Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 02:24
Static task
static1
Behavioral task
behavioral1
Sample
c4976449626d86b73e6abe5bb579a8994ed4dd79c91eeec9236bbf6cd3933517.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c4976449626d86b73e6abe5bb579a8994ed4dd79c91eeec9236bbf6cd3933517.exe
Resource
win10v2004-20240802-en
General
-
Target
c4976449626d86b73e6abe5bb579a8994ed4dd79c91eeec9236bbf6cd3933517.exe
-
Size
2.6MB
-
MD5
5cb4cfffbbbe511a4bd931e7431dd645
-
SHA1
cdbefee66867af493124b1a1e83093e7c00bff75
-
SHA256
c4976449626d86b73e6abe5bb579a8994ed4dd79c91eeec9236bbf6cd3933517
-
SHA512
ee30d8189a1ead6f330d1778f3ba7d12ce5aba7dcfd1bca58c82a767711c622e11e7f395849047436c1a7825dadc9932e1745a2140968a58b37a3abe79833d5e
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBJB/bS:sxX7QnxrloE5dpUpab
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxbod.exe c4976449626d86b73e6abe5bb579a8994ed4dd79c91eeec9236bbf6cd3933517.exe -
Executes dropped EXE 2 IoCs
pid Process 2264 ecxbod.exe 1516 abodsys.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvFL\\abodsys.exe" c4976449626d86b73e6abe5bb579a8994ed4dd79c91eeec9236bbf6cd3933517.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZPP\\dobaloc.exe" c4976449626d86b73e6abe5bb579a8994ed4dd79c91eeec9236bbf6cd3933517.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4976449626d86b73e6abe5bb579a8994ed4dd79c91eeec9236bbf6cd3933517.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecxbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abodsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1404 c4976449626d86b73e6abe5bb579a8994ed4dd79c91eeec9236bbf6cd3933517.exe 1404 c4976449626d86b73e6abe5bb579a8994ed4dd79c91eeec9236bbf6cd3933517.exe 1404 c4976449626d86b73e6abe5bb579a8994ed4dd79c91eeec9236bbf6cd3933517.exe 1404 c4976449626d86b73e6abe5bb579a8994ed4dd79c91eeec9236bbf6cd3933517.exe 2264 ecxbod.exe 2264 ecxbod.exe 1516 abodsys.exe 1516 abodsys.exe 2264 ecxbod.exe 2264 ecxbod.exe 1516 abodsys.exe 1516 abodsys.exe 2264 ecxbod.exe 2264 ecxbod.exe 1516 abodsys.exe 1516 abodsys.exe 2264 ecxbod.exe 2264 ecxbod.exe 1516 abodsys.exe 1516 abodsys.exe 2264 ecxbod.exe 2264 ecxbod.exe 1516 abodsys.exe 1516 abodsys.exe 2264 ecxbod.exe 2264 ecxbod.exe 1516 abodsys.exe 1516 abodsys.exe 2264 ecxbod.exe 2264 ecxbod.exe 1516 abodsys.exe 1516 abodsys.exe 2264 ecxbod.exe 2264 ecxbod.exe 1516 abodsys.exe 1516 abodsys.exe 2264 ecxbod.exe 2264 ecxbod.exe 1516 abodsys.exe 1516 abodsys.exe 2264 ecxbod.exe 2264 ecxbod.exe 1516 abodsys.exe 1516 abodsys.exe 2264 ecxbod.exe 2264 ecxbod.exe 1516 abodsys.exe 1516 abodsys.exe 2264 ecxbod.exe 2264 ecxbod.exe 1516 abodsys.exe 1516 abodsys.exe 2264 ecxbod.exe 2264 ecxbod.exe 1516 abodsys.exe 1516 abodsys.exe 2264 ecxbod.exe 2264 ecxbod.exe 1516 abodsys.exe 1516 abodsys.exe 2264 ecxbod.exe 2264 ecxbod.exe 1516 abodsys.exe 1516 abodsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1404 