Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 03:08

General

  • Target

    ecd9ab4926fe90483c61380a25b2648408cf4ea8735255efbe1afc3d14d4b027.exe

  • Size

    2.6MB

  • MD5

    bef79d648bdeb58a0bc004525085d3ce

  • SHA1

    5b7a996a951409a7cc1e104527ff68d2ac411d16

  • SHA256

    ecd9ab4926fe90483c61380a25b2648408cf4ea8735255efbe1afc3d14d4b027

  • SHA512

    a271301c4a291ad87ad8a75304143720ac1bb471ecb4655c2ae03fa239afd2f523b3b3a7e897a6efb65e1d2f21efd2d4704911de227cb65db82fed7151e106f3

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBdB/bS:sxX7QnxrloE5dpUpeb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ecd9ab4926fe90483c61380a25b2648408cf4ea8735255efbe1afc3d14d4b027.exe
    "C:\Users\Admin\AppData\Local\Temp\ecd9ab4926fe90483c61380a25b2648408cf4ea8735255efbe1afc3d14d4b027.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecaopti.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecaopti.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2420
    • C:\IntelprocTM\abodec.exe
      C:\IntelprocTM\abodec.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1536
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4344,i,11391966286255097843,10588851088187498028,262144 --variations-seed-version --mojo-platform-channel-handle=3904 /prefetch:8
    1⤵
      PID:2272

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\GalaxRC\dobaec.exe

      Filesize

      2.6MB

      MD5

      94e5d1eb679bb7df68c5ccaf36a97628

      SHA1

      b02136f07c8191df96fe84494efbfa1e32f31d30

      SHA256

      379e02d959bf85137e9023a85f93f8e27f163303060ed2d9978f52d00b3e4a21

      SHA512

      c7a76d16919c29530b8d524c80e0f9c95ef9582908f2c55d3f641ef776dff93af82135a85f821f20aee2227c9fffa02e0cb089b4afbf32db461dd7d34a977e5a

    • C:\GalaxRC\dobaec.exe

      Filesize

      621KB

      MD5

      a3c41400a1256b8e7095778361e589b2

      SHA1

      e6feef931115b7c767b0163430055e9dd71c26a2

      SHA256

      856f4a6c7fba3b1e99d533187a64c0c447d7d3312f233e61620fe71b485f5fc5

      SHA512

      aa756a57d140565b3733e537c7872bd49858c888742678ac41396409c16935f5fbda8fbc32bab2162e91090c7fb32dc10b128c077711d29d33f6b7e17329f26d

    • C:\IntelprocTM\abodec.exe

      Filesize

      1.1MB

      MD5

      01ec243f7218b03e69b1b21b93f98535

      SHA1

      53419ba4aa1598273fe192e0514b95e97168b73e

      SHA256

      606a811f3d5d24fb4f54336ac29efdb9afccab12f1ad7e3e64add0aaa60cf2ed

      SHA512

      434e381b0ef2a221a08eb24d81f0fab20fcf0bffcd937faa8936310cd2ccf4d844518b7b73bcc7a55ce0d35b6d8edd67bca5b403a1eca62ad4d4c7f559b5078b

    • C:\IntelprocTM\abodec.exe

      Filesize

      2.6MB

      MD5

      1a6ec1a0e930c67f3f1b51afb16e0a50

      SHA1

      0b2235ab137dfb1a6277b1f6de9a9a82e59197e0

      SHA256

      4bc16851385dec106341bc99b72c8635b8ead1994784b3a5548be1aa3b753d36

      SHA512

      b2ad8fb51f66d2c68f9779ee903f426a6bfe32f6fa128ccbb34e220bce79369114a12cb8fa3ccad305503ca73a3c8ebe436084a89bab7fe3e6517435991dd339

    • C:\Users\Admin\253086396416_10.0_Admin.ini

      Filesize

      203B

      MD5

      b6646dbd9d6fbfb2872cfaa5058586e0

      SHA1

      a698201128ee8c362a11447a5be2bffec15fbe16

      SHA256

      15cafa00da74f008204bf0d2b88fd29e32039688f5962b6d5471786ea99ee89b

      SHA512

      6f8a85da9ba75128f6a0b65100e34eaa35ae7f9a9434a9a1c0403062dae62870d8074104bd5f20eb1ac63aa24d6c25dff2a4a22814c92a5387b0d01b90ca3d82

    • C:\Users\Admin\253086396416_10.0_Admin.ini

      Filesize

      171B

      MD5

      99a2fdaad4fa466f4d96513a1ef3eeb6

      SHA1

      0aa73ecb283e33a0ec2714c4b70dfa7ee9e0075f

      SHA256

      c84e99dfbbcc05c3b85483e10a8a804e42a37b47d65a25545849608342b5986a

      SHA512

      ecac7704200bdb64691f914c6b7e084e8934fb497e1f319b6f90e93eb1d036a600dc0880413cae2c247b6d56b3d8dfe03f1f773f37b518741dbd25ed79ec426e

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecaopti.exe

      Filesize

      2.6MB

      MD5

      dd85123dc099e47ea040b01e3d2277c8

      SHA1

      4206bfdca83a997dd93cddc08f72823fa5ba458e

      SHA256

      af2da0b75c7ebac78cbed48bd507bf71519ad3e5d4fc86d4c56d5796d32233f1

      SHA512

      3d8bc76e6ba64ac4b0125b1bfe8f66a2ef906c51c77388a6eedffd872c37cb7e190c1c022f5e047d9bf4dbcd517c87ab4c3709737a66eba82c98e2fc7dbf2397