Analysis
-
max time kernel
119s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 10:10
Static task
static1
Behavioral task
behavioral1
Sample
132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe
Resource
win10v2004-20241007-en
General
-
Target
132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe
-
Size
2.6MB
-
MD5
74a102b9d9ec95b542cec341bfc44ec0
-
SHA1
ecf05f58be9f1816b6f6437cb4a3160d3ff20200
-
SHA256
132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793
-
SHA512
c3acc23063e4f8a0e2cefd161e270d44162221e91bbd583c14c9ed2ec49ed4606a0dcff92d569d8e6a4fc4a2cb4118510923d325701313eec55639e45d709a24
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBdB/bS:sxX7QnxrloE5dpUpyb
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe -
Executes dropped EXE 2 IoCs
pid Process 700 ecabod.exe 2360 devbodec.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvVD\\devbodec.exe" 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Mint01\\bodaloc.exe" 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecabod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devbodec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1716 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe 1716 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe 1716 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe 1716 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe 700 ecabod.exe 700 ecabod.exe 2360 devbodec.exe 2360 devbodec.exe 700 ecabod.exe 700 ecabod.exe 2360 devbodec.exe 2360 devbodec.exe 700 ecabod.exe 700 ecabod.exe 2360 devbodec.exe 2360 devbodec.exe 700 ecabod.exe 700 ecabod.exe 2360 devbodec.exe 2360 devbodec.exe 700 ecabod.exe 700 ecabod.exe 2360 devbodec.exe 2360 devbodec.exe 700 ecabod.exe 700 ecabod.exe 2360 devbodec.exe 2360 devbodec.exe 700 ecabod.exe 700 ecabod.exe 2360 devbodec.exe 2360 devbodec.exe 700 ecabod.exe 700 ecabod.exe 2360 devbodec.exe 2360 devbodec.exe 700 ecabod.exe 700 ecabod.exe 2360 devbodec.exe 2360 devbodec.exe 700 ecabod.exe 700 ecabod.exe 2360 devbodec.exe 2360 devbodec.exe 700 ecabod.exe 700 ecabod.exe 2360 devbodec.exe 2360 devbodec.exe 700 ecabod.exe 700 ecabod.exe 2360 devbodec.exe 2360 devbodec.exe 700 ecabod.exe 700 ecabod.exe 2360 devbodec.exe 2360 devbodec.exe 700 ecabod.exe 700 ecabod.exe 2360 devbodec.exe 2360 devbodec.exe 700 ecabod.exe 700 ecabod.exe 2360 devbodec.exe 2360 devbodec.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1716 wrote to memory of 700 1716 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe 86 PID 1716 wrote to memory of 700 1716 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe 86 PID 1716 wrote to memory of 700 1716 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe 86 PID 1716 wrote to memory of 2360 1716 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe 87 PID 1716 wrote to memory of 2360 1716 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe 87 PID 1716 wrote to memory of 2360 1716 132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe"C:\Users\Admin\AppData\Local\Temp\132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:700
-
-
C:\SysDrvVD\devbodec.exeC:\SysDrvVD\devbodec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342KB
MD5218777322c8b756a99a8c4f265a3d649
SHA146da3dc0f1dd13ad8089b7bc899e1ed9fb67f194
SHA256fea7a47bb662c6ca1b21bd2f86fd87fecf455d1c4c14d9a7c6504c0cb3cbf6b4
SHA512fad1d110767890ea03886d349bceaf0dd54d99ff76a7ebacee3654d7b0f1db710d967a43a8c712f16b47f9562fd85fe54e920a93d1cae02b54d32d3e15dfab4d
-
Filesize
2.6MB
MD5c707301dea7da323d33b0a49efc9370b
SHA18f5dcf765aca3d728db470cfc3fd00f15155849c
SHA256f601e59db2e602502cb6b5b0bffb7ba239893f8cf7eefeccd3dd1c30cf2eb495
SHA512141e11ae52eeda7094939f6170d756e6d9c3e819e5e117d627c295b6c8fcee9efe29c75f0924ecbe309c9933a99ebf2ad148c7a7b031a465af9cf18c60818e90
-
Filesize
2.6MB
MD5c88b8303a0cd88bb5c7515466f11eed6
SHA19a55ec20920eab25c31d548003ec7db97bdd841b
SHA256d0517dc872a7d8eb7a373b4071df83f1b870565fb002ced109c1d92f5ca41a24
SHA5121638e34044488f7c0914fbd549e7cf81b9ad7c270c867ff489f4439954bf9a0a83f57ad3ff9414910bff785a0faee71bca8edefdd2eb125b084f96bff20abd0d
-
Filesize
201B
MD55b4a20bb61be7b0c26ffd051805860c8
SHA1ab1dec7bad3a792c940b3576f524529fa7d4530d
SHA256ccda044019e8d53b6fb012297eb7e66f0ee4859cc50faa425d9332d7c6daea79
SHA512dc40e67bb5d1256310b39b261d2b7d72120044669ac8b28f07c06f6da989b68c2d381e52fb343587407cefd80e4f54afaf8bcc71ab5e67058a4e1cddc33dde11
-
Filesize
169B
MD5a4dccbfc72b720e5cd3e36f5e0f95709
SHA164bfb692aab6589732794183bf977383a4802f56
SHA256daad74f132f1e135bc77b7faf8bc0cb2b1d43ca3237a1a509b780ab71821a397
SHA512917eca9fe6fbacf96e94f3001b4fb5cdb9205b203645f88be26891ff4045cb910012f75d1ce0892399b4cf52e526a4ec6a323f632b26dbbecacbe4bda5280876
-
Filesize
2.6MB
MD59dc3487fb84e09597ca8e4ca457012f2
SHA17aba9f443010d52a693d18be48bbcdf5e443a736
SHA256ce2e762b5d332bb33a67d63a79999bcb89870934a44119894d22b90acca66672
SHA51225f8d107089fb3c490a37cc54055904acd827cde2a7ce8adae1625ebd16a7ea0dff14ab2e6e55580ba9e998fb576dbbfef2f659b398761e03a4cab36945c31c3