wrote to memory of 2264 1404 c4976449626d86b73e6abe5bb579a8994ed4dd79c91eeec9236bbf6cd3933517.exe 87 PID 1404 wrote to memory of 2264 1404 c4976449626d86b73e6abe5bb579a8994ed4dd79c91eeec9236bbf6cd3933517.exe 87 PID 1404 wrote to memory of 2264 1404 c4976449626d86b73e6abe5bb579a8994ed4dd79c91eeec9236bbf6cd3933517.exe 87 PID 1404 wrote to memory of 1516 1404 c4976449626d86b73e6abe5bb579a8994ed4dd79c91eeec9236bbf6cd3933517.exe 88 PID 1404 wrote to memory of 1516 1404 c4976449626d86b73e6abe5bb579a8994ed4dd79c91eeec9236bbf6cd3933517.exe 88 PID 1404 wrote to memory of 1516 1404 c4976449626d86b73e6abe5bb579a8994ed4dd79c91eeec9236bbf6cd3933517.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4976449626d86b73e6abe5bb579a8994ed4dd79c91eeec9236bbf6cd3933517.exe"C:\Users\Admin\AppData\Local\Temp\c4976449626d86b73e6abe5bb579a8994ed4dd79c91eeec9236bbf6cd3933517.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxbod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2264
-
-
C:\SysDrvFL\abodsys.exeC:\SysDrvFL\abodsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
346KB
MD505759b19068adc2a5accd79f4dae7dbb
SHA1d48b356a09e111b9d1cc70fa378895435b089128
SHA256c44a0149c02f157806244540678b61ab1f5b2d6e55bce4220bc90b307d9dc4a9
SHA512faa98db26ab026f6d185f00b6657cccc0d96f8e8202752dd0b2933f95dc820bc3dcaf0af851691024263d1a96363ec865699cca58b590bb275f04b00b727c93d
-
Filesize
3KB
MD51277107cabcc016a5fd1f1042e36a2e3
SHA1d7f8e8f7a16218d6bb1dce7bd03617500801eb78
SHA2568e909b1d2c6f2b50ac77632d0c29bee78baafb5a1b3d23226e037507fc026273
SHA512f129adcdeabd08d93ae5036fe57020e5d0eab6c1565a555dce876fa729326075b333ac31bc8a7973c21d03d17b08334e1acad9033a1e66962d79780e301afbf3
-
Filesize
2.6MB
MD53cab25bd22b2e914eb604ab59011dbb0
SHA16e8c9d5cdbdc59b9322c6558878a8f7676de23ab
SHA2562826954dd5aa18a52d0d5ff1d8268d3124bede538ca5ee8925c87536670c58f9
SHA51233be6f85902ce28f465432bad03e041c097b99ecb3e4764b8b6061af85afc58c3a245664514707503a33459d215498a9567d47f2e086085fea71b4324390805f
-
Filesize
200B
MD593526364e84b625e9a2feb304eebf3f1
SHA1a495869c6cba1526a4011f5ddeefb3e19f1a9ffe
SHA256fadb807a5410c88b92cc7b6994df5a33a4db0841351c1eb7c0be971bb63850d4
SHA5124c6dbe9ab5d51138905ef9f771d77f97069a07d641c0cc69378bae7043d96804d821744b97bdebca7af697090fe974f5feee7097d4072225aef8939ed2185cc5
-
Filesize
168B
MD503de829a117d0740091a2ddac6acd48c
SHA13a3eab48dafc0588150282ef20d15278aa59a665
SHA2565963e3b19fcc5828a056ad200ebe5d23551975a0db4ec55e15403ad46671ca4f
SHA512f45dfa706434f64d81256bbcb74bec1b58e0d6769e788e94deb37e13b22e720d6d4089b2510c8b23b6cb2332034fa4a8c5a320cd67edc0036f58f475ba258690
-
Filesize
2.6MB
MD5395bf66813171fe02e5e38dadf043b4e
SHA1204583e4fae500f0eda7cac1166bb0ce75e8f764
SHA256d12a95dc40f7a91e29e6779d0d3a76d66ce27940a676edc19afdba8a9db0a593
SHA51230284e3adf52a1db42534e30b0991de37214661f0dc0f5c61f75c523905febe804fb51d8ec8b244bd04fd6a8690abd13894a4f776b4dd2ab03f8745710268c97