Analysis
-
max time kernel
119s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2024 08:30
Static task
static1
Behavioral task
behavioral1
Sample
8dfaf613a0ec7bb97fe69f420557c3124afca335c8c20f094b5f6705c53570d3N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8dfaf613a0ec7bb97fe69f420557c3124afca335c8c20f094b5f6705c53570d3N.exe
Resource
win10v2004-20241007-en
General
-
Target
8dfaf613a0ec7bb97fe69f420557c3124afca335c8c20f094b5f6705c53570d3N.exe
-
Size
2.6MB
-
MD5
bdf77c6ad1326c6c41a14448f27f7170
-
SHA1
4a8ed8ec8af818e535332466fa731c3117358883
-
SHA256
8dfaf613a0ec7bb97fe69f420557c3124afca335c8c20f094b5f6705c53570d3
-
SHA512
32f87fddd03d1ecc8aab8409a6802e380b86caed332b1ce04e44bd5a51c0ed3ffda7d884fc444eed499b67ea61a8314a119a477b0ebf30d7c0dff0591cd6b768
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB1B/bS:sxX7QnxrloE5dpUpyb
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxbod.exe 8dfaf613a0ec7bb97fe69f420557c3124afca335c8c20f094b5f6705c53570d3N.exe -
Executes dropped EXE 2 IoCs
pid Process 2508 ecxbod.exe 2188 abodloc.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocW6\\abodloc.exe" 8dfaf613a0ec7bb97fe69f420557c3124afca335c8c20f094b5f6705c53570d3N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Mint6M\\optixec.exe" 8dfaf613a0ec7bb97fe69f420557c3124afca335c8c20f094b5f6705c53570d3N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8dfaf613a0ec7bb97fe69f420557c3124afca335c8c20f094b5f6705c53570d3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecxbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abodloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3596 8dfaf613a0ec7bb97fe69f420557c3124afca335c8c20f094b5f6705c53570d3N.exe 3596 8dfaf613a0ec7bb97fe69f420557c3124afca335c8c20f094b5f6705c53570d3N.exe 3596 8dfaf613a0ec7bb97fe69f420557c3124afca335c8c20f094b5f6705c53570d3N.exe 3596 8dfaf613a0ec7bb97fe69f420557c3124afca335c8c20f094b5f6705c53570d3N.exe 2508 ecxbod.exe 2508 ecxbod.exe 2188 abodloc.exe 2188 abodloc.exe 2508 ecxbod.exe 2508 ecxbod.exe 2188 abodloc.exe 2188 abodloc.exe 2508 ecxbod.exe 2508 ecxbod.exe 2188 abodloc.exe 2188 abodloc.exe 2508 ecxbod.exe 2508 ecxbod.exe 2188 abodloc.exe 2188 abodloc.exe 2508 ecxbod.exe 2508 ecxbod.exe 2188 abodloc.exe 2188 abodloc.exe 2508 ecxbod.exe 2508 ecxbod.exe 2188 abodloc.exe 2188 abodloc.exe 2508 ecxbod.exe 2508 ecxbod.exe 2188 abodloc.exe 2188 abodloc.exe 2508 ecxbod.exe 2508 ecxbod.exe 2188 abodloc.exe 2188 abodloc.exe 2508 ecxbod.exe 2508 ecxbod.exe 2188 abodloc.exe 2188 abodloc.exe 2508 ecxbod.exe 2508 ecxbod.exe 2188 abodloc.exe 2188 abodloc.exe 2508 ecxbod.exe 2508 ecxbod.exe 2188 abodloc.exe 2188 abodloc.exe 2508 ecxbod.exe 2508 ecxbod.exe 2188 abodloc.exe 2188 abodloc.exe 2508 ecxbod.exe 2508 ecxbod.exe 2188 abodloc.exe 2188 abodloc.exe 2508 ecxbod.exe 2508 ecxbod.exe 2188 abodloc.exe 2188 abodloc.exe 2508 ecxbod.exe 2508 ecxbod.exe 2188 abodloc.exe 2188 abodloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3596 