Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 14:01
Static task
static1
Behavioral task
behavioral1
Sample
6a25f0b2f37675726e8b37791b27e130N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
6a25f0b2f37675726e8b37791b27e130N.exe
Resource
win10v2004-20240802-en
General
-
Target
6a25f0b2f37675726e8b37791b27e130N.exe
-
Size
2.6MB
-
MD5
6a25f0b2f37675726e8b37791b27e130
-
SHA1
68c8ef24467f3313256ceccfcd5aa4eeb82e1d92
-
SHA256
1dcb1cd416a20da3d27a5822ababe052b465cba36e4db45fad28bd7f33bfd165
-
SHA512
77caa441bec76e4198d02f8426bb81867e49d0326f367b6cd3564e2977a19fb1683fe9c9962d247660f08e1b367ae5d2ee7cbade0b9f513c81be817e1ac31c9d
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBAB/bS:sxX7QnxrloE5dpUpnb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevdob.exe 6a25f0b2f37675726e8b37791b27e130N.exe -
Executes dropped EXE 2 IoCs
pid Process 1096 ecdevdob.exe 1116 aoptiec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Adobe8G\\aoptiec.exe" 6a25f0b2f37675726e8b37791b27e130N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Mint9P\\optidevloc.exe" 6a25f0b2f37675726e8b37791b27e130N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a25f0b2f37675726e8b37791b27e130N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecdevdob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aoptiec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2736 6a25f0b2f37675726e8b37791b27e130N.exe 2736 6a25f0b2f37675726e8b37791b27e130N.exe 2736 6a25f0b2f37675726e8b37791b27e130N.exe 2736 6a25f0b2f37675726e8b37791b27e130N.exe 1096 ecdevdob.exe 1096 ecdevdob.exe 1116 aoptiec.exe 1116 aoptiec.exe 1096 ecdevdob.exe 1096 ecdevdob.exe 1116 aoptiec.exe 1116 aoptiec.exe 1096 ecdevdob.exe 1096 ecdevdob.exe 1116 aoptiec.exe 1116 aoptiec.exe 1096 ecdevdob.exe 1096 ecdevdob.exe 1116 aoptiec.exe 1116 aoptiec.exe 1096 ecdevdob.exe 1096 ecdevdob.exe 1116 aoptiec.exe 1116 aoptiec.exe 1096 ecdevdob.exe 1096 ecdevdob.exe 1116 aoptiec.exe 1116 aoptiec.exe 1096 ecdevdob.exe 1096 ecdevdob.exe 1116 aoptiec.exe 1116 aoptiec.exe 1096 ecdevdob.exe 1096 ecdevdob.exe 1116 aoptiec.exe 1116 aoptiec.exe 1096 ecdevdob.exe 1096 ecdevdob.exe 1116 aoptiec.exe 1116 aoptiec.exe 1096 ecdevdob.exe 1096 ecdevdob.exe 1116 aoptiec.exe 1116 aoptiec.exe 1096 ecdevdob.exe 1096 ecdevdob.exe 1116 aoptiec.exe 1116 aoptiec.exe 1096 ecdevdob.exe 1096 ecdevdob.exe 1116 aoptiec.exe 1116 aoptiec.exe 1096 ecdevdob.exe 1096 ecdevdob.exe 1116 aoptiec.exe 1116 aoptiec.exe 1096 ecdevdob.exe 1096 ecdevdob.exe 1116 aoptiec.exe 1116 aoptiec.exe 1096 ecdevdob.exe 1096 ecdevdob.exe 1116 aoptiec.exe 1116 aoptiec.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2736 wrote to memory of 1096 2736 6a25f0b2f37675726e8b37791b27e130N.exe 97 PID 2736 wrote to memory of 1096 2736 6a25f0b2f37675726e8b37791b27e130N.exe 97 PID 2736 wrote to memory of 1096 2736 6a25f0b2f37675726e8b37791b27e130N.exe 97 PID 2736 wrote to memory of 1116 2736 6a25f0b2f37675726e8b37791b27e130N.exe 98 PID 2736 wrote to memory of 1116 2736 6a25f0b2f37675726e8b37791b27e130N.exe 98 PID 2736 wrote to memory of 1116 2736 6a25f0b2f37675726e8b37791b27e130N.