Analysis

  • max time kernel
    149s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-08-2024 23:57

General

  • Target

    7e7c2b51f5311fed6203a0b8c16cc1d3003818fe329a83d15841c71423cab8de.exe

  • Size

    2.6MB

  • MD5

    27ac0d47edaf8fb42fe96f688ace426f

  • SHA1

    c748047049bac840608cf2c38bedf6c54005d1a0

  • SHA256

    7e7c2b51f5311fed6203a0b8c16cc1d3003818fe329a83d15841c71423cab8de

  • SHA512

    200f9a04a327ebe894adab189d45d6539eed5ebe8b43e658b8b0d48fd4cf07c3d9d2d31ed0d886874c8650a99951c5ee70be58a675eeb06cf748ecec8f8fc86f

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBXB/bS:sxX7QnxrloE5dpUpob

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e7c2b51f5311fed6203a0b8c16cc1d3003818fe329a83d15841c71423cab8de.exe
    "C:\Users\Admin\AppData\Local\Temp\7e7c2b51f5311fed6203a0b8c16cc1d3003818fe329a83d15841c71423cab8de.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxdob.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxdob.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4904
    • C:\Adobe1T\devoptiec.exe
      C:\Adobe1T\devoptiec.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Adobe1T\devoptiec.exe

    Filesize

    2.6MB

    MD5

    a4d7262692276c0f92b9a9e2fbba403c

    SHA1

    a3ac2164d1afb8910c4211ad548d7e4924813019

    SHA256

    b8f7b6ba5f1cb502b8be94b57cbf032aa8b1467e1907fd69c053319636ca91d7

    SHA512

    c1bfcc4c87e1071897b9284b4e97ebc4a8d640b112ae8b7d1b39ed3fcbbe91d913632e394e41550449832fa04d2ad7588950067717acb129b42ab12d7b19e11c

  • C:\LabZXP\bodaec.exe

    Filesize

    1.5MB

    MD5

    e6996ce8f6cdb03f907fd1fe14dab339

    SHA1

    41036a73988f7492cab14b2192fc4b05be853d4d

    SHA256

    5ace50d2f4ed3171dd43fec616d4ffc2d87ef00dc4ed735fa8e1360268983ab0

    SHA512

    e2a4548cc7d94423bed9a3a631384bf2a7adb2a8ad562e7773271861743559d48a14dacda9ba256862821ed7df5c1bb18e4503344ffe1201fb49384a5b80e644

  • C:\LabZXP\bodaec.exe

    Filesize

    8KB

    MD5

    640f7b2ac26336229373f2ecd8f1e3a8

    SHA1

    8cfce73dd133747809bae24c696a802d971ad6df

    SHA256

    66baea018715e78994053487d660febeba43540f4d76ae24735f7587954117d3

    SHA512

    ef4e20d859152927a79e4664f7e94555cb4816cfc7746d897db81ec06b07015e8e8d2d096446d27e9cdc3935f8a9e520a00b2f9582f31ffd83a9c36f0ca33267

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    200B

    MD5

    9b20eba23868790e5caa76b073d0b70e

    SHA1

    27739bf4b7221473b164a3e159cd5e8710391a1f

    SHA256

    9daf1ae9ae9bb43c193caaa74e64719803a8b44580815fa101deb29f2dd0c472

    SHA512

    1c5072cd7aa64526232e8345fa3f2ae7c059cb715dd14eedc8d91a33f5e6fbe445f601490dfc1a0c71bf056fd93373d26f63e92ea9d1c6586b7dffe138edddab

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    168B

    MD5

    00665d06bd4f9ad70d46691632e2918f

    SHA1

    8426ff7e76503fa4b0cc062c766f09e9950909e4

    SHA256

    fedb5e97cbe83c9db93f6f56dc5c475e8891098951ae1483d50ebe484972aeda

    SHA512

    f7f30f47e4c58f7c5eef012517b153dc000b6cb1428ecf2593909de338fa22d748417bba8107aca45e3b6e2dd788281c7fdd239828f0ef5378447482f4975ce8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxdob.exe

    Filesize

    2.6MB

    MD5

    eaa95f95988cd148c8aa125bc53e54af

    SHA1

    48c403bbc5445915eb1f60b472cf6ee202bff030

    SHA256

    2e362acc2283a31d19feeb4fe40e32ae2bde5f674bbb891e418922f9b88f833f

    SHA512

    c5e225d4b61c901cba9cf139f5cfdda1dcc551dc02fa1c7d7a3d30ddb1a18fa65b1d151470d6f039a3cde1e3cfbc4eaa91fdcfbd62e35853be5e53f8896a9a10