Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 10:10
Static task
static1
Behavioral task
behavioral1
Sample
132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe
Resource
win10v2004-20241007-en
General
-
Target
132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe
-
Size
2.6MB
-
MD5
74a102b9d9ec95b542cec341bfc44ec0
-
SHA1
ecf05f58be9f1816b6f6437cb4a3160d3ff20200
-
SHA256
132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793
-
SHA512
c3acc23063e4f8a0e2cefd161e270d44162221e91bbd583c14c9ed2ec49ed4606a0dcff92d569d8e6a4fc4a2cb4118510923d325701313eec55639e45d709a24
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBdB/bS:sxX7QnxrloE5dpUpyb
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevdob.exe 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe -
Executes dropped EXE 2 IoCs
pid Process 3028 ecdevdob.exe 2408 xoptiec.exe -
Loads dropped DLL 2 IoCs
pid Process 2484 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe 2484 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotHQ\\xoptiec.exe" 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZM3\\boddevloc.exe" 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecdevdob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xoptiec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2484 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe 2484 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe 3028 ecdevdob.exe 2408 xoptiec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2484 wrote to memory of 3028 2484 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe 31 PID 2484 wrote to memory of 3028 2484 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe 31 PID 2484 wrote to memory of 3028 2484 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe 31 PID 2484 wrote to memory of 3028 2484 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe 31 PID 2484 wrote to memory of 2408 2484 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe 32 PID 2484 wrote to memory of 2408 2484 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe 32 PID 2484 wrote to memory of 2408 2484 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe 32 PID 2484 wrote to memory of 2408 2484 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe"C:\Users\Admin\AppData\Local\Temp\132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevdob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevdob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3028
-
-
C:\UserDotHQ\xoptiec.exeC:\UserDotHQ\xoptiec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD567d30d800f70c6fcc6cf381ee6d41c49
SHA15abb4f1500fbba8209b375a323bc6da4c653c192
SHA2565bd33ed8dab0a4f8c4b23bc7625d9fc0f29774234acc1e27a139a814352a314c
SHA5122a503520dae73c6abb697b55ffec9a578fa12add5baca24c74cd70223e62cba5b5d8b5c91a3cd4e697817fec85996f03430cfcaa01ebd10ba1d3a92a6b92f0c8
-
Filesize
2.6MB
MD501d0e015a4e05a1c9bc099ccc25419fa
SHA151090f81c44a6b453183a8b5c60fa08a6d40bf72
SHA256f64cfac561f5e2edbaea4f52d73d81feb6ac4f46d8314967154be7a11f453497
SHA512741cbe46564c8d34e9e4118d2cc9318f7c9da8c3e1d9b637abeed93ed8213b0d942b19688ef68b93cecc6a6c1798827df95844a2affe4a382106bc0019815b76
-
Filesize
59KB
MD5c681406f0206ff6f39faae542685ca02
SHA117194a6e44c30508ab4b5584051495254faf1164
SHA2562bd598777819ffc71cfc165de225f85fa08a8fb094956522458ba030d8043d34
SHA5125907c2cdf30e397fcdb8d015b8ec0f14f4f27225dc83a2ccd23ac9b1fbee434243c8df0ff5ab840c9b7673d64fecac4ef327aed7ff9a61e9fba7de0cc66fad9c
-
Filesize
173B
MD58bdba7b194c6dccd51f8e4b27e0d5906
SHA14820e2b3bcdcb83f0e5267d563d2342d2f9c03f8
SHA2569d0164a02ac51b0553340dc4be41071239e9f620484e96d013445c57f55a8ade
SHA512af7e62d5dadced4fcbc8c3f6ff88fb9d6ff4d46c892714fcb07408696d855443a56db5727708d47c67c5f7d855d31a9442db64a2e386cd1fbe285dda0021110f
-
Filesize
205B
MD5e681c6ff58aba7cc6988445ecaebacc5
SHA13d6d3f6da39fbf6274d2fb5ddfb1d9e8f39a0109
SHA25693c1156cdc934b1d1204ef52ce927c6d8046689ad144de1d9d34ec6a1b475252
SHA51258933f0e2094f2b56d5b566a77748b8ac3be8be6e84300e01878d620474d8f1122eee0007177bb6a529356620b6a247eef76d13df173babfa552a9746ba50f4b
-
Filesize
2.6MB
MD5a921d0e037fa919c7d7aec3434ef748b
SHA1655193b99eeef99d5295710c9e297a5c0aed267d
SHA2563cb292f6a57209d6354731bbc9956ce1a997f4f885e700663f8c0f414e818343
SHA512175e75c41dcacc8c348132b652e933aead753924a9d3fea1ed0b474deb1e928d388ec95030cfc856e7611186f38594835e6cf98fa8de50cdf63dc5538f39151a
-
Filesize
2.6MB
MD57038a5c35cd88f78ce45a8c743b8b538
SHA1bef4e0ccedba57028010ba1d48bd4df6830531ff
SHA2565d92a77d40128da248d9602f8aecc177acad9f7ecc8654e4307a1f87508ed46d
SHA512d46f8ecb34b3fe3d6e8b4d0482f0cdd90a3ec23e7f4346f1481ffd6f39c528adbbd3ace6a5df343127e875cdf595401b64043127fa82147ad6d4b93ad5cbf08a