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a25f0b2f37675726e8b37791b27e130N.exe"C:\Users\Admin\AppData\Local\Temp\6a25f0b2f37675726e8b37791b27e130N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevdob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevdob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1096
-
-
C:\Adobe8G\aoptiec.exeC:\Adobe8G\aoptiec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4216,i,15436195446242760253,4000484513008731869,262144 --variations-seed-version --mojo-platform-channel-handle=3964 /prefetch:81⤵PID:4820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5e87f586f5b1bd6dde056c1fc738fa063
SHA1e2a346f1479288a92e84df83f0b0fca3f23486c9
SHA256590462ec581f3ab25fc1a26899ba227cf35d88e3ad5230c3cc22d54001d94967
SHA512a4fa442ad35813a06003aea464125338052e7f359d193b18493902c41d71b88eee3a6ce2baf50502cbc02b9e876dc5cd9dc4cf5a0d98aaba1f9b11a13038e1fd
-
Filesize
2.6MB
MD5e3048be59aab2cf68232f67085916a63
SHA1ee1a8a594339ae4cd781326e0b746168a3d6a7fc
SHA256bb7d53a88b0e8b8381554930644b7068375333d5bf7ca2246c7af22c0fd5abaa
SHA5120bf0c0a9812d5f2714f094f8f9b3726c4eac4b419d7fb59cc24dd0b1315df12753ee6aec410e76a971cf81ff6d002917a21cad29f6d877c0da41133931e58668
-
Filesize
2.6MB
MD577970219941e5e11a1139817900f67ba
SHA12a0692c8173d7857d3f6aab456e88acca5a37721
SHA2569f2d57099cdd6ab9ac9e5e98c127e3be88a76cc31daf6a140df1cf72157c81f8
SHA5125ee446aef1c4fd3f52ffe20b99891e1de30dd8325d01fe87eb0ee7ed30b5b8a2708c98ae6b80f847e36eb3795915096f3c15c41634d7556eca5466f73d834822
-
Filesize
376KB
MD58054a34f94da7219275c2e848fb63fb6
SHA1f3fee151c93a0a5efd8eb0c372a209722793e024
SHA256df26d8145eb1e87a3e997ea3a55df5b2650d6bb93298687eaff14c10dc864aae
SHA5128d20fd1803e38575b2cff943b9bc729e16eb93fd505e91a5031fed5a8b158f76e5148d894efa0eb3d15f941b355e8691aff3ebc6a697a95243cecc11cdb1acf9
-
Filesize
204B
MD562eda70d1ce04a4896a4a06ca1dd3cc2
SHA17ec37222dfda6cfa0ec0a7d2db90c14a83a7d571
SHA256fde54618c211a2cf05091a08b7fc583826bbaaa193c8e87e2edf155d716c4fd0
SHA512611e5d9d3b31c540f5256fac213cb1811156a947d39130be9ce9726e5219ed3bc8d25b13f802faf02844dd9efdf9bc0a9a585f2e1890052a69fecfa2cda1ef26
-
Filesize
172B
MD5d95110751614df9fea61f9b015ddbe18
SHA1420a08cd1a61447a58155535e780270d12e4f1cf
SHA2569a4c0a78329f8d31a99a6af8cac9aa9b88dcb08ac806ee5d4a96c9d72463f21a
SHA5126e71181b24198eaa3e68e9dcce7e6cede2241277f53490fa8bb60ad3dab09661b0dfa95e0fba176d3ea4dcc605d7458a78b387e23c7fb902d821b7e9e906b10b
-
Filesize
2.6MB
MD56184b94671316527cd43a23c528a11ec
SHA1086650f108638b914b6081c42d6e74dacbb0ab8e
SHA256c671c4e4fbc4cf9eca9a08659d0b3214c06c69fc777acb652c7a793a607c091c
SHA5123daa9999599f7d64e9986fd20e7010e5123d9c47d3865e4059183eb647e42bc961bc28957807ff09ea85d0eaa28e7eaa903655fbd9afc1c48d7112c68ccb8352