wrote to memory of 2508 3596 8dfaf613a0ec7bb97fe69f420557c3124afca335c8c20f094b5f6705c53570d3N.exe 89 PID 3596 wrote to memory of 2508 3596 8dfaf613a0ec7bb97fe69f420557c3124afca335c8c20f094b5f6705c53570d3N.exe 89 PID 3596 wrote to memory of 2508 3596 8dfaf613a0ec7bb97fe69f420557c3124afca335c8c20f094b5f6705c53570d3N.exe 89 PID 3596 wrote to memory of 2188 3596 8dfaf613a0ec7bb97fe69f420557c3124afca335c8c20f094b5f6705c53570d3N.exe 91 PID 3596 wrote to memory of 2188 3596 8dfaf613a0ec7bb97fe69f420557c3124afca335c8c20f094b5f6705c53570d3N.exe 91 PID 3596 wrote to memory of 2188 3596 8dfaf613a0ec7bb97fe69f420557c3124afca335c8c20f094b5f6705c53570d3N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\8dfaf613a0ec7bb97fe69f420557c3124afca335c8c20f094b5f6705c53570d3N.exe"C:\Users\Admin\AppData\Local\Temp\8dfaf613a0ec7bb97fe69f420557c3124afca335c8c20f094b5f6705c53570d3N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxbod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2508
-
-
C:\IntelprocW6\abodloc.exeC:\IntelprocW6\abodloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5c6a5ac176785da7ac966c4759bba0f51
SHA1e8ec59a418f62c741a0a83ea7f232004e94cf4ee
SHA256832b785b0fb761879b03716dba42c159f44673ed4fa536226b0bc969621d4162
SHA512493428b19e4baaaa5b9aac8a3c09294d4abb0c46daf1f675498cbb716e151381cbc26a839edc5ddabe6f7f0a33f40059df36d7fcf7123376187917be3a999e22
-
Filesize
2.6MB
MD53d6be335029ab84df4404f15a454bcb7
SHA1c0754cb1a4b3743ab1cd655810269a62d03c1ad8
SHA256563eb5b4c3199873844f47a30dded2e60508fcc5f355fe778dce185822287328
SHA512b6e25d85dd0bcb46cb1dff291263ed6acb9f77b85530be6b927f05bedb65d647b369f9c901bc58f735f528df13763fc3fa08376efcfdfec3e72411532de2c584
-
Filesize
2.6MB
MD57b6a5589cee4e31e69a859aa295e77c2
SHA1111531a36f1d0701c8209ad6f213cfb0d0032289
SHA256f0d81c75585cf9eee4d643e9daa018b9fcac24af84e35cc501b36a910b6e804c
SHA512c97e11b82f457b76c1ee0c08a40c992c38054694dbfc7b15f37514c5f5443aa7f70490699cdeab1d9bde276b4fe41ca9c4baf2700d182b8bfdbf342dd6681b55
-
Filesize
203B
MD54d1a96cf93d53c5b27df462064d5672e
SHA18e5bca048f3e240422225857af44916c5398af5c
SHA256189e10edf4c691b3156d55ebaef7948d882691f8dd4cbe0e6eeedf2440d2f30b
SHA512e46bed4e89de6511395e0df365ac100341fd30b264193ee52713854fbf88446cbf570f352bfae70275d43bc40d73c6721998c191cc3b96d6f7906338e5a05bef
-
Filesize
171B
MD5cc341c9a82df37159a6f38555325c6c8
SHA1df3866032cc4cb676f7e354a630a4ccd17f4a408
SHA2566db65bee48ea4e2d7df01b0d3e01e9a1269a25a7bb86b4abe493d024e4be8bb0
SHA51220b44bd208b0d32d4d20ab208b9e37ac2d8c05e7315cee622da0388e0774e44417c4d8af6974ed936ce9f55496e4bde5670be6bcf48ea1a6687bd4d004c1d7ef
-
Filesize
2.6MB
MD5a837963dd08631df7870c75bb4d118c4
SHA105f07f67bb1311dabbb02554fe9628f28ccd673a
SHA256c77c3663c751304da67d2a9d8c6edd347bebe00aa7dd80d6dd191f7cd167956e
SHA512b6d1be938ef256b69e9916a53f3cbf9b5578878029fec47fbaf20a42f02e6d0c9e5831d782202010dc726ef788bb70daca682a2e6540708b4d363ff6537844df