Overview
overview
10Static
static
10virussign....b0.exe
windows7-x64
10virussign....b0.exe
windows10-2004-x64
10virussign....60.exe
windows7-x64
7virussign....60.exe
windows10-2004-x64
7virussign....40.exe
windows7-x64
7virussign....40.exe
windows10-2004-x64
7virussign....e0.exe
windows7-x64
7virussign....e0.exe
windows10-2004-x64
7virussign....00.exe
windows7-x64
10virussign....00.exe
windows10-2004-x64
10virussign....90.exe
windows7-x64
7virussign....90.exe
windows10-2004-x64
7virussign....40.exe
windows7-x64
7virussign....40.exe
windows10-2004-x64
7virussign....10.exe
windows7-x64
5virussign....10.exe
windows10-2004-x64
5virussign....60.exe
windows7-x64
7virussign....60.exe
windows10-2004-x64
7virussign....c0.exe
windows7-x64
10virussign....c0.exe
windows10-2004-x64
10virussign....d0.exe
windows7-x64
7virussign....d0.exe
windows10-2004-x64
7virussign....b0.exe
windows7-x64
10virussign....b0.exe
windows10-2004-x64
10virussign....10.exe
windows7-x64
7virussign....10.exe
windows10-2004-x64
7virussign....e0.exe
windows7-x64
7virussign....e0.exe
windows10-2004-x64
7virussign....20.exe
windows7-x64
7virussign....20.exe
windows10-2004-x64
7virussign....c0.exe
windows7-x64
7virussign....c0.exe
windows10-2004-x64
7Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-11-2024 17:08
Behavioral task
behavioral1
Sample
virussign.com_b1d2087d1d88f80870106373da2011b0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
virussign.com_b1d2087d1d88f80870106373da2011b0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
virussign.com_b4a073dab1d51b27d63f81649310ab60.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
virussign.com_b4a073dab1d51b27d63f81649310ab60.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
virussign.com_b793dc2ed636fdaee1a701e05fde1640.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
virussign.com_b793dc2ed636fdaee1a701e05fde1640.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
virussign.com_ba1f70e629bc3e70fba35036be583ce0.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
virussign.com_ba1f70e629bc3e70fba35036be583ce0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
virussign.com_bcab6f30045483fd648d1924aba88b00.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
virussign.com_bcab6f30045483fd648d1924aba88b00.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
virussign.com_bf4239be7de1ad8dddc78d1aff0d6090.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
virussign.com_bf4239be7de1ad8dddc78d1aff0d6090.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
virussign.com_c251643a9964695966b3f7a545401440.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
virussign.com_c251643a9964695966b3f7a545401440.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
virussign.com_c3fa4d199e50171575cfa553fd205a10.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
virussign.com_c3fa4d199e50171575cfa553fd205a10.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
virussign.com_c527d92958bc1247a6471765e5449c60.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
virussign.com_c527d92958bc1247a6471765e5449c60.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
virussign.com_c7d033cce29ec681f70bfb5f2ec867c0.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
virussign.com_c7d033cce29ec681f70bfb5f2ec867c0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
virussign.com_ca6b0e41f6273b8c6a022729b7a7efd0.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
virussign.com_ca6b0e41f6273b8c6a022729b7a7efd0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
virussign.com_ccf2dfc7e36c604f207bf823231b57b0.exe
Resource
win7-20241023-en
Behavioral task
behavioral24
Sample
virussign.com_ccf2dfc7e36c604f207bf823231b57b0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
virussign.com_cf449b9fd99f5da93cbb91c84e64e710.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
virussign.com_cf449b9fd99f5da93cbb91c84e64e710.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
virussign.com_d2157a5e0405795aa865f9264e231ee0.exe
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
virussign.com_d2157a5e0405795aa865f9264e231ee0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
virussign.com_d4dd384ae38fed77098536c5b075c320.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
virussign.com_d4dd384ae38fed77098536c5b075c320.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
virussign.com_d7c1eea17ae01e04b622ede80b6732c0.exe
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
