Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-11-2024 17:08

General

  • Target

    virussign.com_d4dd384ae38fed77098536c5b075c320.exe

  • Size

    2.6MB

  • MD5

    d4dd384ae38fed77098536c5b075c320

  • SHA1

    ed8690d654532965db51c6145dab0c7454284a7b

  • SHA256

    687a990253af6ef1eb5a4d36b657237874f0dbafa795e2d74b7ca6ea5bd56ac9

  • SHA512

    353e67dfac140206f4d97f38d66fe6dab74dfca0734cf63117dc02beb81f0906860907ac6113b5fe6c7f20d77a9d4a0977f3f4d71d09f69efe531492513a91d4

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB/B/bSq:sxX7QnxrloE5dpUpgbV

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\virussign.com_d4dd384ae38fed77098536c5b075c320.exe
    "C:\Users\Admin\AppData\Local\Temp\virussign.com_d4dd384ae38fed77098536c5b075c320.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1120
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevopti.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevopti.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2572
    • C:\IntelprocPK\abodloc.exe
      C:\IntelprocPK\abodloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\IntelprocPK\abodloc.exe

    Filesize

    2.6MB

    MD5

    e60edf5fcfdb98614dbe02aad84a979d

    SHA1

    72b32214f0f35efbf722b8e191dbca09f8450a03

    SHA256

    967e889d509921adb2c335c941c9068a68511f9b33e7fcdc92a92f2f605e93e9

    SHA512

    6cc615ef6624e6cd51b2d8ac0b3a681a0113e93d9ffd44bd4edce68810e8400ef02175e14177409ae23b99f53ac098a077e1d407a7ba9d97873ffc7d8cd60e43

  • C:\LabZZY\dobxsys.exe

    Filesize

    2.6MB

    MD5

    34b637dc09fb7c05fc1e7a78e69b2bae

    SHA1

    8658c26f1b93e7558a8805511eaa59a14829431f

    SHA256

    d175789524f165ca0a441a600034d7c88d04c5a7d6adfdff089d92e71b5edc6f

    SHA512

    15312ddff0163482f2cf77c849e9b85d8236a9f00543b19de3d04256907edd124980ba14c130deb9d71d01cc2fddd38e4c270246b60bd1c010de823bc1569b1d

  • C:\LabZZY\dobxsys.exe

    Filesize

    316KB

    MD5

    9886aa0c30a1eee1e15a9cb6e078b788

    SHA1

    e812bfcb1da179fb5678a1a7f243e7c432f7c920

    SHA256

    64a1f3220f6089322c64e12964cb7781903c6b7a91f9ea4e2a12760919229169

    SHA512

    52571ef79924f38198d06c6186e521332b66bdf8201173ec8a617bd5cc01798ee277b8ea69083a5f138cfa9995082c8b55b238cb4524f88620140e054293aab1

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    206B

    MD5

    4e64233e4f6c3c0683a5ecc1626c5dcf

    SHA1

    f5447df858117ef602aaf7f6e2f447079d92bbbd

    SHA256

    c13dd69674f4c757d85e9fe8373f9a4f908e93462583e10e3cd55f9ad21affcb

    SHA512

    fd0cd318ac18be36f3d6d61b2d491bcbcce8603d439faca1aff0a965a89619b0dc8c9b4d02b14adcc5d53601e4ec50732da5885f8162767d84ddf972d3bade0c

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    174B

    MD5

    a18a36ae3714a4d24a3add83037098b4

    SHA1

    976a1d5a6b1decca1bf77d75d59b686bf3ac3d27

    SHA256

    05a8aee1b10202916c82dbb443a981d1ae52fb3fad62e3685413219cbc3c57e8

    SHA512

    f9b55534d992e4e37a7b9c0b9e9dbfa340bb7389f9709c70f009e46665a6fa1787a4118c3dc9cf75f26b3cf25558d552ec63701ded8826437a1c0e095db26bbf

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevopti.exe

    Filesize

    2.6MB

    MD5

    dec41d7287a13cd7d4ee1ba5a6242cbd

    SHA1

    ace442f79e6f45cd35102f094bf16b6df42bb677

    SHA256

    6b1350a4ffac2263e907e5cb6afa88d1f440922f607d97e974166de56d3d2f9d

    SHA512

    726ec30ace61e7012843cef6e79843707b45486c3c8fca78f7108bc8399d7d16601cb86317b3b79a46787af9462475f3befff1b80cbb2da77e7c937e6bfc4c54