feab6f312

    SHA512

    25fba4455f91e525794b0db02b65c16732f55486cc77d9026c64c33ecb198f1108ae5d02a5e93474674d51259e44ec453bcee2b230313c5bff62f756b3b9c211

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe

    Filesize

    2.6MB

    MD5

    0349896c00bc9c44077ddc3906592386

    SHA1

    4222c2d0c420196202cc875e157dd9e3a0118a4d

    SHA256

    0b041d612725b82b3d036d7e9ca70710dca893d6aa4afd610736aa250ec2693d

    SHA512

    a67f455ebda9daaeb4188626b46ebfcb281bb98a64744bc5f966e2767bfabf396b75670d9d38d7b29b7787196714adf0e30e1f0eed29765d7fabff2de789dd97

  • C:\Vid0A\boddevloc.exe

    Filesize

    204KB

    MD5

    4afb0a1ba0f6ae51900643e324125383

    SHA1

    56e796deecd54f772be8e8beb946400231346413

    SHA256

    b43b188c3ca632164b4d7eebec2966edaf7c57d0b0f494eeaa4191265937f2be

    SHA512

    5705dc6fdaa2cd87cca9296e8c8ad803e6df3d7df2df1141b1eed6ff9ccda52ef2ea9db51476d947282fce85351551bdeb0a874f7998ded854f722a63ef3204c

  • C:\Vid0A\boddevloc.exe

    Filesize

    11KB

    MD5

    6e48912c750d2a4af218228dfe476e8a

    SHA1

    8f0359cb3b03fc05f8d0ae4252aa2f0f938f5489

    SHA256

    6b8e8492afa8a73802220d65a0081445b52649c7adb41c2a83e8b252554e2e40

    SHA512

    94858d91585a291b7d07057ddfab384639fda1d9cd40f60502ac2f6de5e4385ada01e9a1a17288f7fa3c69de4f3c0817e5f1fa0a63251ef7975ea060e3ee05f5