Analysis
-
max time kernel
119s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 12:23
Static task
static1
Behavioral task
behavioral1
Sample
9e36a833cf32d2be157847987c717020N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9e36a833cf32d2be157847987c717020N.exe
Resource
win10v2004-20240802-en
General
-
Target
9e36a833cf32d2be157847987c717020N.exe
-
Size
2.6MB
-
MD5
9e36a833cf32d2be157847987c717020
-
SHA1
465f661d7d1630fb1f6d34d4f394dcfab99e3a95
-
SHA256
a8d31e246e4ca8663cf6ac09c1f9d8f58995cf3d75b3eca4033ed26c3dedbf20
-
SHA512
caa9650fa7d746805c64ad022523d3b70e4b134cc0bbd58574623f49e89c8fc8bc52f2beba443db624b12ca74358ee15f69edec5c019d1c2291db5c67df211d9
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBeB/bSq:sxX7QnxrloE5dpUpVbV
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe 9e36a833cf32d2be157847987c717020N.exe -
Executes dropped EXE 2 IoCs
pid Process 4388 ecdevbod.exe 220 devdobec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintGK\\optiasys.exe" 9e36a833cf32d2be157847987c717020N.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotG5\\devdobec.exe" 9e36a833cf32d2be157847987c717020N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e36a833cf32d2be157847987c717020N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecdevbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devdobec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1924 9e36a833cf32d2be157847987c717020N.exe 1924 9e36a833cf32d2be157847987c717020N.exe 1924 9e36a833cf32d2be157847987c717020N.exe 1924 9e36a833cf32d2be157847987c717020N.exe 4388 ecdevbod.exe 4388 ecdevbod.exe 220 devdobec.exe 220 devdobec.exe 4388 ecdevbod.exe 4388 ecdevbod.exe 220 devdobec.exe 220 devdobec.exe 4388 ecdevbod.exe 4388 ecdevbod.exe 220 devdobec.exe 220 devdobec.exe 4388 ecdevbod.exe 4388 ecdevbod.exe 220 devdobec.exe 220 devdobec.exe 4388 ecdevbod.exe 4388 ecdevbod.exe 220 devdobec.exe 220 devdobec.exe 4388 ecdevbod.exe 4388 ecdevbod.exe 220 devdobec.exe 220 devdobec.exe 4388 ecdevbod.exe 4388 ecdevbod.exe 220 devdobec.exe 220 devdobec.exe 4388 ecdevbod.exe 4388 ecdevbod.exe 220 devdobec.exe 220 devdobec.exe 4388 ecdevbod.exe 4388 ecdevbod.exe 220 devdobec.exe 220 devdobec.exe 4388 ecdevbod.exe 4388 ecdevbod.exe 220 devdobec.exe 220 devdobec.exe 4388 ecdevbod.exe 4388 ecdevbod.exe 220 devdobec.exe 220 devdobec.exe 4388 ecdevbod.exe 4388 ecdevbod.exe 220 devdobec.exe 220 devdobec.exe 4388 ecdevbod.exe 4388 ecdevbod.exe 220 devdobec.exe 220 devdobec.exe 4388 ecdevbod.exe 4388 ecdevbod.exe 220 devdobec.exe 220 devdobec.exe 4388 ecdevbod.exe 4388 ecdevbod.exe 220 devdobec.exe 220 devdobec.