Analysis

  • max time kernel
    150s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/08/2024, 23:30

General

  • Target

    5eef1c5383a77f0dca93c5c231ca0bda4d39cd6d3a2200e7ccad64d6e2478345.exe

  • Size

    3.1MB

  • MD5

    2ffa18d49924b3e47adca70c2f624470

  • SHA1

    e954bb0f912d094a976eb20861bc68f4e7dd0774

  • SHA256

    5eef1c5383a77f0dca93c5c231ca0bda4d39cd6d3a2200e7ccad64d6e2478345

  • SHA512

    185d27bab7f0e1a9080612941ca32e47d3de7bcddc2b0fb57aa2f771009e70ec07cf519f7572195221313c7a3284abe574016ff1656e152f141ed83be98d2f89

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB2B/bSqz8:sxX7QnxrloE5dpUpRbVz8

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5eef1c5383a77f0dca93c5c231ca0bda4d39cd6d3a2200e7ccad64d6e2478345.exe
    "C:\Users\Admin\AppData\Local\Temp\5eef1c5383a77f0dca93c5c231ca0bda4d39cd6d3a2200e7ccad64d6e2478345.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1060
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecadob.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecadob.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3280
    • C:\IntelprocUA\xdobloc.exe
      C:\IntelprocUA\xdobloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4996

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\IntelprocUA\xdobloc.exe

          Filesize

          3.1MB

          MD5

          217469dfb5a8d40148e87a937d0d643e

          SHA1

          29a3452111f4fd38eb47ca798f72168f8e1cd56e

          SHA256

          c3aa08d0e63cd63daaafcc96337728af38639d8e9f518344b91e61b778ad3303

          SHA512

          b11290063238e5967c0fbf0b5bfdba5ca7958935ea520ac2e5c44352464ef812cfa9c89588cf7915ef8f876e41c37c9091abfaa6e160866a7b06f4693d465d04

        • C:\Users\Admin\253086396416_10.0_Admin.ini

          Filesize

          205B

          MD5

          d9e3afa02c7ebe096784ec78111dfdc2

          SHA1

          4d99c52f602456bdd69abd0fef3372ef4a3cb6db

          SHA256

          41ebfe8270605a48da6e73ed0502ec871445d2dbffe81f067d02b0649c37292f

          SHA512

          5b34b4a127e28bce215a8181afdc2461704644526e01297347fff3a0cf05f1740955f4f47fe0225dd68fe61e1110aea23333fa015d79b928d49c24c1d53e778d

        • C:\Users\Admin\253086396416_10.0_Admin.ini

          Filesize

          173B

          MD5

          c701874ccd3ef7bf651f2cbe39b6e95d

          SHA1

          cc22e2078256243dc059774b41ea2cc46443c3ff

          SHA256

          c991eb5e1e0f635fea144667144aa384a8312eadfec70bb14c08ad405a97f879

          SHA512

          fafd0a23547ea5e6066171167c49c1cf19e8b3488f781cad02b1958a7bd5955508d32dddb6122f14e30f47c510c715941be070bf374ce5640dc404392dafb6d9

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecadob.exe

          Filesize

          3.1MB

          MD5

          efa8158c8836de3269ab972d073fe0b8

          SHA1

          e04a0f71d5f7d77caac73831b1c8cbd5e0c5115f

          SHA256

          6c58ecabb6a8a958909142b657b53ddef53607637309b9e1c478b088cd9e175c

          SHA512

          ebc3d0dbb4807c67be56f955d79887994e4ac56a5a4cee1268b8d426088ee91ff144e6e255e46afddd814b1c4c381b13b80c0c61d34c4915c203827b5e767551

        • C:\Vid86\optidevsys.exe

          Filesize

          1.8MB

          MD5

          5f56cd14a7959bb3ef7c4ba2068597b0

          SHA1

          940f6e5f63b389a331d1c601710fbc8630743852

          SHA256

          afa755b16d2c49b41651d22a1aac301992bcb690b0c6fde777fb7ff7d5e5b580

          SHA512

          1c82509c99fb08cccf54fbd17787a7e3ff49b848af0d052cabeb64ea6ba3d22aaad3cac701200773fb6e2965622926b70a6ddb6e07f7bf34c2d04b6b905d1fdb

        • C:\Vid86\optidevsys.exe

          Filesize

          3.1MB

          MD5

          d31202f6a7689cf55b7b1b3736ee2237

          SHA1

          bcc0bba212a3b59843b6cb3a61553b5121ad2fbd

          SHA256

          64f92aa06b8ee02e054ee4f4a26ddfa4781730ba667c7b2954379e1119ec4b98

          SHA512

          47dfc26ec2df29bbcc637e320a949816609703994b5d91c405f2f6411600f1181a08eca4dcdd3f70b4712388f235c75d022dbef692564e0aa72d3587c48e9848