Analysis
-
max time kernel
149s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-08-2024 23:57
Static task
static1
Behavioral task
behavioral1
Sample
7e7c2b51f5311fed6203a0b8c16cc1d3003818fe329a83d15841c71423cab8de.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7e7c2b51f5311fed6203a0b8c16cc1d3003818fe329a83d15841c71423cab8de.exe
Resource
win10v2004-20240802-en
General
-
Target
7e7c2b51f5311fed6203a0b8c16cc1d3003818fe329a83d15841c71423cab8de.exe
-
Size
2.6MB
-
MD5
27ac0d47edaf8fb42fe96f688ace426f
-
SHA1
c748047049bac840608cf2c38bedf6c54005d1a0
-
SHA256
7e7c2b51f5311fed6203a0b8c16cc1d3003818fe329a83d15841c71423cab8de
-
SHA512
200f9a04a327ebe894adab189d45d6539eed5ebe8b43e658b8b0d48fd4cf07c3d9d2d31ed0d886874c8650a99951c5ee70be58a675eeb06cf748ecec8f8fc86f
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBXB/bS:sxX7QnxrloE5dpUpob
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxdob.exe 7e7c2b51f5311fed6203a0b8c16cc1d3003818fe329a83d15841c71423cab8de.exe -
Executes dropped EXE 2 IoCs
pid Process 4904 ecxdob.exe 684 devoptiec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Adobe1T\\devoptiec.exe" 7e7c2b51f5311fed6203a0b8c16cc1d3003818fe329a83d15841c71423cab8de.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZXP\\bodaec.exe" 7e7c2b51f5311fed6203a0b8c16cc1d3003818fe329a83d15841c71423cab8de.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e7c2b51f5311fed6203a0b8c16cc1d3003818fe329a83d15841c71423cab8de.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecxdob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devoptiec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2604 7e7c2b51f5311fed6203a0b8c16cc1d3003818fe329a83d15841c71423cab8de.exe 2604 7e7c2b51f5311fed6203a0b8c16cc1d3003818fe329a83d15841c71423cab8de.exe 2604 7e7c2b51f5311fed6203a0b8c16cc1d3003818fe329a83d15841c71423cab8de.exe 2604 7e7c2b51f5311fed6203a0b8c16cc1d3003818fe329a83d15841c71423cab8de.exe 4904 ecxdob.exe 4904 ecxdob.exe 684 devoptiec.exe 684 devoptiec.exe 4904 ecxdob.exe 4904 ecxdob.exe 684 devoptiec.exe 684 devoptiec.exe 4904 ecxdob.exe 4904 ecxdob.exe 684 devoptiec.exe 684 devoptiec.exe 4904 ecxdob.exe 4904 ecxdob.exe 684 devoptiec.exe 684 devoptiec.exe 4904 ecxdob.exe 4904 ecxdob.exe 684 devoptiec.exe 684 devoptiec.exe 4904 ecxdob.exe 4904 ecxdob.exe 684 devoptiec.exe 684 devoptiec.exe 4904 ecxdob.exe 4904 ecxdob.exe 684 devoptiec.exe 684 devoptiec.exe 4904 ecxdob.exe 4904 ecxdob.exe 684 devoptiec.exe 684 devoptiec.exe 4904 ecxdob.exe 4904 ecxdob.exe 684 devoptiec.exe 684 devoptiec.exe 4904 ecxdob.exe 4904 ecxdob.exe 684 devoptiec.exe 684 devoptiec.exe 4904 ecxdob.exe 4904 ecxdob.exe 684 devoptiec.exe 684 devoptiec.exe 4904 ecxdob.exe 4904 ecxdob.exe 684 devoptiec.exe 684 devoptiec.exe 4904 ecxdob.exe 4904 ecxdob.exe 684 devoptiec.exe 684 devoptiec.exe 4904 ecxdob.exe 4904 ecxdob.exe 684 devoptiec.exe 684 devoptiec.exe 4904 ecxdob.exe 4904 ecxdob.exe 684 devoptiec.exe 684 devoptiec.