Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 00:39
Static task
static1
Behavioral task
behavioral1
Sample
98df5929746b5a9843f8f1396506f6033b30a4267a65523c62d5ead0189bfc9a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
98df5929746b5a9843f8f1396506f6033b30a4267a65523c62d5ead0189bfc9a.exe
Resource
win10v2004-20240802-en
General
-
Target
98df5929746b5a9843f8f1396506f6033b30a4267a65523c62d5ead0189bfc9a.exe
-
Size
2.6MB
-
MD5
37862b8d08be0d8b3e5c24bf546f045e
-
SHA1
94586846c58c3ea3fc036e050b151f90617dfe8b
-
SHA256
98df5929746b5a9843f8f1396506f6033b30a4267a65523c62d5ead0189bfc9a
-
SHA512
917229846f2fc8b109356f66d58915694288001d86eef6243f82c2ceea42cb7764d4e3f9cba0f33cfa13d5b67f00a08642d4ca800e151636bb35c00aa02bb583
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB4B/bS:sxX7QnxrloE5dpUpDb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecadob.exe 98df5929746b5a9843f8f1396506f6033b30a4267a65523c62d5ead0189bfc9a.exe -
Executes dropped EXE 2 IoCs
pid Process 2784 ecadob.exe 2780 aoptiloc.exe -
Loads dropped DLL 2 IoCs
pid Process 2248 98df5929746b5a9843f8f1396506f6033b30a4267a65523c62d5ead0189bfc9a.exe 2248 98df5929746b5a9843f8f1396506f6033b30a4267a65523c62d5ead0189bfc9a.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotKX\\aoptiloc.exe" 98df5929746b5a9843f8f1396506f6033b30a4267a65523c62d5ead0189bfc9a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Galax79\\dobdevloc.exe" 98df5929746b5a9843f8f1396506f6033b30a4267a65523c62d5ead0189bfc9a.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98df5929746b5a9843f8f1396506f6033b30a4267a65523c62d5ead0189bfc9a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecadob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aoptiloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2248 98df5929746b5a9843f8f1396506f6033b30a4267a65523c62d5ead0189bfc9a.exe 2248 98df5929746b5a9843f8f1396506f6033b30a4267a65523c62d5ead0189bfc9a.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe 2784 ecadob.exe 2780 aoptiloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2784 2248 98df5929746b5a9843f8f1396506f6033b30a4267a65523c62d5ead0189bfc9a.exe 30 PID 2248 wrote to memory of 2784 2248 98df5929746b5a9843f8f1396506f6033b30a4267a65523c62d5ead0189bfc9a.exe 30 PID 2248 wrote to memory of 2784 2248 98df5929746b5a9843f8f1396506f6033b30a4267a65523c62d5ead0189bfc9a.exe 30 PID 2248 wrote to memory of 2784 2248 98df5929746b5a9843f8f1396506f6033b30a4267a65523c62d5ead0189bfc9a.exe 30 PID 2248 wrote to memory of 2780 2248 98df5929746b5a9843f8f1396506f6033b30a4267a65523c62d5ead0189bfc9a.exe 31 PID 2248 wrote to memory of 2780 2248 98df5929746b5a9843f8f1396506f6033b30a4267a65523c62d5ead0189bfc9a.exe 31 PID 2248 wrote to memory of 2780 2248 98df5929746b5a9843f8f1396506f6033b30a4267a65523c62d5ead0189bfc9a.exe 31 PID 2248 wrote to memory of 2780 2248 98df5929746b5a9843f8f1396506f6033b30a4267a65523c62d5ead0189bfc9a.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\98df5929746b5a9843f8f1396506f6033b30a4267a65523c62d5ead0189bfc9a.exe"C:\Users\Admin\AppData\Local\Temp\98df5929746b5a9843f8f1396506f6033b30a4267a65523c62d5ead0189bfc9a.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecadob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecadob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2784
-
-
C:\UserDotKX\aoptiloc.exeC:\UserDotKX\aoptiloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD52db3716a2b90d8377bd721d454bcdfd9
SHA1e5b2d463a9734f715123186cb56d97748f5dc7da
SHA256715b8be4424c619ec4518bb7ce84412f35ca35c437f154db701f1f4dc92af2ec
SHA51264e6fbae90b25cc351c9220f38ac64090b7bea34788dc37c372b5e08cc8d4337e73bdf79445adb368e911df2e5add79385065f85dfb9e224aae00b1eac25f358
-
Filesize
2.6MB
MD562333dcb78476ee8786976d87e489ec7
SHA12368bfc847f8734302402c0984c414f4fa605467
SHA2569b51c271712d5d74eca2673d6e4fe1acdabfa9691429e56b6e3d44e6202a1df1
SHA5129ae26d7306a093476d79d966d53db06795218f3793d92e92d1299dcebcefb3618c9b7650522c9e2aeac56f3f9d116a357f0f0083dea473c76f976ea0a22a517b
-
Filesize
2.6MB
MD50249f6d69f112ac680118a390474adef
SHA103789f9cd623938f2e354205c941bed153f4980f
SHA256fe921cdc439719fc15883ddc6d3620eb2b4ff0ba4ece3b7cd9479edbf10dc353
SHA512f04858e98df0d73b971f0f9f7ff8d41db7248ba34bc03dbd0cfa8f6df13b13bc3b8e8957000f07fbcb38290216890bd617c6c400b4975b64362aea066de7d485
-
Filesize
173B
MD58de56e3084b319e60375c98a48d35255
SHA1489afc4b54c0cebc278be75e585c96b0bb12fa37
SHA256a77aa2272ef5346894709f0962416ebe93a333750058abcf55e0361cd24a0795
SHA5124af348243859c8dfc5c5771a2ebc4177be342c1b165449e67073bb0772ed182dea2d749ca990ee499510f2578a503f03b18942d93b8a98c9119a4ef22e43e5f9
-
Filesize
205B
MD513a3002b549f24c72a8de82caeb82208
SHA1e42071a3f40101fba0b6582fe5bebf6deaf3b16b
SHA256c7ad077dc1f9f623d497a046066abbdfee97c10fef7bc5c20db1e9e9a9a69640
SHA512ac0450086b0cf9531f0eda97710635078937c10ae98a3becb7a841a5d6f5dc9999cba8e7a665ec59b24764dec276a61a59084786250cfb217c2fad340ab7f8e7
-
Filesize
2.6MB
MD5f4cac399ef9e4de7d660be52b1ae91dc
SHA182b03058dafcf3178759d47ed9f6fd1f50ed3f46
SHA256de47db18c809c4d68266e6d94011bb3fa4d7536a1079fc7e322dc94f38e51f7c
SHA512319be7bdbf1d1666e5f12b580efe1c9114793c79a9c3639bb4dac18a3097ddd05c944534df73ae1e3f7c09a19662da7b09555f882816fd67d7f7c6770ea4a936