Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:08
Static task
static1
Behavioral task
behavioral1
Sample
ecd9ab4926fe90483c61380a25b2648408cf4ea8735255efbe1afc3d14d4b027.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ecd9ab4926fe90483c61380a25b2648408cf4ea8735255efbe1afc3d14d4b027.exe
Resource
win10v2004-20240802-en
General
-
Target
ecd9ab4926fe90483c61380a25b2648408cf4ea8735255efbe1afc3d14d4b027.exe
-
Size
2.6MB
-
MD5
bef79d648bdeb58a0bc004525085d3ce
-
SHA1
5b7a996a951409a7cc1e104527ff68d2ac411d16
-
SHA256
ecd9ab4926fe90483c61380a25b2648408cf4ea8735255efbe1afc3d14d4b027
-
SHA512
a271301c4a291ad87ad8a75304143720ac1bb471ecb4655c2ae03fa239afd2f523b3b3a7e897a6efb65e1d2f21efd2d4704911de227cb65db82fed7151e106f3
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBdB/bS:sxX7QnxrloE5dpUpeb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecaopti.exe ecd9ab4926fe90483c61380a25b2648408cf4ea8735255efbe1afc3d14d4b027.exe -
Executes dropped EXE 2 IoCs
pid Process 2420 ecaopti.exe 1536 abodec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocTM\\abodec.exe" ecd9ab4926fe90483c61380a25b2648408cf4ea8735255efbe1afc3d14d4b027.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxRC\\dobaec.exe" ecd9ab4926fe90483c61380a25b2648408cf4ea8735255efbe1afc3d14d4b027.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecd9ab4926fe90483c61380a25b2648408cf4ea8735255efbe1afc3d14d4b027.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecaopti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abodec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2784 ecd9ab4926fe90483c61380a25b2648408cf4ea8735255efbe1afc3d14d4b027.exe 2784 ecd9ab4926fe90483c61380a25b2648408cf4ea8735255efbe1afc3d14d4b027.exe 2784 ecd9ab4926fe90483c61380a25b2648408cf4ea8735255efbe1afc3d14d4b027.exe 2784 ecd9ab4926fe90483c61380a25b2648408cf4ea8735255efbe1afc3d14d4b027.exe 2420 ecaopti.exe 2420 ecaopti.exe 1536 abodec.exe 1536 abodec.exe 2420 ecaopti.exe 2420 ecaopti.exe 1536 abodec.exe 1536 abodec.exe 2420 ecaopti.exe 2420 ecaopti.exe 1536 abodec.exe 1536 abodec.exe 2420 ecaopti.exe 2420 ecaopti.exe 1536 abodec.exe 1536 abodec.exe 2420 ecaopti.exe 2420 ecaopti.exe 1536 abodec.exe 1536 abodec.exe 2420 ecaopti.exe 2420 ecaopti.exe 1536 abodec.exe 1536 abodec.exe 2420 ecaopti.exe 2420 ecaopti.exe 1536 abodec.exe 1536 abodec.exe 2420 ecaopti.exe 2420 ecaopti.exe 1536 abodec.exe 1536 abodec.exe 2420 ecaopti.exe 2420 ecaopti.exe 1536 abodec.exe 1536 abodec.exe 2420 ecaopti.exe 2420 ecaopti.exe 1536 abodec.exe 1536 abodec.exe 2420 ecaopti.exe 2420 ecaopti.exe 1536 abodec.exe 1536 abodec.exe 2420 ecaopti.exe 2420 ecaopti.exe 1536 abodec.exe 1536 abodec.exe 2420 ecaopti.exe 2420 ecaopti.exe 1536 abodec.exe 1536 abodec.exe 2420 ecaopti.exe 2420 ecaopti.exe 1536 abodec.exe 1536 abodec.exe 2420 ecaopti.exe 2420 ecaopti.exe 1536 abodec.exe 1536 abodec.