Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 20:51
Static task
static1
Behavioral task
behavioral1
Sample
37c817cad9f19011264dcedd3f1abdf0da725a33eb79167879fa52d2b9fefbf7.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
37c817cad9f19011264dcedd3f1abdf0da725a33eb79167879fa52d2b9fefbf7.exe
Resource
win10v2004-20241007-en
General
-
Target
37c817cad9f19011264dcedd3f1abdf0da725a33eb79167879fa52d2b9fefbf7.exe
-
Size
2.6MB
-
MD5
0b0472b6e2af847c5469af9e25bf8abc
-
SHA1
e7a6449c55b709c94368a1851d746f68b718f041
-
SHA256
37c817cad9f19011264dcedd3f1abdf0da725a33eb79167879fa52d2b9fefbf7
-
SHA512
a29e04cf84c6233cae4af0fb70f09df2d783753864eda467d29538e3b7af375aeb1ed3712b161edfafaf18a1270059365b49bbc9bb243affec32c6761c0d9ae8
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBlB/bS:sxX7QnxrloE5dpUpWb
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe 37c817cad9f19011264dcedd3f1abdf0da725a33eb79167879fa52d2b9fefbf7.exe -
Executes dropped EXE 2 IoCs
pid Process 4000 ecdevbod.exe 1872 adobsys.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocKZ\\adobsys.exe" 37c817cad9f19011264dcedd3f1abdf0da725a33eb79167879fa52d2b9fefbf7.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVB6J\\boddevsys.exe" 37c817cad9f19011264dcedd3f1abdf0da725a33eb79167879fa52d2b9fefbf7.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37c817cad9f19011264dcedd3f1abdf0da725a33eb79167879fa52d2b9fefbf7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecdevbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1992 37c817cad9f19011264dcedd3f1abdf0da725a33eb79167879fa52d2b9fefbf7.exe 1992 37c817cad9f19011264dcedd3f1abdf0da725a33eb79167879fa52d2b9fefbf7.exe 1992 37c817cad9f19011264dcedd3f1abdf0da725a33eb79167879fa52d2b9fefbf7.exe 1992 37c817cad9f19011264dcedd3f1abdf0da725a33eb79167879fa52d2b9fefbf7.exe 4000 ecdevbod.exe 4000 ecdevbod.exe 1872 adobsys.exe 1872 adobsys.exe 4000 ecdevbod.exe 4000 ecdevbod.exe 1872 adobsys.exe 1872 adobsys.exe 4000 ecdevbod.exe 4000 ecdevbod.exe 1872 adobsys.exe 1872 adobsys.exe 4000 ecdevbod.exe 4000 ecdevbod.exe 1872 adobsys.exe 1872 adobsys.exe 4000 ecdevbod.exe 4000 ecdevbod.exe 1872 adobsys.exe 1872 adobsys.exe 4000 ecdevbod.exe 4000 ecdevbod.exe 1872 adobsys.exe 1872 adobsys.exe 4000 ecdevbod.exe 4000 ecdevbod.exe 1872 adobsys.exe 1872 adobsys.exe 4000 ecdevbod.exe 4000 ecdevbod.exe 1872 adobsys.exe 1872 adobsys.exe 4000 ecdevbod.exe 4000 ecdevbod.exe 1872 adobsys.exe 1872 adobsys.exe 4000 ecdevbod.exe 4000 ecdevbod.exe 1872 adobsys.exe 1872 adobsys.exe 4000 ecdevbod.exe 4000 ecdevbod.exe 1872 adobsys.exe 1872 adobsys.exe 4000 ecdevbod.exe 4000 ecdevbod.exe 1872 adobsys.exe 1872 adobsys.exe 4000 ecdevbod.exe 4000 ecdevbod.exe 1872 adobsys.exe 1872 adobsys.exe 4000 ecdevbod.exe 4000 ecdevbod.exe 1872 adobsys.exe 1872 adobsys.exe 4000 ecdevbod.exe 4000 ecdevbod.exe 1872 adobsys.exe 1872 adobsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1992 wrote to memory of 4000 1992 37c817cad9f19011264dcedd3f1abdf0da725a33eb79167879fa52d2b9fefbf7.exe 86 PID 1992 