virussign.com_d7c1eea17ae01e04b622ede80b6732c0.exe
Resource
win10v2004-20241007-en
General
-
Target
virussign.com_d4dd384ae38fed77098536c5b075c320.exe
-
Size
2.6MB
-
MD5
d4dd384ae38fed77098536c5b075c320
-
SHA1
ed8690d654532965db51c6145dab0c7454284a7b
-
SHA256
687a990253af6ef1eb5a4d36b657237874f0dbafa795e2d74b7ca6ea5bd56ac9
-
SHA512
353e67dfac140206f4d97f38d66fe6dab74dfca0734cf63117dc02beb81f0906860907ac6113b5fe6c7f20d77a9d4a0977f3f4d71d09f69efe531492513a91d4
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB/B/bSq:sxX7QnxrloE5dpUpgbV
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe virussign.com_d4dd384ae38fed77098536c5b075c320.exe -
Executes dropped EXE 2 IoCs
pid Process 2536 ecabod.exe 2444 xoptisys.exe -
Loads dropped DLL 2 IoCs
pid Process 1932 virussign.com_d4dd384ae38fed77098536c5b075c320.exe 1932 virussign.com_d4dd384ae38fed77098536c5b075c320.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Adobe05\\xoptisys.exe" virussign.com_d4dd384ae38fed77098536c5b075c320.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Galax3L\\dobaec.exe" virussign.com_d4dd384ae38fed77098536c5b075c320.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecabod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xoptisys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language virussign.com_d4dd384ae38fed77098536c5b075c320.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1932 virussign.com_d4dd384ae38fed77098536c5b075c320.exe 1932 virussign.com_d4dd384ae38fed77098536c5b075c320.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe 2536 ecabod.exe 2444 xoptisys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2536 1932 virussign.com_d4dd384ae38fed77098536c5b075c320.exe 31 PID 1932 wrote to memory of 2536 1932 virussign.com_d4dd384ae38fed77098536c5b075c320.exe 31 PID 1932 wrote to memory of 2536 1932 virussign.com_d4dd384ae38fed77098536c5b075c320.exe 31 PID 1932 wrote to memory of 2536 1932 virussign.com_d4dd384ae38fed77098536c5b075c320.exe 31 PID 1932 wrote to memory of 2444 1932 virussign.com_d4dd384ae38fed77098536c5b075c320.exe 32 PID 1932 wrote to memory of 2444 1932 virussign.com_d4dd384ae38fed77098536c5b075c320.exe 32 PID 1932 wrote to memory of 2444 1932 virussign.com_d4dd384ae38fed77098536c5b075c320.exe 32 PID 1932 wrote to memory of 2444 1932 virussign.com_d4dd384ae38fed77098536c5b075c320.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\virussign.com_d4dd384ae38fed77098536c5b075c320.exe"C:\Users\Admin\AppData\Local\Temp\virussign.com_d4dd384ae38fed77098536c5b075c320.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
-
C:\Adobe05\xoptisys.exeC:\Adobe05\xoptisys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD549a09bfb76b60b5de335468b141b1e89
SHA1401031d6ebfb72438466965add7ee378626519a9
SHA256f52a7f0ad702177c9cc47996cc5b6f94171c9b40784b87f12bb64cc43d8870f2
SHA51200d9513232a9f553824d975eae39c53751ef0a4ccfa7d1820cc4b3a5716fcc55a0c836b9d9f10f26eb47992f0f5ee76c506a27153d0e6bab1be8fe1143d820c9
-
Filesize
2.6MB
MD5df57d8f435547aaec330ad79bd1b7ed2
SHA16713ffaab7ebc0d6566924d989cfa3f453177926
SHA2563a3c26dec5addf4bb4fd26093f730949698437b12c2dbb62b27ec0d39f9ba474
SHA5126b936abfe74642f3598ce9864d6e3f89d289d5169087dd71e7d1cfdb568617ba980630e689af7d83aa54503b3dbb0f078ec7e8dba1193456af9cc9e87892cb4c
-
Filesize
2.6MB
MD57408131c86993e95497bb8dc6dbc02a3
SHA1201343ed33305af91a9cf380eb72deeecc439a25
SHA256b18e06a4880c818105fee78089c44ed0726a684519e44485ee1055b8a906bf23
SHA512a711bc404bbea453d111f582954a2109cc1fd191b04288a15caa8ada1d4ecb7ec1e40b4bd9f384ec3b4c47c0d4f57fef21267e150a9491e234a7ce6c7eae5eed
-
Filesize
168B
MD5d0d2fe757aea2863ba30f88625395a1c
SHA1fbf9d76bb8e2973425ad84ad6aec2053cbe7b7c2
SHA2566dea248c9647ba4d0ddc9322782a285d5350f5364c21a800e2ea7332c5beba91
SHA51204411870133b130630f3fbe31cfa040b5ca7de6570d4cfd80c8116e2a8d69f0af35bd83ba079422a51e917cd41d36789eeb056b7a91d003d50021eeb3e5c3c51
-
Filesize
200B
MD5ff52d1bac127c5a4fbc15344b313eb90
SHA126bc8232c27473fb6bdfe3820911bd330422e63f
SHA256cbfe5133f9d7c0558e4e0b76799743ef8de8d0bbbc4e66b00307e055211bc459
SHA512d88fb45e5870feeb0e0109f0827dc965653351e52a0a941a2b625980218faebedea368e82979d856831edce0bd477358b92fff3ec4ab56fe2ce2b9682185f77f
-
Filesize
2.6MB
MD563e76b75a2da2c374c5aed55d734cbd3
SHA12b057874cf51873fcbd05b2fa8adde60a8c8f6a1
SHA2560fb739782475c17815af501cddd0515769cb45ad95344b7b2d845fe98cf3d497
SHA512f03ed0864cebffc6d08b4673f5111f201a71aa457cdf8ae4a132d6c51e582a88afb9fc2db26fd0ad9bc8425a6a92857e769aceccb59f33b4c1b2e8e83cd8c705