Analysis
-
max time kernel
119s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 03:50
Static task
static1
Behavioral task
behavioral1
Sample
6d13a078ed03f7435f1e79b66e6b6120N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6d13a078ed03f7435f1e79b66e6b6120N.exe
Resource
win10v2004-20240802-en
General
-
Target
6d13a078ed03f7435f1e79b66e6b6120N.exe
-
Size
2.6MB
-
MD5
6d13a078ed03f7435f1e79b66e6b6120
-
SHA1
f66e6f1aea762eea1db7107f947dbda57956d9cf
-
SHA256
5da9a62041ccee01094e9f6aae9ed6fefeded85e14e17ae83c6c436479fe9748
-
SHA512
e2bf72f5e9810ac77703526e80592eae1f378465bcfa30335c99eb1d8d5844d5efd716ba0f7a41a18fe7e3f8aa37f38395e5329ce4f266b9ea8f6ac93e0d5b9d
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBdB/bS:sxX7QnxrloE5dpUpOb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe 6d13a078ed03f7435f1e79b66e6b6120N.exe -
Executes dropped EXE 2 IoCs
pid Process 4244 ecdevbod.exe 1320 xdobec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvPX\\xdobec.exe" 6d13a078ed03f7435f1e79b66e6b6120N.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZN1\\boddevsys.exe" 6d13a078ed03f7435f1e79b66e6b6120N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6d13a078ed03f7435f1e79b66e6b6120N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecdevbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdobec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2396 6d13a078ed03f7435f1e79b66e6b6120N.exe 2396 6d13a078ed03f7435f1e79b66e6b6120N.exe 2396 6d13a078ed03f7435f1e79b66e6b6120N.exe 2396 6d13a078ed03f7435f1e79b66e6b6120N.exe 4244 ecdevbod.exe 4244 ecdevbod.exe 1320 xdobec.exe 1320 xdobec.exe 4244 ecdevbod.exe 4244 ecdevbod.exe 1320 xdobec.exe 1320 xdobec.exe 4244 ecdevbod.exe 4244 ecdevbod.exe 1320 xdobec.exe 1320 xdobec.exe 4244 ecdevbod.exe 4244 ecdevbod.exe 1320 xdobec.exe 1320 xdobec.exe 4244 ecdevbod.exe 4244 ecdevbod.exe 1320 xdobec.exe 1320 xdobec.exe 4244 ecdevbod.exe 4244 ecdevbod.exe 1320 xdobec.exe 1320 xdobec.exe 4244 ecdevbod.exe 4244 ecdevbod.exe 1320 xdobec.exe 1320 xdobec.exe 4244 ecdevbod.exe 4244 ecdevbod.exe 1320 xdobec.exe 1320 xdobec.exe 4244 ecdevbod.exe 4244 ecdevbod.exe 1320 xdobec.exe 1320 xdobec.exe 4244 ecdevbod.exe 4244 ecdevbod.exe 1320 xdobec.exe 1320 xdobec.exe 4244 ecdevbod.exe 4244 ecdevbod.exe 1320 xdobec.exe 1320 xdobec.exe 4244 ecdevbod.exe 4244 ecdevbod.exe 1320 xdobec.exe 1320 xdobec.exe 4244 ecdevbod.exe 4244 ecdevbod.exe 1320 xdobec.exe 1320 xdobec.exe 4244 ecdevbod.exe 4244 ecdevbod.exe 1320 xdobec.exe 1320 xdobec.exe 4244 ecdevbod.exe 4244 ecdevbod.exe 1320 xdobec.exe 1320 xdobec.