Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 21:02
Static task
static1
Behavioral task
behavioral1
Sample
3c22535d901d1fbeb594defa63ffe64a8da4accd8532852fd920b1762879bdb4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3c22535d901d1fbeb594defa63ffe64a8da4accd8532852fd920b1762879bdb4.exe
Resource
win10v2004-20241007-en
General
-
Target
3c22535d901d1fbeb594defa63ffe64a8da4accd8532852fd920b1762879bdb4.exe
-
Size
2.6MB
-
MD5
4f4f8fdb971a1615625451923e92979c
-
SHA1
1ab18abc1f5a84a99c8f117b0292bf8e7ee28c2f
-
SHA256
3c22535d901d1fbeb594defa63ffe64a8da4accd8532852fd920b1762879bdb4
-
SHA512
21f5fb1533d702605985468f3aa73529d5aa604d550e251c12467341a15a1a56007c3152e26c14d196eb4c169b47da0f0935019db62729200286e0f4fe7a9b32
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB8B/bS:sxX7QnxrloE5dpUpHb
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxdob.exe 3c22535d901d1fbeb594defa63ffe64a8da4accd8532852fd920b1762879bdb4.exe -
Executes dropped EXE 2 IoCs
pid Process 2176 ecxdob.exe 1868 devoptiloc.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotKE\\devoptiloc.exe" 3c22535d901d1fbeb594defa63ffe64a8da4accd8532852fd920b1762879bdb4.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintFM\\optiasys.exe" 3c22535d901d1fbeb594defa63ffe64a8da4accd8532852fd920b1762879bdb4.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecxdob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devoptiloc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c22535d901d1fbeb594defa63ffe64a8da4accd8532852fd920b1762879bdb4.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3352 3c22535d901d1fbeb594defa63ffe64a8da4accd8532852fd920b1762879bdb4.exe 3352 3c22535d901d1fbeb594defa63ffe64a8da4accd8532852fd920b1762879bdb4.exe 3352 3c22535d901d1fbeb594defa63ffe64a8da4accd8532852fd920b1762879bdb4.exe 3352 3c22535d901d1fbeb594defa63ffe64a8da4accd8532852fd920b1762879bdb4.exe 2176 ecxdob.exe 2176 ecxdob.exe 1868 devoptiloc.exe 1868 devoptiloc.exe 2176 ecxdob.exe 2176 ecxdob.exe 1868 devoptiloc.exe 1868 devoptiloc.exe 2176 ecxdob.exe 2176 ecxdob.exe 1868 devoptiloc.exe 1868 devoptiloc.exe 2176 ecxdob.exe 2176 ecxdob.exe 1868 devoptiloc.exe 1868 devoptiloc.exe 2176 ecxdob.exe 2176 ecxdob.exe 1868 devoptiloc.exe 1868 devoptiloc.exe 2176 ecxdob.exe 2176 ecxdob.exe 1868 devoptiloc.exe 1868 devoptiloc.exe 2176 ecxdob.exe 2176 ecxdob.exe 1868 devoptiloc.exe 1868 devoptiloc.exe 2176 ecxdob.exe 2176 ecxdob.exe 1868 devoptiloc.exe 1868 devoptiloc.exe 2176 ecxdob.exe 2176 ecxdob.exe 1868 devoptiloc.exe 1868 devoptiloc.exe 2176 ecxdob.exe 2176 ecxdob.exe 1868 devoptiloc.exe 1868 devoptiloc.exe 2176 ecxdob.exe 2176 ecxdob.exe 1868 devoptiloc.exe 1868 devoptiloc.exe 2176 ecxdob.exe 2176 ecxdob.exe 1868 devoptiloc.exe 1868 devoptiloc.exe 2176 ecxdob.exe 2176 ecxdob.exe 1868 devoptiloc.exe 1868 devoptiloc.exe 2176 ecxdob.exe 2176 ecxdob.exe 1868 devoptiloc.exe 1868 devoptiloc.exe 2176 ecxdob.exe 2176 ecxdob.exe 1868 devoptiloc.exe 1868 devoptiloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3352 wrote to memory of 2176 3352 3c22535d901d1fbeb594defa63ffe64a8da4accd8532852fd920b1762879bdb4.exe 86 PID 3352 wrote to memory of 2176 3352 3c22535d901d1fbeb594defa63ffe64a8da4accd8532852fd920b1762879bdb4.exe 86 PID 3352 wrote to memory of 2176 3352 3c22535d901d1fbeb594defa63ffe64a8da4accd8532852fd920b1762879bdb4.exe 86 PID 3352 wrote to memory of 1868 3352 3c22535d901d1fbeb594defa63ffe64a8da4accd8532852fd920b1762879bdb4.exe 87 PID 3352 wrote to memory of 1868 3352 3c22535d901d1fbeb594defa63ffe64a8da4accd8532852fd920b1762879bdb4.exe 87 PID 3352 wrote to memory of 1868 3352 3c22535d901d1fbeb594defa63ffe64a8da4accd8532852fd920b1762879bdb4.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c22535d901d1fbeb594defa63ffe64a8da4accd8532852fd920b1762879bdb4.exe"C:\Users\Admin\AppData\Local\Temp\3c22535d901d1fbeb594defa63ffe64a8da4accd8532852fd920b1762879bdb4.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxdob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxdob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2176
-
-
C:\UserDotKE\devoptiloc.exeC:\UserDotKE\devoptiloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD55a0ad201d70e80d95e2b55f142d51baa
SHA1f3bf060fdeb37c60f639956d0c27b98e3a7950bf
SHA256bf8a647ce49691d0d724410123630d9a3cb173c1fd28a8d2a3aad2e1b4e75d3a
SHA512aa6e385e297d82569ad752fb10124a0ead3f9f7bd9ceaad4a8a1ea46f662f0b462164d393ab9b15367ea158dbdfad1956c0cd1ffd7414fd80ffba94cc1206783
-
Filesize
161KB
MD554760489354e9730377ea11a4bf34f31
SHA1f2f81f321b75db476da54e33ca205d8e4c16a1f8
SHA25655ea3fd9600875dd672494cdaf53b55584052bc76fa586a13e788a8ef55e16fe
SHA512ff17aff6e3dde18a502560deb62cbf69175841a28c271715378bc35a2b52e4b954eb3d5856c425a48f36a56856ce4c9fe69f9d9a73ca89f47c1c6f02ede89b38
-
Filesize
2.6MB
MD5bc3afcb8a560bdd37d21ff70901b4bf1
SHA19446145d422af65159b2976a83f9f852eb70576e
SHA256078eef48d2b4950fd01e1e39631eb2ea991c8621683d823e5f8aad6a3499c5ad
SHA512113b4ee31cc2a26c05db08bbf82bd5e44b7fc44cd7da2d52ad2fcbab16d6ed13110b3ebb0d94d92ad01303d3a8cc725104d1dfd03da54f760bb0970f6e718c91
-
Filesize
205B
MD5250baf6c6d95ff9c87579c18e8ad5af2
SHA183dcca6c84451108e3b28c40e93c204c33eb6ac4
SHA256af0da09ce6662384f722a63f1582a86f3f8fc1c033a85d545b3a53fde03a4c7c
SHA512142614db6d5278bbc3de7afa21a112514e191b23a15ef4be2fd29453c8e352ca6488109583ea6568910b518f66d3f22f980cb5ee5e430d4e1d875a0cbd3cc2f5
-
Filesize
173B
MD502b87514ad517268a6641a1badb3415d
SHA17144dd647231aa97ec070a17be5fe17e5f1747cd
SHA256d08e911ce5139bc51a0ddb6de6686babbdf76d73a8ec46c744a10970da7134fa
SHA51226e41ae2ddbf188f9565480265d0d6ff23f5cf119cfe9f3742f7d8003fb905655286e3d1548ffcd0e2a81bb52268a0e051fd995878859eebb0a73aed147a9b99
-
Filesize
2.6MB
MD525116194be303f813a9b18d681483384
SHA1890f2f1b614e7efae21cb2353aaf909cc3c4523f
SHA256e3fe7b77b446627711fc998686df64b64c89e893024b5b2da1ed4bbf1ab61ae5
SHA512a0b7969f81c8faf5b17937146e7ce7ec84014e0f1dfc5301d5202957028081e83dca518c3652197d771106b567807bc11f2938b39b4af22daa14676a74aad941