Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 03:05

General

  • Target

    eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe

  • Size

    2.6MB

  • MD5

    76d7cc0ad3e49a273abea16280736bea

  • SHA1

    26cae96fc932042876b2c7c22fe98eb352c5e879

  • SHA256

    eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da

  • SHA512

    ac42dca0f1c866656c0111c681fb8d55505ddfa2a8918d24e1471b8bf210cae4200c6d593e8a19d21905bc5bb47595537557b7175432bb164c61dd63f66b4ab9

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBCB/bS:sxX7QnxrloE5dpUpVb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe
    "C:\Users\Admin\AppData\Local\Temp\eb5c268a80ea4fa230c12aa20b64f831d08b7f43213511f947ce131e0dd043da.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1084
    • C:\UserDot30\xdobloc.exe
      C:\UserDot30\xdobloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\UserDot30\xdobloc.exe

    Filesize

    2.6MB

    MD5

    902f224e3f449d26a54bb3b55b70bb7e

    SHA1

    d574f8caf8a6d37b3df97e2541d03e41ca3fff67

    SHA256

    1467c8781046ec8f1b209efcda2b6b8f63f6b6323c7e804f1d142beff94c0efe

    SHA512

    039c4cb1b837477f68bec7b351f93e909e6fcd4ccc29268756ee027a8afd19bd330d6dd73b2279a55a5685a118e242f765ccc8c91359d1c598f4d63bba727746

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    169B

    MD5

    e6b3848603bc1d158dafd963fdec6bfb

    SHA1

    419b5199f12d025aa75eb65c42ec858d3bcb788b

    SHA256

    1909aeb819adb6ce9a20a15e2d5372fe05434f2ebc41009c67ee74839f03d4b9

    SHA512

    399bb8801cc70142c6571846b2ab379a90d6a79254e86d3dc4c3cd1c4c93ff0fdfcc444e5ee0a3a0092c4327839ffa842461b3b4010e0a54bf40dd2d5aa7056b

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    201B

    MD5

    6671eed38a71492f3d54156d547ae268

    SHA1

    30a50b1020bd2703f4fa9d466b6900a40693995e

    SHA256

    f9e9d0b512f61064e5f4f654249b52d831da84fa0a008d228e3877b4db67bc14

    SHA512

    036c563f607783abee5103ada6cd917c0b6074a8c1c6dfabe87141d30335808fd0b3009afc3e27f59d1c65cf73009f8be12da72ed5f707537dbc7918fc4bcdfd

  • C:\VidF8\dobxloc.exe

    Filesize

    2.3MB

    MD5

    a0c68e6f59fcc8ba9cca1d5b6f8d0d8d

    SHA1

    a9dd9b739bc12a666f923818bbf1caf348ececea

    SHA256

    a794f61208f60ae3e2200095062ee46ffd7501907bf47d631060df082620258e

    SHA512

    a671d54ef92752f23936cb301824ff9a9b62f3ac3ec2b72891b6f1c47f03710202c41a192b7737703c6dcbece93eae3881067dbec10270bd6d4960e670882b7a

  • C:\VidF8\dobxloc.exe

    Filesize

    2.6MB

    MD5

    56a94fa87e15895caf3a997b630e4541

    SHA1

    239463decbe8896a91164ea4aa98c567da740fd0

    SHA256

    4478ff3fa23f3eae61579a1605fef4663247907798ab6ead9ed34ef376b92dfe

    SHA512

    638815308a4b6012535ae4c1eb88744f4a46c3cc3c8a3eed470c3c02fa0256bd67ed932b95f20f31799c37eafdc2a2e6471b619d922475ed51a691e779317b0d

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe

    Filesize

    2.6MB

    MD5

    45671270b7b9c1dc200f0b946d7321f0

    SHA1

    6ce70b6327b90151763d73075b3a5fc03de19a6d

    SHA256

    055e2ccc401782418ad3d7581bde5f429563bf2daed72f39ed4e05de6a1b6ee0

    SHA512

    9af728be88f951ae8a135e52e0e91e886a707fa9bcb5590e3a5e0e42698324a5bc97442666a22b3dc353eea4343ef25ba642ab77377441738bc2162409f7676f