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1924 wrote to memory of 4388 1924 9e36a833cf32d2be157847987c717020N.exe 89 PID 1924 wrote to memory of 4388 1924 9e36a833cf32d2be157847987c717020N.exe 89 PID 1924 wrote to memory of 4388 1924 9e36a833cf32d2be157847987c717020N.exe 89 PID 1924 wrote to memory of 220 1924 9e36a833cf32d2be157847987c717020N.exe 92 PID 1924 wrote to memory of 220 1924 9e36a833cf32d2be157847987c717020N.exe 92 PID 1924 wrote to memory of 220 1924 9e36a833cf32d2be157847987c717020N.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e36a833cf32d2be157847987c717020N.exe"C:\Users\Admin\AppData\Local\Temp\9e36a833cf32d2be157847987c717020N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4388
-
-
C:\UserDotG5\devdobec.exeC:\UserDotG5\devdobec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD5626725aeb991113ff9372f926ab9270d
SHA1ad410547f5eaf81e0be7f6f306a995f62678e861
SHA25693f37642b301baeb13185164331eebac50d543081411fbd7467e9b33073cb895
SHA512474d7434481c1f6369e346cd78ae670d41fbd963ce453329e7a3963e2b4eeb6a53777333469d2c17472d5331d923966d9b394a13940d3317c062d3c3ecac76b4
-
Filesize
912KB
MD5ef7f48683836563c85d4175bc5a5ab7a
SHA1d4874858d591c4d0f5468f6a6da368e626383f58
SHA256bd3efb0a28b76b88d85e2a68e2517daceb552f739fb238e0fb50d8696f129ba9
SHA5121e805f3751029398dfb4073eb226631641e9f73e21347da0eb6d292fb1ddf1671b79074214b937b962c1c47a9a1acafc9a9debb04be389f579a98b62a28ef2e0
-
Filesize
744KB
MD504d43634621c881887bed9dfcc69d75b
SHA1fcb2cf8895a0d077a555a313d707fe4cec43844e
SHA25676534082a7aa1d5263b4abd204dd285d7ef99b6c99ca67abfd1928aa2c8519c8
SHA5128e208ea3fdbb7019ae8257b04c9bbf75053b6430fe7d4bb5c438b503e0ca8f44ef171cde017a84a7e7fd3aec8a122aa4986a22d912ab0fc5d6dc40490b147130
-
Filesize
2.6MB
MD5d72ef64861f65f8bbd28427179fe8598
SHA1f46ca9625cf8c861302943f6f38c7f48009fc52b
SHA256ecdd1b003ddc2e0f35840bab991f7b0a45b3677b3c5578cd8b06de3875fe7523
SHA512e06f3649f78f80dcfc2e212c320b718c411ce3f71adff4c12223410ff8d9e17be5a9d160ea4e849c4261c8fdf3db76cd4ef45e7cbc55f6677b65e45955d35389
-
Filesize
205B
MD5033e2f7a3d4a76965273699b6cc8f7c0
SHA17710575bb43afb00d85b203af514fdf612b99816
SHA256e4a748798120cff6c2a348bbae6d19d76f417a2e4b58ea1864941e963dc0aa40
SHA5120d5e38008447b60304ec0c7802fe33fefc27892eed02e5e5084b0b7682760589992e6a0c20b902ce69ed6e7f08a9289144f963d9b03325c2611b389c0ce55f3b
-
Filesize
173B
MD52d071a01bb0beb7db89c8e5ef1fa5f7e
SHA169991260fc6894e7ecb1134fa8fd8df8f4d4179c
SHA25628e418569b26af75b2275a86a0674e0e694e589e429ab22a591334780dbcb311
SHA512a5bcf4dfa3f7cfbc7b1c03f96e94a854a0b6ebe2bea6d24709d89d54836d4ae86d92b609aadf06b1a01babfb1c7bfa1e9eb96cc02e983c913be8242004b560c5
-
Filesize
2.6MB
MD53fe966aa42f7a3966bd8ef220996c55a
SHA1745f46c44b4b076b7476ea4ef428f7a62a75b4aa
SHA25638560d96310f28a88f5c7ba35a0c7ccc7707b2cd8f3f46392e92df770d1b8484
SHA512ff8978e4d97c45a476c6e7066bebd63e4f2e41e38e9da24f3b93830478a680b1e4f063db1c48952ebd6b24f1204c5bef54935ac5695266c14216830afffa3521