wrote to memory of 4000 1992 37c817cad9f19011264dcedd3f1abdf0da725a33eb79167879fa52d2b9fefbf7.exe 86 PID 1992 wrote to memory of 4000 1992 37c817cad9f19011264dcedd3f1abdf0da725a33eb79167879fa52d2b9fefbf7.exe 86 PID 1992 wrote to memory of 1872 1992 37c817cad9f19011264dcedd3f1abdf0da725a33eb79167879fa52d2b9fefbf7.exe 87 PID 1992 wrote to memory of 1872 1992 37c817cad9f19011264dcedd3f1abdf0da725a33eb79167879fa52d2b9fefbf7.exe 87 PID 1992 wrote to memory of 1872 1992 37c817cad9f19011264dcedd3f1abdf0da725a33eb79167879fa52d2b9fefbf7.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\37c817cad9f19011264dcedd3f1abdf0da725a33eb79167879fa52d2b9fefbf7.exe"C:\Users\Admin\AppData\Local\Temp\37c817cad9f19011264dcedd3f1abdf0da725a33eb79167879fa52d2b9fefbf7.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4000
-
-
C:\IntelprocKZ\adobsys.exeC:\IntelprocKZ\adobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD54f22d799849ad951d457b82eff37db75
SHA14e1063fe8d636bd72f9cd680c689c23c67188ea6
SHA2566d731a85e1aa5373ae56b774f79879aaae0bf7acee2d491ffbe549dc72920948
SHA5129906f7f210918aad8326adf8876fb1a50517812f1d6dc706f0ad6c14c9363ea1c2bdf15f1589563e9483925b76a4a315f4db9d27af6ab0674f200275d3b25f9a
-
Filesize
2.6MB
MD5b5d374538d2752a5797b5a4a7e12a2c0
SHA145adda626032715e4d095272804cfd0068ab3a5d
SHA25651df730d7e0cc682a3e5d35dd5a5fad15704ef91b5cfcb91ae67c6c2b1539b60
SHA512b16cd7eb23091c8dc7ac7a72bdfc8c2e93a9767d210d78071831e6d2f89d5e9de512f560e703b90d3dd38931e183ca0f30040a5d836596bba5166a8a8d14261b
-
Filesize
2.6MB
MD5e704ff03514f276303442692bd105bb8
SHA128fcce522bb2b2c47d1a72f8762744f73872a896
SHA256afe3cf8a417c0dbb55a2cfc35bae145faca46c7ab7d259750f9c7fa31c5b0e89
SHA512255baca4069011e989dfae856e8d66f31863a2f9ffd6cc8bf69740d0052df2e75cc513ab7e865625ee40b348976ef50eea85c776d2a720a60b419ba768b0c126
-
Filesize
178KB
MD5a990ac71037b0de5ae4653d9345be900
SHA11eaaf5d46ef19be783368b3c9cba6d35cdd7d5bb
SHA25680c8f037b2960351c8c3b01979b5ca4d6e61cf8ca712a1092087c08a5c807d7b
SHA5121ae49451408c196289e815384f1566c851d7144ad2f50b7768fcc53ad1e13553ba4d64b8c1925b49692d320467e12a50dc2c55fc0e71807a7530d20b86033bc2
-
Filesize
207B
MD5645133286b1cfd86f3b794adc392d602
SHA1048ced9c75bd04f0dc8192b43245f4176538ee51
SHA256fb5282e847e6b7bebf46c7941e11c7e29583d2dd4a3270f88133741dd6672395
SHA5127f6b50acd285198aea0bccdfe0b6601dca25f6e5df5124229f8bc5bfb512dcca1575b657cd9fa4089695efefe0c2e9d6d139136ade66683ad9a426f946b1a90b
-
Filesize
175B
MD5fd7b7d2f500252a8c01320136097abb5
SHA123703eb0ad6ef136ad823e55096fa4d0609b044f
SHA256cd5f0f05075a1e33096346a378e70c3f836373dfa22aa7f91c5f68a802ec25d5
SHA5122e710e9bec000cd32324d39b6fbd78cdcd6d55bb5f3841ce4c849b7e2f25adac7faf50bbc13135d8202e7be7b5dd8e9652d451ac9257d7abe1cb24b52ee98044
-
Filesize
2.6MB
MD531855204faba7305d00440284df1ac77
SHA121c84870d4f32474e5d6925862380560c37d368c
SHA2562bbf941d5e268e617df5213ef137f6d0fe6aa54480e67870b1340b6186fc3bb8
SHA512f9006b691fb2388dac3fcabf5af15cabc596d388f220177a11ffb8a2fb92ee88d30c513d11ff68433aea614683d146dc6c53d992b6394ca62f8ea86055fc327e