Analysis
-
max time kernel
119s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 02:21
Static task
static1
Behavioral task
behavioral1
Sample
f4857ad29af6143966e55f3b8d6f3f80N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f4857ad29af6143966e55f3b8d6f3f80N.exe
Resource
win10v2004-20240802-en
General
-
Target
f4857ad29af6143966e55f3b8d6f3f80N.exe
-
Size
3.0MB
-
MD5
f4857ad29af6143966e55f3b8d6f3f80
-
SHA1
35fad28877f91a081ceb25885c1ed7165eb832ef
-
SHA256
70ffdce5ed303ede96564a5ab3c1d2038ff79e3242efe1ad145c26ed1ef3b096
-
SHA512
7139b3eea6c79ba9cb1ef4e80421ddb1739b7b18411cb6dffe9bdac36cb500c0fe26b74668a86e6a23739c99feeb0affd6e7d73ed7aaa9e0a6bbd4505f554f5c
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBLB/bSqz8:sxX7QnxrloE5dpUpcbVz8
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxdob.exe f4857ad29af6143966e55f3b8d6f3f80N.exe -
Executes dropped EXE 2 IoCs
pid Process 2884 ecxdob.exe 2360 devoptisys.exe -
Loads dropped DLL 2 IoCs
pid Process 1924 f4857ad29af6143966e55f3b8d6f3f80N.exe 1924 f4857ad29af6143966e55f3b8d6f3f80N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocA8\\devoptisys.exe" f4857ad29af6143966e55f3b8d6f3f80N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidFV\\bodxec.exe" f4857ad29af6143966e55f3b8d6f3f80N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4857ad29af6143966e55f3b8d6f3f80N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecxdob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devoptisys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1924 f4857ad29af6143966e55f3b8d6f3f80N.exe 1924 f4857ad29af6143966e55f3b8d6f3f80N.exe 2884 ecxdob.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe 2360 devoptisys.exe 2884 ecxdob.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2884 1924 f4857ad29af6143966e55f3b8d6f3f80N.exe 30 PID 1924 wrote to memory of 2884 1924 f4857ad29af6143966e55f3b8d6f3f80N.exe 30 PID 1924 wrote to memory of 2884 1924 f4857ad29af6143966e55f3b8d6f3f80N.exe 30 PID 1924 wrote to memory of 2884 1924 f4857ad29af6143966e55f3b8d6f3f80N.exe 30 PID 1924 wrote to memory of 2360 1924 f4857ad29af6143966e55f3b8d6f3f80N.exe 31 PID 1924 wrote to memory of 2360 1924 f4857ad29af6143966e55f3b8d6f3f80N.exe 31 PID 1924 wrote to memory of 2360 1924 f4857ad29af6143966e55f3b8d6f3f80N.exe 31 PID 1924 wrote to memory of 2360 1924 f4857ad29af6143966e55f3b8d6f3f80N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4857ad29af6143966e55f3b8d6f3f80N.exe"C:\Users\Admin\AppData\Local\Temp\f4857ad29af6143966e55f3b8d6f3f80N.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxdob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxdob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2884
-
-
C:\IntelprocA8\devoptisys.exeC:\IntelprocA8\devoptisys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5689feb1ec1a8f05d3a7d29c51dfcd9ba
SHA1efac5b12dde4da52255f6719af09c034785eb906
SHA2563cf61dc92fa3529732df2aeee0de3b343ba5d6a5c35aa8bd3c2ca58f8a144f05
SHA51203186a7b1901374d0de8a20f0dc7919b3dbd9ed936f5f838b945fb1a6289b6209db961f6e6c376d62001d96d573d3ced6788be025452259a2419688797260761
-
Filesize
172B
MD5f8c64891a780c35ac408caeda8a836bd
SHA115acf9a97d0c57ddfaf4c6409beb6baedceed246
SHA2562e5f6ad2164f9c3c3ecc0382e40f3e62d88368e1da5d2274750516ec13e05d54
SHA512a37395c43fcc58c5eb23c974db09a58c9c56839fc7e13824a7809b4eb634f68bf3badd9c7c48e8909cf856b380cf20ea39d280d55c1732b77a0084523e26dbbf
-
Filesize
204B
MD50b2226455d29eda344b520ea268dee77
SHA1ce260c9825d2dc8dfccd33776afaf9ebb25c4897
SHA256d0ebd93e6161e4f199f27a37a16ae8304d42367a9a253fbb1d38f674329a0555
SHA51268dfc204edbcba7cfe287075d03e19a0959bda92a879edc95b18de8e9be841d13f7807bb5ff5959fc70f5d7129bec280082cca51fe524e4ab93b75a237e30c08
-
Filesize
3.0MB
MD5c9e219ad3760c9d6c065ce9f189e160a
SHA1c3ef003cb796fefb5b65aba27f63c92f388e80a5
SHA256dd7d8e58a85e79b3780d8b5a12f9e571d68a520aece1d9ed9b8705d643bc5190
SHA5125dba7a406dc3d553a00f7698cee9aaba01dac6597d75081a56aa4e8055093a623a286000c6977ef37d0541621792e585e474f5a4c3cbc622d5738f7083c425c3
-
Filesize
3.0MB
MD530ce4da8a9379482da25eb10888e0e54
SHA10df25b4ef4d31ed8e1370f753c714d1322af7f00
SHA256d0e546ea5e2fa9309e84b39f28ed26402a24c1e2d05f2c9c0b3578ebd7631f9f
SHA51231afac03835338464977f9e93b4a04525643514463e36d3cc5695a1609d0c6d81ee763576977844e075589d0a49eee901e7a8231f8e80a5f64a283764a8e6419
-
Filesize
3.0MB
MD5757d3e0dd777116f528e4b9a6838dd2a
SHA1fbc269af57ff17c414e46b14e8ccef5299718642
SHA2569ad6d7b0b93d0937d9ddd3066b079b610bbef2a7c8f641ce539cd883653a60ee
SHA512219516cf98af59c7539ceed0936b1ac6333a6543f70fdff8b5696c9e1f7aa00f84bd5e1c68b020dab584f5ce2d8e222e23c0771a4e08176e60083586b5e4af89