Analysis

  • max time kernel
    119s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2024, 18:57

General

  • Target

    ef90e2b9c1bc9ab61fad7d4fe81e0208292e3ddc337ee410b7fe482eeee3120fN.exe

  • Size

    2.6MB

  • MD5

    c953931e3bf8cf5379b05acd13265380

  • SHA1

    e345d54f626a710972a4664e60987ea2d1b1ed1d

  • SHA256

    ef90e2b9c1bc9ab61fad7d4fe81e0208292e3ddc337ee410b7fe482eeee3120f

  • SHA512

    096be0daa7505ad55715a20318e1799ebb99926ef9b6fb2e3388499ca6ab4ddd7dfd663ed6c83cb9454a4c2f32de5f1cdf425de95794526e9d6829fc1d6af312

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBGB/bS:sxX7QnxrloE5dpUpZb

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef90e2b9c1bc9ab61fad7d4fe81e0208292e3ddc337ee410b7fe482eeee3120fN.exe
    "C:\Users\Admin\AppData\Local\Temp\ef90e2b9c1bc9ab61fad7d4fe81e0208292e3ddc337ee410b7fe482eeee3120fN.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4080
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecaopti.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecaopti.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:5104
    • C:\AdobeS1\devbodloc.exe
      C:\AdobeS1\devbodloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\AdobeS1\devbodloc.exe

    Filesize

    2.6MB

    MD5

    a4a1a7f38e05ce966149a36ca739c45f

    SHA1

    698448a09417b06d2998e91bbfed3b4d0d0bcd24

    SHA256

    c996b6a6283cb14220abfb918d82ab41116dd8c4fff7e0a809fbe2b6bf5f4e4c

    SHA512

    3c256423a39e285f69a5d3fbb9af43054ed893f97780f8be447cc8cbd0f8145813dfa5e6a6de6fdcd55125a311d896a5f3de02b1f570e05ed2337a8ce111e5ef

  • C:\KaVBD0\optixloc.exe

    Filesize

    193KB

    MD5

    adb552d0b580425058cf06c2e3b1dc0c

    SHA1

    438e7c7695ae234603ac6cb62b72531549b1f669

    SHA256

    af6c0530284616084223ac42d98127af5564a60d9bcd5f8fe306579c3cb5d50d

    SHA512

    d5eb72a9957405409054cdbe7d07b5b40c51c048fc5233aafa3a7a291b494d90fb3e6d4974d286617a70ffb50cfa34787344e3cd114baf71ea984da84b021197

  • C:\KaVBD0\optixloc.exe

    Filesize

    85KB

    MD5

    ec66f9943734e3eff5ce34c544a106eb

    SHA1

    f57169d3266caeac9f1495e57a2bb7046462bdee

    SHA256

    6e0021622d2759e70f1181eb24821153dbb68bfa7a45e543c7e1ea8f763cea8a

    SHA512

    a95d31fa416337668f041c970ab120526c8b071953d744c1aa0e5a9d94b7cca6e4a8873b4edc910436d6ac8d715fbdeea4d0b64e723e94d61cc0f020f38deda8

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    203B

    MD5

    d5fd567116db20a102f95e7f87d32e00

    SHA1

    30382ae34136cbfe4a1752e6c7c19c6cbdc650f1

    SHA256

    b6f2981609ccfcd74e7973bc3f83e2e4cf24afb46aaa5681492529458369c60a

    SHA512

    32b2d643b7d77528389ae50b98f6b9ffa271f63003ea440a00db3ff3218819fd3c8a1452b81986cfc27636a829769877c9fea98c24b0c8c2ddeb96eb6d08d57e

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    171B

    MD5

    6c77bfd006c6e8b1e51b82b88aa4e959

    SHA1

    674fcecd3975143fd480d8946807091e27023768

    SHA256

    1eb36d2e260cdf0b52ef80e36d6c895e5c5c9d19148123eaf7755bfd8a1461b8

    SHA512

    6cc3612d059b7a054042371c2dca5efc3b79f3987214393584a3d2b106650d6066d3a5a57f82c6b97145698ccccbdeb5eaf8a402cc47a820581a777a707a1656

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecaopti.exe

    Filesize

    2.6MB

    MD5

    2e30b42f7ae0d063f83af6ff2ac1c00c

    SHA1

    91011f05da5165bbc7480e8e21462b6eabf8c6dd

    SHA256

    ce82355ed9abdc8f3c6162d097004949068fdeb2f02eb4e34910b558dcccc450

    SHA512

    a3a8c605ae5fe2561d63c689b3aade005651660c5a64a09f6ab486aabf8fb275915b4ef4791ff1ca0ec7e03bfe62b85d205bcae9ca67f3660fc6f426088b66ec