Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 18:57
Static task
static1
Behavioral task
behavioral1
Sample
ef90e2b9c1bc9ab61fad7d4fe81e0208292e3ddc337ee410b7fe482eeee3120fN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ef90e2b9c1bc9ab61fad7d4fe81e0208292e3ddc337ee410b7fe482eeee3120fN.exe
Resource
win10v2004-20240802-en
General
-
Target
ef90e2b9c1bc9ab61fad7d4fe81e0208292e3ddc337ee410b7fe482eeee3120fN.exe
-
Size
2.6MB
-
MD5
c953931e3bf8cf5379b05acd13265380
-
SHA1
e345d54f626a710972a4664e60987ea2d1b1ed1d
-
SHA256
ef90e2b9c1bc9ab61fad7d4fe81e0208292e3ddc337ee410b7fe482eeee3120f
-
SHA512
096be0daa7505ad55715a20318e1799ebb99926ef9b6fb2e3388499ca6ab4ddd7dfd663ed6c83cb9454a4c2f32de5f1cdf425de95794526e9d6829fc1d6af312
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBGB/bS:sxX7QnxrloE5dpUpZb
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecaopti.exe ef90e2b9c1bc9ab61fad7d4fe81e0208292e3ddc337ee410b7fe482eeee3120fN.exe -
Executes dropped EXE 2 IoCs
pid Process 5104 ecaopti.exe 4464 devbodloc.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeS1\\devbodloc.exe" ef90e2b9c1bc9ab61fad7d4fe81e0208292e3ddc337ee410b7fe482eeee3120fN.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBD0\\optixloc.exe" ef90e2b9c1bc9ab61fad7d4fe81e0208292e3ddc337ee410b7fe482eeee3120fN.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef90e2b9c1bc9ab61fad7d4fe81e0208292e3ddc337ee410b7fe482eeee3120fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecaopti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devbodloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4080 ef90e2b9c1bc9ab61fad7d4fe81e0208292e3ddc337ee410b7fe482eeee3120fN.exe 4080 ef90e2b9c1bc9ab61fad7d4fe81e0208292e3ddc337ee410b7fe482eeee3120fN.exe 4080 ef90e2b9c1bc9ab61fad7d4fe81e0208292e3ddc337ee410b7fe482eeee3120fN.exe 4080 ef90e2b9c1bc9ab61fad7d4fe81e0208292e3ddc337ee410b7fe482eeee3120fN.exe 5104 ecaopti.exe 5104 ecaopti.exe 4464 devbodloc.exe 4464 devbodloc.exe 5104 ecaopti.exe 5104 ecaopti.exe 4464 devbodloc.exe 4464 devbodloc.exe 5104 ecaopti.exe 5104 ecaopti.exe 4464 devbodloc.exe 4464 devbodloc.exe 5104 ecaopti.exe 5104 ecaopti.exe 4464 devbodloc.exe 4464 devbodloc.exe 5104 ecaopti.exe 5104 ecaopti.exe 4464 devbodloc.exe 4464 devbodloc.exe 5104 ecaopti.exe 5104 ecaopti.exe 4464 devbodloc.exe 4464 devbodloc.exe 5104 ecaopti.exe 5104 ecaopti.exe 4464 devbodloc.exe 4464 devbodloc.exe 5104 ecaopti.exe 5104 ecaopti.exe 4464 devbodloc.exe 4464 devbodloc.exe 5104 ecaopti.exe 5104 ecaopti.exe 4464 devbodloc.exe 4464 devbodloc.exe 5104 ecaopti.exe 5104 ecaopti.exe 4464 devbodloc.exe 4464 devbodloc.exe 5104 ecaopti.exe 5104 ecaopti.exe 4464 devbodloc.exe 4464 devbodloc.exe 5104 ecaopti.exe 5104 ecaopti.exe 4464 devbodloc.exe 4464 devbodloc.exe 5104 ecaopti.exe 5104 ecaopti.exe 4464 devbodloc.exe 4464 devbodloc.exe 5104 ecaopti.exe 5104 ecaopti.exe 4464 devbodloc.exe 4464 devbodloc.exe 5104 ecaopti.exe 5104 ecaopti.exe 4464 devbodloc.exe 4464 devbodloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4080 wrote to memory of 5104 4080 ef90e2b9c1bc9ab61fad7d4fe81e0208292e3ddc337ee410b7fe482eeee3120fN.exe 82 PID 4080 wrote to memory of 5104 4080 ef90e2b9c1bc9ab61fad7d4fe81e0208292e3ddc337ee410b7fe482eeee3120fN.exe 82 PID 4080 wrote to memory of 5104 4080 ef90e2b9c1bc9ab61fad7d4fe81e0208292e3ddc337ee410b7fe482eeee3120fN.exe 82 PID 4080 wrote to memory of 4464 4080 ef90e2b9c1bc9ab61fad7d4fe81e0208292e3ddc337ee410b7fe482eeee3120fN.exe 83 PID 4080 wrote to memory of 4464 4080 ef90e2b9c1bc9ab61fad7d4fe81e0208292e3ddc337ee410b7fe482eeee3120fN.exe 83 PID 4080 wrote to memory of 4464 4080 ef90e2b9c1bc9ab61fad7d4fe81e0208292e3ddc337ee410b7fe482eeee3120fN.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef90e2b9c1bc9ab61fad7d4fe81e0208292e3ddc337ee410b7fe482eeee3120fN.exe"C:\Users\Admin\AppData\Local\Temp\ef90e2b9c1bc9ab61fad7d4fe81e0208292e3ddc337ee410b7fe482eeee3120fN.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecaopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecaopti.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5104
-
-
C:\AdobeS1\devbodloc.exeC:\AdobeS1\devbodloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5a4a1a7f38e05ce966149a36ca739c45f
SHA1698448a09417b06d2998e91bbfed3b4d0d0bcd24
SHA256c996b6a6283cb14220abfb918d82ab41116dd8c4fff7e0a809fbe2b6bf5f4e4c
SHA5123c256423a39e285f69a5d3fbb9af43054ed893f97780f8be447cc8cbd0f8145813dfa5e6a6de6fdcd55125a311d896a5f3de02b1f570e05ed2337a8ce111e5ef
-
Filesize
193KB
MD5adb552d0b580425058cf06c2e3b1dc0c
SHA1438e7c7695ae234603ac6cb62b72531549b1f669
SHA256af6c0530284616084223ac42d98127af5564a60d9bcd5f8fe306579c3cb5d50d
SHA512d5eb72a9957405409054cdbe7d07b5b40c51c048fc5233aafa3a7a291b494d90fb3e6d4974d286617a70ffb50cfa34787344e3cd114baf71ea984da84b021197
-
Filesize
85KB
MD5ec66f9943734e3eff5ce34c544a106eb
SHA1f57169d3266caeac9f1495e57a2bb7046462bdee
SHA2566e0021622d2759e70f1181eb24821153dbb68bfa7a45e543c7e1ea8f763cea8a
SHA512a95d31fa416337668f041c970ab120526c8b071953d744c1aa0e5a9d94b7cca6e4a8873b4edc910436d6ac8d715fbdeea4d0b64e723e94d61cc0f020f38deda8
-
Filesize
203B
MD5d5fd567116db20a102f95e7f87d32e00
SHA130382ae34136cbfe4a1752e6c7c19c6cbdc650f1
SHA256b6f2981609ccfcd74e7973bc3f83e2e4cf24afb46aaa5681492529458369c60a
SHA51232b2d643b7d77528389ae50b98f6b9ffa271f63003ea440a00db3ff3218819fd3c8a1452b81986cfc27636a829769877c9fea98c24b0c8c2ddeb96eb6d08d57e
-
Filesize
171B
MD56c77bfd006c6e8b1e51b82b88aa4e959
SHA1674fcecd3975143fd480d8946807091e27023768
SHA2561eb36d2e260cdf0b52ef80e36d6c895e5c5c9d19148123eaf7755bfd8a1461b8
SHA5126cc3612d059b7a054042371c2dca5efc3b79f3987214393584a3d2b106650d6066d3a5a57f82c6b97145698ccccbdeb5eaf8a402cc47a820581a777a707a1656
-
Filesize
2.6MB
MD52e30b42f7ae0d063f83af6ff2ac1c00c
SHA191011f05da5165bbc7480e8e21462b6eabf8c6dd
SHA256ce82355ed9abdc8f3c6162d097004949068fdeb2f02eb4e34910b558dcccc450
SHA512a3a8c605ae5fe2561d63c689b3aade005651660c5a64a09f6ab486aabf8fb275915b4ef4791ff1ca0ec7e03bfe62b85d205bcae9ca67f3660fc6f426088b66ec