Analysis
-
max time kernel
120s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 16:44
Static task
static1
Behavioral task
behavioral1
Sample
5d44d931b2aab85ab66c3806c6aca850N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5d44d931b2aab85ab66c3806c6aca850N.exe
Resource
win10v2004-20240802-en
General
-
Target
5d44d931b2aab85ab66c3806c6aca850N.exe
-
Size
4.0MB
-
MD5
5d44d931b2aab85ab66c3806c6aca850
-
SHA1
fc51cbe724e9be94a9a3ab061c4693c75324d41b
-
SHA256
b31f9d02c756e95a2eba310bf583e3a0cf97cfab0668751c7ccb6f9197824d34
-
SHA512
a38306f47ad955bc5fd0d9dd6d32dd4ceb8979a2bd6a9ac53874c6e0e25fd3705737fa73554a2cc4d5a67cb31fe7695f7379696a3f7dea7a6e537900c8310f37
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB0B/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUp7bVz8eLFcz
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxdob.exe 5d44d931b2aab85ab66c3806c6aca850N.exe -
Executes dropped EXE 2 IoCs
pid Process 1944 ecxdob.exe 2244 abodloc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvQ7\\abodloc.exe" 5d44d931b2aab85ab66c3806c6aca850N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZRH\\optixloc.exe" 5d44d931b2aab85ab66c3806c6aca850N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d44d931b2aab85ab66c3806c6aca850N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecxdob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abodloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4800 5d44d931b2aab85ab66c3806c6aca850N.exe 4800 5d44d931b2aab85ab66c3806c6aca850N.exe 4800 5d44d931b2aab85ab66c3806c6aca850N.exe 4800 5d44d931b2aab85ab66c3806c6aca850N.exe 1944 ecxdob.exe 1944 ecxdob.exe 2244 abodloc.exe 2244 abodloc.exe 1944 ecxdob.exe 1944 ecxdob.exe 2244 abodloc.exe 2244 abodloc.exe 1944 ecxdob.exe 1944 ecxdob.exe 2244 abodloc.exe 2244 abodloc.exe 1944 ecxdob.exe 1944 ecxdob.exe 2244 abodloc.exe 2244 abodloc.exe 1944 ecxdob.exe 1944 ecxdob.exe 2244 abodloc.exe 2244 abodloc.exe 1944 ecxdob.exe 1944 ecxdob.exe 2244 abodloc.exe 2244 abodloc.exe 1944 ecxdob.exe 1944 ecxdob.exe 2244 abodloc.exe 2244 abodloc.exe 1944 ecxdob.exe 1944 ecxdob.exe 2244 abodloc.exe 2244 abodloc.exe 1944 ecxdob.exe 1944 ecxdob.exe 2244 abodloc.exe 2244 abodloc.exe 1944 ecxdob.exe 1944 ecxdob.exe 2244 abodloc.exe 2244 abodloc.exe 1944 ecxdob.exe 1944 ecxdob.exe 2244 abodloc.exe 2244 abodloc.exe 1944 ecxdob.exe 1944 ecxdob.exe 2244 abodloc.exe 2244 abodloc.exe 1944 ecxdob.exe 1944 ecxdob.exe 2244 abodloc.exe 2244 abodloc.exe 1944 ecxdob.exe 1944 ecxdob.exe 2244 abodloc.exe 2244 abodloc.exe 1944 ecxdob.exe 1944 ecxdob.exe 2244 abodloc.exe 2244 abodloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4800 wrote to memory of 1944 4800 5d44d931b2aab85ab66c3806c6aca850N.exe 87 PID 4800 wrote to memory of 1944 4800 5d44d931b2aab85ab66c3806c6aca850N.exe 87 PID 4800 wrote to memory of 1944 4800 5d44d931b2aab85ab66c3806c6aca850N.exe 87 PID 4800 wrote to memory of 2244 4800 5d44d931b2aab85ab66c3806c6aca850N.exe 88 PID 4800 wrote to memory of 2244 4800 5d44d931b2aab85ab66c3806c6aca850N.exe 88 PID 4800 wrote to memory of 2244 4800 5d44d931b2aab85ab66c3806c6aca850N.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d44d931b2aab85ab66c3806c6aca850N.exe"C:\Users\Admin\AppData\Local\Temp\5d44d931b2aab85ab66c3806c6aca850N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxdob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxdob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1944
-
-
C:\SysDrvQ7\abodloc.exeC:\SysDrvQ7\abodloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD516ccf5f67f9282b30e6a5f4af5270f50
SHA168447409565fe05072bf9f2e5ab6c808cdde3588
SHA2568a2c86f7a9d52c2ccc8fff1c540155f993fcd3b74ea6856ec35c0b5b70c3c77d
SHA51217d7c9d9ee1c0bb061ec5aaa3b060aa8030e9197dfa4a700080dd3ca663bbd3176e55487e505ed460a4b137714a87b062505760e25285e888ea793302c475921
-
Filesize
4.0MB
MD5a775665d94f8b90242629892e759b611
SHA1ec17cd80bcf761f5face94c40137108461bb9239
SHA2564c2fcdcab81da638ed589e971da36cc4be80ac57d47b3211c362b0d138e08ac2
SHA512d5e0db5ef35ad418c3eaeaa3b6473179c7044e2a8f2067680ad5342a58d51942403946a788ea15d309f10a7df6134c65fea44ec23077bdfc57107eede5864e48
-
Filesize
4.0MB
MD57fc06c8e715168f0c2eac7fdeaa4ca80
SHA18c06c6927011bc4a120b598013459ad8afd55076
SHA256f5dd77f083b57324d5019982d4c7af5b38fa71080df14937d96fb6252d614e06
SHA51276ba87671817031931c5c2d2e22c111d8a17a4c5a0b17653b21b30682a4be1f073fdb7e646024c646855de65a224ca26b45418c29784b91dce0ee6e693b6abcd
-
Filesize
201B
MD5240efbf74dfda21dd3aebb3e8d349b62
SHA18924b8bd737c4a75cfa73738fe76e63862bda40f
SHA256ec4121bc08693da5e0238c932f11c50bd797b211d4d9c42d9a836fa3536099e8
SHA5129bce167b905cefdc3e965c8858138c39b3562f41bd395ff149f883968e830ec019584e09985eea848b04ed8c5533e56c5560782370f231a08ddeb2f07d3677ed
-
Filesize
169B
MD5dc1f0e7eecc185b1e94c3cd75d5db4df
SHA1c7507c5bcdbb85e4c550d2109abec0e5da53787f
SHA2564e4128c604208368d69b41017bd16f04eca1876cff6feb2067baa166f67eabf5
SHA512742fb5eb623b048adc4dd18dd2bc2ffabfae04578bebaba26666c0fe1ec87bb4ef88c1cd26a3bf3d1dca9943d47c64800d01fd0dd5020fc7c780505c569e52a0
-
Filesize
4.0MB
MD5a0a7e55c8dc6d40b208d768685be6fea
SHA1af5dbef3dc7029f6d41ce0c323d4326780f397b0
SHA25634a4b35cdc527ba34f7d3bcecd446c91247185c87c7a930e009cabbc351086be
SHA512e698dd3b152c8f6a7121bcd98890fb1df0414daf039c8a3e9d21652a9f7b3550983b9ed833afe24c95401b704d7cde1e8eea7c42d8d6b4d2d0a0b918d4fd2237