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2396 wrote to memory of 4244 2396 6d13a078ed03f7435f1e79b66e6b6120N.exe 89 PID 2396 wrote to memory of 4244 2396 6d13a078ed03f7435f1e79b66e6b6120N.exe 89 PID 2396 wrote to memory of 4244 2396 6d13a078ed03f7435f1e79b66e6b6120N.exe 89 PID 2396 wrote to memory of 1320 2396 6d13a078ed03f7435f1e79b66e6b6120N.exe 92 PID 2396 wrote to memory of 1320 2396 6d13a078ed03f7435f1e79b66e6b6120N.exe 92 PID 2396 wrote to memory of 1320 2396 6d13a078ed03f7435f1e79b66e6b6120N.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d13a078ed03f7435f1e79b66e6b6120N.exe"C:\Users\Admin\AppData\Local\Temp\6d13a078ed03f7435f1e79b66e6b6120N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4244
-
-
C:\SysDrvPX\xdobec.exeC:\SysDrvPX\xdobec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5423aceec7f6ee992deac960a2a6d33e8
SHA1703c17303a38854158561959efdffe18b66c97f8
SHA2562ca697473e8b8d8b98bec178c9daa625bde8a34f8cabd4323958df13eab16d1e
SHA512ea259596b8287e2705b0433389aa577fb631a3d9ce5321c9ae9e77663d858b4cefaec41e0c3ade53e3e3988988754d4798ac28407ae0f98d97b922712fecc79c
-
Filesize
2.6MB
MD5d774e92e428e0cc35bf7e9158843ac70
SHA1675181b08f10e8a5be120a21373dfc04424e778b
SHA256d47215eae972877e74ad9577723149940abf785b7448e85b205b285ae4f3d4fd
SHA512efbcfd6df6cab1671c787007caff4ac78d2d90df6e2f85edbd263a3e627ecc68d9bf5721c7a9b5fe671171b6a4caef59f10ac00bec47dbcb38f516df274b352e
-
Filesize
232KB
MD5252c9b52cfcf5ffac40958d5bb74d70e
SHA1103b5f1125e05372f919cefa7e35b204bc46cbed
SHA2564e2a19d4bfb430667240a69c5f9e175f3547590223aec8fcb2147bb475167b16
SHA51218d8e8a9653f816b8985cc7815f629437f67f49cd5fe9b3e532eec23aefe44576dcf929fc6a2521aa2338375af12a288d49fa1eb68ed755b30f7d9073493094e
-
Filesize
2.6MB
MD5f1ef1aa5a6e2095daa4e467c68591311
SHA1a15b09c2503583bc3c87c9282d1db1fdfbcbce46
SHA2560a18212b4ce11258ea840a7f4d0ff59f1ed8f801b0cd77e5cb52a1e306af42a9
SHA5127a06a77775fdfef631e729587c9cb9cd93b1cfcb8ab1b90ab7862387ccc3f515dcc143689858bb83cc2e28ee15427132f192e56fb2e2ddc70e58e435381f224b
-
Filesize
203B
MD59db5feb30482519bf45ef4cf3c5f4254
SHA1a95cce5150370dc5333dedeae26413670a20640c
SHA256326a139ada008faabb9db8a4e4a0ddb1e18f0c3b7e97cb805f2cc42d62ee6d79
SHA5127e5ebf9069611dab2b8836ac68a0de7091cf5e2228a604d150ed02611c79a54e2df7b2b5722d64ca3482efb5666868386cd0d7d0abc108ef207290be5b493c78
-
Filesize
171B
MD55aead4e93a75b222447f1da63689ffa1
SHA15209c651424741d53213066316ba83590ead11b7
SHA256609f5b5ca2eaef9e0caf537919f470d1ebf8460952605c525d7d5cd910f6ee95
SHA51250a61940a1156b00151f5119364f473a17572c71a24a932fcef7e6ed8ded9878fd5368d0157fe8fde21f8aa3d2561df1142b0e65197821042444d1bc8b91c1cf
-
Filesize
2.6MB
MD51d6bcddc61b17e4b5200a3adea853260
SHA139b3017a869c5dd731c64b7350d4229fce45b170
SHA2563cef003a9b564e0f9e13b9c6fb259be1594ec1493ac40bdf7679418f2492b01b
SHA51274c5091394826c9e6c54bf594570b1be0e12f6a5b233fafea516a3f1c570afb536a1834863d77123e7513dd4c05b5a0dd2f2da6cde508fd936b0551a8467133a