Overview
overview
10Static
static
10virussign....b0.exe
windows7-x64
10virussign....b0.exe
windows10-2004-x64
10virussign....60.exe
windows7-x64
7virussign....60.exe
windows10-2004-x64
7virussign....40.exe
windows7-x64
7virussign....40.exe
windows10-2004-x64
7virussign....e0.exe
windows7-x64
7virussign....e0.exe
windows10-2004-x64
7virussign....00.exe
windows7-x64
10virussign....00.exe
windows10-2004-x64
10virussign....90.exe
windows7-x64
7virussign....90.exe
windows10-2004-x64
7virussign....40.exe
windows7-x64
7virussign....40.exe
windows10-2004-x64
7virussign....10.exe
windows7-x64
5virussign....10.exe
windows10-2004-x64
5virussign....60.exe
windows7-x64
7virussign....60.exe
windows10-2004-x64
7virussign....c0.exe
windows7-x64
10virussign....c0.exe
windows10-2004-x64
10virussign....d0.exe
windows7-x64
7virussign....d0.exe
windows10-2004-x64
7virussign....b0.exe
windows7-x64
10virussign....b0.exe
windows10-2004-x64
10virussign....10.exe
windows7-x64
7virussign....10.exe
windows10-2004-x64
7virussign....e0.exe
windows7-x64
7virussign....e0.exe
windows10-2004-x64
7virussign....20.exe
windows7-x64
7virussign....20.exe
windows10-2004-x64
7virussign....c0.exe
windows7-x64
7virussign....c0.exe
windows10-2004-x64
7Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2024 17:08
Behavioral task
behavioral1
Sample
virussign.com_b1d2087d1d88f80870106373da2011b0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
virussign.com_b1d2087d1d88f80870106373da2011b0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
virussign.com_b4a073dab1d51b27d63f81649310ab60.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
virussign.com_b4a073dab1d51b27d63f81649310ab60.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
virussign.com_b793dc2ed636fdaee1a701e05fde1640.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
virussign.com_b793dc2ed636fdaee1a701e05fde1640.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
virussign.com_ba1f70e629bc3e70fba35036be583ce0.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
virussign.com_ba1f70e629bc3e70fba35036be583ce0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
virussign.com_bcab6f30045483fd648d1924aba88b00.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
virussign.com_bcab6f30045483fd648d1924aba88b00.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
virussign.com_bf4239be7de1ad8dddc78d1aff0d6090.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
virussign.com_bf4239be7de1ad8dddc78d1aff0d6090.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
virussign.com_c251643a9964695966b3f7a545401440.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
virussign.com_c251643a9964695966b3f7a545401440.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
virussign.com_c3fa4d199e50171575cfa553fd205a10.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
virussign.com_c3fa4d199e50171575cfa553fd205a10.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
virussign.com_c527d92958bc1247a6471765e5449c60.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
virussign.com_c527d92958bc1247a6471765e5449c60.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
virussign.com_c7d033cce29ec681f70bfb5f2ec867c0.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
virussign.com_c7d033cce29ec681f70bfb5f2ec867c0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
virussign.com_ca6b0e41f6273b8c6a022729b7a7efd0.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
virussign.com_ca6b0e41f6273b8c6a022729b7a7efd0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
virussign.com_ccf2dfc7e36c604f207bf823231b57b0.exe
Resource
win7-20241023-en
Behavioral task
behavioral24
Sample
virussign.com_ccf2dfc7e36c604f207bf823231b57b0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
virussign.com_cf449b9fd99f5da93cbb91c84e64e710.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
virussign.com_cf449b9fd99f5da93cbb91c84e64e710.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
virussign.com_d2157a5e0405795aa865f9264e231ee0.exe
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
virussign.com_d2157a5e0405795aa865f9264e231ee0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
virussign.com_d4dd384ae38fed77098536c5b075c320.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
virussign.com_d4dd384ae38fed77098536c5b075c320.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
virussign.com_d7c1eea17ae01e04b622ede80b6732c0.exe
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