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2604 wrote to memory of 4904 2604 7e7c2b51f5311fed6203a0b8c16cc1d3003818fe329a83d15841c71423cab8de.exe 86 PID 2604 wrote to memory of 4904 2604 7e7c2b51f5311fed6203a0b8c16cc1d3003818fe329a83d15841c71423cab8de.exe 86 PID 2604 wrote to memory of 4904 2604 7e7c2b51f5311fed6203a0b8c16cc1d3003818fe329a83d15841c71423cab8de.exe 86 PID 2604 wrote to memory of 684 2604 7e7c2b51f5311fed6203a0b8c16cc1d3003818fe329a83d15841c71423cab8de.exe 87 PID 2604 wrote to memory of 684 2604 7e7c2b51f5311fed6203a0b8c16cc1d3003818fe329a83d15841c71423cab8de.exe 87 PID 2604 wrote to memory of 684 2604 7e7c2b51f5311fed6203a0b8c16cc1d3003818fe329a83d15841c71423cab8de.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e7c2b51f5311fed6203a0b8c16cc1d3003818fe329a83d15841c71423cab8de.exe"C:\Users\Admin\AppData\Local\Temp\7e7c2b51f5311fed6203a0b8c16cc1d3003818fe329a83d15841c71423cab8de.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxdob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxdob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4904
-
-
C:\Adobe1T\devoptiec.exeC:\Adobe1T\devoptiec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5a4d7262692276c0f92b9a9e2fbba403c
SHA1a3ac2164d1afb8910c4211ad548d7e4924813019
SHA256b8f7b6ba5f1cb502b8be94b57cbf032aa8b1467e1907fd69c053319636ca91d7
SHA512c1bfcc4c87e1071897b9284b4e97ebc4a8d640b112ae8b7d1b39ed3fcbbe91d913632e394e41550449832fa04d2ad7588950067717acb129b42ab12d7b19e11c
-
Filesize
1.5MB
MD5e6996ce8f6cdb03f907fd1fe14dab339
SHA141036a73988f7492cab14b2192fc4b05be853d4d
SHA2565ace50d2f4ed3171dd43fec616d4ffc2d87ef00dc4ed735fa8e1360268983ab0
SHA512e2a4548cc7d94423bed9a3a631384bf2a7adb2a8ad562e7773271861743559d48a14dacda9ba256862821ed7df5c1bb18e4503344ffe1201fb49384a5b80e644
-
Filesize
8KB
MD5640f7b2ac26336229373f2ecd8f1e3a8
SHA18cfce73dd133747809bae24c696a802d971ad6df
SHA25666baea018715e78994053487d660febeba43540f4d76ae24735f7587954117d3
SHA512ef4e20d859152927a79e4664f7e94555cb4816cfc7746d897db81ec06b07015e8e8d2d096446d27e9cdc3935f8a9e520a00b2f9582f31ffd83a9c36f0ca33267
-
Filesize
200B
MD59b20eba23868790e5caa76b073d0b70e
SHA127739bf4b7221473b164a3e159cd5e8710391a1f
SHA2569daf1ae9ae9bb43c193caaa74e64719803a8b44580815fa101deb29f2dd0c472
SHA5121c5072cd7aa64526232e8345fa3f2ae7c059cb715dd14eedc8d91a33f5e6fbe445f601490dfc1a0c71bf056fd93373d26f63e92ea9d1c6586b7dffe138edddab
-
Filesize
168B
MD500665d06bd4f9ad70d46691632e2918f
SHA18426ff7e76503fa4b0cc062c766f09e9950909e4
SHA256fedb5e97cbe83c9db93f6f56dc5c475e8891098951ae1483d50ebe484972aeda
SHA512f7f30f47e4c58f7c5eef012517b153dc000b6cb1428ecf2593909de338fa22d748417bba8107aca45e3b6e2dd788281c7fdd239828f0ef5378447482f4975ce8
-
Filesize
2.6MB
MD5eaa95f95988cd148c8aa125bc53e54af
SHA148c403bbc5445915eb1f60b472cf6ee202bff030
SHA2562e362acc2283a31d19feeb4fe40e32ae2bde5f674bbb891e418922f9b88f833f
SHA512c5e225d4b61c901cba9cf139f5cfdda1dcc551dc02fa1c7d7a3d30ddb1a18fa65b1d151470d6f039a3cde1e3cfbc4eaa91fdcfbd62e35853be5e53f8896a9a10