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2420 2784 ecd9ab4926fe90483c61380a25b2648408cf4ea8735255efbe1afc3d14d4b027.exe 89 PID 2784 wrote to memory of 2420 2784 ecd9ab4926fe90483c61380a25b2648408cf4ea8735255efbe1afc3d14d4b027.exe 89 PID 2784 wrote to memory of 2420 2784 ecd9ab4926fe90483c61380a25b2648408cf4ea8735255efbe1afc3d14d4b027.exe 89 PID 2784 wrote to memory of 1536 2784 ecd9ab4926fe90483c61380a25b2648408cf4ea8735255efbe1afc3d14d4b027.exe 90 PID 2784 wrote to memory of 1536 2784 ecd9ab4926fe90483c61380a25b2648408cf4ea8735255efbe1afc3d14d4b027.exe 90 PID 2784 wrote to memory of 1536 2784 ecd9ab4926fe90483c61380a25b2648408cf4ea8735255efbe1afc3d14d4b027.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecd9ab4926fe90483c61380a25b2648408cf4ea8735255efbe1afc3d14d4b027.exe"C:\Users\Admin\AppData\Local\Temp\ecd9ab4926fe90483c61380a25b2648408cf4ea8735255efbe1afc3d14d4b027.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecaopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecaopti.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2420
-
-
C:\IntelprocTM\abodec.exeC:\IntelprocTM\abodec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4344,i,11391966286255097843,10588851088187498028,262144 --variations-seed-version --mojo-platform-channel-handle=3904 /prefetch:81⤵PID:2272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD594e5d1eb679bb7df68c5ccaf36a97628
SHA1b02136f07c8191df96fe84494efbfa1e32f31d30
SHA256379e02d959bf85137e9023a85f93f8e27f163303060ed2d9978f52d00b3e4a21
SHA512c7a76d16919c29530b8d524c80e0f9c95ef9582908f2c55d3f641ef776dff93af82135a85f821f20aee2227c9fffa02e0cb089b4afbf32db461dd7d34a977e5a
-
Filesize
621KB
MD5a3c41400a1256b8e7095778361e589b2
SHA1e6feef931115b7c767b0163430055e9dd71c26a2
SHA256856f4a6c7fba3b1e99d533187a64c0c447d7d3312f233e61620fe71b485f5fc5
SHA512aa756a57d140565b3733e537c7872bd49858c888742678ac41396409c16935f5fbda8fbc32bab2162e91090c7fb32dc10b128c077711d29d33f6b7e17329f26d
-
Filesize
1.1MB
MD501ec243f7218b03e69b1b21b93f98535
SHA153419ba4aa1598273fe192e0514b95e97168b73e
SHA256606a811f3d5d24fb4f54336ac29efdb9afccab12f1ad7e3e64add0aaa60cf2ed
SHA512434e381b0ef2a221a08eb24d81f0fab20fcf0bffcd937faa8936310cd2ccf4d844518b7b73bcc7a55ce0d35b6d8edd67bca5b403a1eca62ad4d4c7f559b5078b
-
Filesize
2.6MB
MD51a6ec1a0e930c67f3f1b51afb16e0a50
SHA10b2235ab137dfb1a6277b1f6de9a9a82e59197e0
SHA2564bc16851385dec106341bc99b72c8635b8ead1994784b3a5548be1aa3b753d36
SHA512b2ad8fb51f66d2c68f9779ee903f426a6bfe32f6fa128ccbb34e220bce79369114a12cb8fa3ccad305503ca73a3c8ebe436084a89bab7fe3e6517435991dd339
-
Filesize
203B
MD5b6646dbd9d6fbfb2872cfaa5058586e0
SHA1a698201128ee8c362a11447a5be2bffec15fbe16
SHA25615cafa00da74f008204bf0d2b88fd29e32039688f5962b6d5471786ea99ee89b
SHA5126f8a85da9ba75128f6a0b65100e34eaa35ae7f9a9434a9a1c0403062dae62870d8074104bd5f20eb1ac63aa24d6c25dff2a4a22814c92a5387b0d01b90ca3d82
-
Filesize
171B
MD599a2fdaad4fa466f4d96513a1ef3eeb6
SHA10aa73ecb283e33a0ec2714c4b70dfa7ee9e0075f
SHA256c84e99dfbbcc05c3b85483e10a8a804e42a37b47d65a25545849608342b5986a
SHA512ecac7704200bdb64691f914c6b7e084e8934fb497e1f319b6f90e93eb1d036a600dc0880413cae2c247b6d56b3d8dfe03f1f773f37b518741dbd25ed79ec426e
-
Filesize
2.6MB
MD5dd85123dc099e47ea040b01e3d2277c8
SHA14206bfdca83a997dd93cddc08f72823fa5ba458e
SHA256af2da0b75c7ebac78cbed48bd507bf71519ad3e5d4fc86d4c56d5796d32233f1
SHA5123d8bc76e6ba64ac4b0125b1bfe8f66a2ef906c51c77388a6eedffd872c37cb7e190c1c022f5e047d9bf4dbcd517c87ab4c3709737a66eba82c98e2fc7dbf2397