Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 17:32

General

  • Target

    66a967865d0b31b15c92358f17b378c0N.exe

  • Size

    2.6MB

  • MD5

    66a967865d0b31b15c92358f17b378c0

  • SHA1

    668a9e142c13dc45dc467a7286f25ea30906a7e3

  • SHA256

    d49f5769bc8da6c5747d91ab13d3458df0cb9b154b2c865b70f2a868414e4718

  • SHA512

    8007f34913379a579e86f533369688e0e12eccb01df0b52b2b4cc15f48ca3e1ca46be36e569bbf0229916f2a1777304be441e029a134eb80c6ebc7dfad5dea4c

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBiB/bS:sxX7QnxrloE5dpUpVb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66a967865d0b31b15c92358f17b378c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\66a967865d0b31b15c92358f17b378c0N.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1404
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecadob.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecadob.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1732
    • C:\Files39\abodsys.exe
      C:\Files39\abodsys.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2716

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Files39\abodsys.exe

          Filesize

          23KB

          MD5

          3802e70e50917db6adbff13a6824dce7

          SHA1

          1ec74804dcbb5eac9158cc01b922116000bd27f6

          SHA256

          b81d5b38681149b114bf47a1e7fa43ddd85131b90d90958a3b1ff715a6be3573

          SHA512

          2ae50667aa5c3bf216c71d67c60ef19a77841a00f44d71976aa8f97b9a6fd7f512a1183679559970fb5175722a27db103b3b44cbae08e134908cdae961b88b2b

        • C:\MintPH\dobasys.exe

          Filesize

          3KB

          MD5

          1158f86a0845ee6fe9ce7b682fd51439

          SHA1

          caf9890ab05a6eef87827bb3ab60eaee3b254faa

          SHA256

          3d1f80bce336609701c74a291ec5f27ae76b198dfc51fe6615349996dcba8ab1

          SHA512

          3820fa06d8911561113535b4e01a0e4a3bcb87a566762f0995074fdd561e824454613a36d5347004f0370ff27867df4f962f498ca63e8e4b5e82c935860d3503

        • C:\MintPH\dobasys.exe

          Filesize

          4KB

          MD5

          ede40b36034d11420daf9b761d447622

          SHA1

          83e69cb72e12fd8ccd507bfa21133e1fca0fd5d7

          SHA256

          6e27085c9b049479ed4b5d515c82d49091d1d0d6a70cc1af4fe1e085816236d4

          SHA512

          0fc2330cfab1d7a2fa7e55f9cc177aa246de7f672540212721ca9232920652a2306906719e60af2bd37ca2fc9074d2244a5514fdc7f344e7c4006b4c69a75120

        • C:\Users\Admin\253086396416_6.1_Admin.ini

          Filesize

          167B

          MD5

          d477514b924f22c9b48691f87820815f

          SHA1

          f0f415b7140bf6aebcfbb3fa4251d9d0e66b3e05

          SHA256

          8c0c56d8bae656759447a8ece1ea89e87dfe5412e45553b1ecad27cb0bc685ee

          SHA512

          eeddbdeb344cd0f8bb8f24af25c647c7a95408a67a738e03022813092a4d67ebf2ff0d86afd9a078b4a0234f5c8e2e05429211c9eec26fc5ac7e4d90d823e2b5

        • C:\Users\Admin\253086396416_6.1_Admin.ini

          Filesize

          199B

          MD5

          9458282866992c50a22a7caa0f95cf83

          SHA1

          4cc303e15f9972d2c9a87ced788e1ea5d344a49f

          SHA256

          5aa2b8d8849d18093683ab7e7af8d2db42108f55aa99bc6c053a3d6bfdbce307

          SHA512

          f73cc705a1ee1a5f9c87261f4f34f931e3d2075b944f7e6d2ee0802721618bd96c81c6bb181a1eb05a8b5b87bd290c1802f306ac2415c146f4b92a19ac5e68f4

        • \Files39\abodsys.exe

          Filesize

          2.6MB

          MD5

          fb7eff77ddc9a2cd276a64cb866a71c0

          SHA1

          e9cca580b9ee9339dfde8c6c771577318e4b738d

          SHA256

          88943b339553c358894b36a4e1ff60807033e19ed027fe575114919450774632

          SHA512

          5986fb1f85451022767372a6fcec42ae7ef97a2de92ac02387526ec99d0c49aef57cbb343297b1b01f8e109ceafb90aeeffc8470386717d1bc7850354f2c0ee9

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecadob.exe

          Filesize

          2.6MB

          MD5

          1ad78428baf6755c7aed812d9aa06320

          SHA1

          5090d026177174bea0fdaaaf45cd41ae914bda72

          SHA256

          b7846de7d3e0c653a174e1a038210dda36f81352963de5c2ffb408a67461460e

          SHA512

          963ed14171299c3da17cc9354786325250222d67a683bac1bd818040c1092c6a45199ef7b58407ad2b1cb0a60a5581e455326d2d3711e7c234bf60aa74df5ad2