Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:05
Static task
static1
Behavioral task
behavioral1
Sample
eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe
Resource
win10v2004-20240802-en
General
-
Target
eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe
-
Size
2.6MB
-
MD5
76d7cc0ad3e49a273abea16280736bea
-
SHA1
26cae96fc932042876b2c7c22fe98eb352c5e879
-
SHA256
eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da
-
SHA512
ac42dca0f1c866656c0111c681fb8d55505ddfa2a8918d24e1471b8bf210cae4200c6d593e8a19d21905bc5bb47595537557b7175432bb164c61dd63f66b4ab9
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBCB/bS:sxX7QnxrloE5dpUpVb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe -
Executes dropped EXE 2 IoCs
pid Process 1084 ecxopti.exe 3012 xdobloc.exe -
Loads dropped DLL 2 IoCs
pid Process 2336 eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe 2336 eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDot30\\xdobloc.exe" eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidF8\\dobxloc.exe" eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecxopti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdobloc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2336 eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe 2336 eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe 1084 ecxopti.exe 3012 xdobloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1084 2336 eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe 31 PID 2336 wrote to memory of 1084 2336 eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe 31 PID 2336 wrote to memory of 1084 2336 eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe 31 PID 2336 wrote to memory of 1084 2336 eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe 31 PID 2336 wrote to memory of 3012 2336 eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe 32 PID 2336 wrote to memory of 3012 2336 eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe 32 PID 2336 wrote to memory of 3012 2336 eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe 32 PID 2336 wrote to memory of 3012 2336 eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe"C:\Users\Admin\AppData\Local\Temp\eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1084
-
-
C:\UserDot30\xdobloc.exeC:\UserDot30\xdobloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5902f224e3f449d26a54bb3b55b70bb7e
SHA1d574f8caf8a6d37b3df97e2541d03e41ca3fff67
SHA2561467c8781046ec8f1b209efcda2b6b8f63f6b6323c7e804f1d142beff94c0efe
SHA512039c4cb1b837477f68bec7b351f93e909e6fcd4ccc29268756ee027a8afd19bd330d6dd73b2279a55a5685a118e242f765ccc8c91359d1c598f4d63bba727746
-
Filesize
169B
MD5e6b3848603bc1d158dafd963fdec6bfb
SHA1419b5199f12d025aa75eb65c42ec858d3bcb788b
SHA2561909aeb819adb6ce9a20a15e2d5372fe05434f2ebc41009c67ee74839f03d4b9
SHA512399bb8801cc70142c6571846b2ab379a90d6a79254e86d3dc4c3cd1c4c93ff0fdfcc444e5ee0a3a0092c4327839ffa842461b3b4010e0a54bf40dd2d5aa7056b
-
Filesize
201B
MD56671eed38a71492f3d54156d547ae268
SHA130a50b1020bd2703f4fa9d466b6900a40693995e
SHA256f9e9d0b512f61064e5f4f654249b52d831da84fa0a008d228e3877b4db67bc14
SHA512036c563f607783abee5103ada6cd917c0b6074a8c1c6dfabe87141d30335808fd0b3009afc3e27f59d1c65cf73009f8be12da72ed5f707537dbc7918fc4bcdfd
-
Filesize
2.3MB
MD5a0c68e6f59fcc8ba9cca1d5b6f8d0d8d
SHA1a9dd9b739bc12a666f923818bbf1caf348ececea
SHA256a794f61208f60ae3e2200095062ee46ffd7501907bf47d631060df082620258e
SHA512a671d54ef92752f23936cb301824ff9a9b62f3ac3ec2b72891b6f1c47f03710202c41a192b7737703c6dcbece93eae3881067dbec10270bd6d4960e670882b7a
-
Filesize
2.6MB
MD556a94fa87e15895caf3a997b630e4541
SHA1239463decbe8896a91164ea4aa98c567da740fd0
SHA2564478ff3fa23f3eae61579a1605fef4663247907798ab6ead9ed34ef376b92dfe
SHA512638815308a4b6012535ae4c1eb88744f4a46c3cc3c8a3eed470c3c02fa0256bd67ed932b95f20f31799c37eafdc2a2e6471b619d922475ed51a691e779317b0d
-
Filesize
2.6MB
MD545671270b7b9c1dc200f0b946d7321f0
SHA16ce70b6327b90151763d73075b3a5fc03de19a6d
SHA256055e2ccc401782418ad3d7581bde5f429563bf2daed72f39ed4e05de6a1b6ee0
SHA5129af728be88f951ae8a135e52e0e91e886a707fa9bcb5590e3a5e0e42698324a5bc97442666a22b3dc353eea4343ef25ba642ab77377441738bc2162409f7676f