virussign.com_d7c1eea17ae01e04b622ede80b6732c0.exe
Resource
win10v2004-20241007-en
General
-
Target
virussign.com_d4dd384ae38fed77098536c5b075c320.exe
-
Size
2.6MB
-
MD5
d4dd384ae38fed77098536c5b075c320
-
SHA1
ed8690d654532965db51c6145dab0c7454284a7b
-
SHA256
687a990253af6ef1eb5a4d36b657237874f0dbafa795e2d74b7ca6ea5bd56ac9
-
SHA512
353e67dfac140206f4d97f38d66fe6dab74dfca0734cf63117dc02beb81f0906860907ac6113b5fe6c7f20d77a9d4a0977f3f4d71d09f69efe531492513a91d4
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB/B/bSq:sxX7QnxrloE5dpUpgbV
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevopti.exe virussign.com_d4dd384ae38fed77098536c5b075c320.exe -
Executes dropped EXE 2 IoCs
pid Process 2572 ecdevopti.exe 4832 abodloc.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocPK\\abodloc.exe" virussign.com_d4dd384ae38fed77098536c5b075c320.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZZY\\dobxsys.exe" virussign.com_d4dd384ae38fed77098536c5b075c320.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language virussign.com_d4dd384ae38fed77098536c5b075c320.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecdevopti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abodloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1120 virussign.com_d4dd384ae38fed77098536c5b075c320.exe 1120 virussign.com_d4dd384ae38fed77098536c5b075c320.exe 1120 virussign.com_d4dd384ae38fed77098536c5b075c320.exe 1120 virussign.com_d4dd384ae38fed77098536c5b075c320.exe 2572 ecdevopti.exe 2572 ecdevopti.exe 4832 abodloc.exe 4832 abodloc.exe 2572 ecdevopti.exe 2572 ecdevopti.exe 4832 abodloc.exe 4832 abodloc.exe 2572 ecdevopti.exe 2572 ecdevopti.exe 4832 abodloc.exe 4832 abodloc.exe 2572 ecdevopti.exe 2572 ecdevopti.exe 4832 abodloc.exe 4832 abodloc.exe 2572 ecdevopti.exe 2572 ecdevopti.exe 4832 abodloc.exe 4832 abodloc.exe 2572 ecdevopti.exe 2572 ecdevopti.exe 4832 abodloc.exe 4832 abodloc.exe 2572 ecdevopti.exe 2572 ecdevopti.exe 4832 abodloc.exe 4832 abodloc.exe 2572 ecdevopti.exe 2572 ecdevopti.exe 4832 abodloc.exe 4832 abodloc.exe 2572 ecdevopti.exe 2572 ecdevopti.exe 4832 abodloc.exe 4832 abodloc.exe 2572 ecdevopti.exe 2572 ecdevopti.exe 4832 abodloc.exe 4832 abodloc.exe 2572 ecdevopti.exe 2572 ecdevopti.exe 4832 abodloc.exe 4832 abodloc.exe 2572 ecdevopti.exe 2572 ecdevopti.exe 4832 abodloc.exe 4832 abodloc.exe 2572 ecdevopti.exe 2572 ecdevopti.exe 4832 abodloc.exe 4832 abodloc.exe 2572 ecdevopti.exe 2572 ecdevopti.exe 4832 abodloc.exe 4832 abodloc.exe 2572 ecdevopti.exe 2572 ecdevopti.exe 4832 abodloc.exe 4832 abodloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1120 wrote to memory of 2572 1120 virussign.com_d4dd384ae38fed77098536c5b075c320.exe 87 PID 1120 wrote to memory of 2572 1120 virussign.com_d4dd384ae38fed77098536c5b075c320.exe 87 PID 1120 wrote to memory of 2572 1120 virussign.com_d4dd384ae38fed77098536c5b075c320.exe 87 PID 1120 wrote to memory of 4832 1120 virussign.com_d4dd384ae38fed77098536c5b075c320.exe 91 PID 1120 wrote to memory of 4832 1120 virussign.com_d4dd384ae38fed77098536c5b075c320.exe 91 PID 1120 wrote to memory of 4832 1120 virussign.com_d4dd384ae38fed77098536c5b075c320.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\virussign.com_d4dd384ae38fed77098536c5b075c320.exe"C:\Users\Admin\AppData\Local\Temp\virussign.com_d4dd384ae38fed77098536c5b075c320.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevopti.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2572
-
-
C:\IntelprocPK\abodloc.exeC:\IntelprocPK\abodloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5e60edf5fcfdb98614dbe02aad84a979d
SHA172b32214f0f35efbf722b8e191dbca09f8450a03
SHA256967e889d509921adb2c335c941c9068a68511f9b33e7fcdc92a92f2f605e93e9
SHA5126cc615ef6624e6cd51b2d8ac0b3a681a0113e93d9ffd44bd4edce68810e8400ef02175e14177409ae23b99f53ac098a077e1d407a7ba9d97873ffc7d8cd60e43
-
Filesize
2.6MB
MD534b637dc09fb7c05fc1e7a78e69b2bae
SHA18658c26f1b93e7558a8805511eaa59a14829431f
SHA256d175789524f165ca0a441a600034d7c88d04c5a7d6adfdff089d92e71b5edc6f
SHA51215312ddff0163482f2cf77c849e9b85d8236a9f00543b19de3d04256907edd124980ba14c130deb9d71d01cc2fddd38e4c270246b60bd1c010de823bc1569b1d
-
Filesize
316KB
MD59886aa0c30a1eee1e15a9cb6e078b788
SHA1e812bfcb1da179fb5678a1a7f243e7c432f7c920
SHA25664a1f3220f6089322c64e12964cb7781903c6b7a91f9ea4e2a12760919229169
SHA51252571ef79924f38198d06c6186e521332b66bdf8201173ec8a617bd5cc01798ee277b8ea69083a5f138cfa9995082c8b55b238cb4524f88620140e054293aab1
-
Filesize
206B
MD54e64233e4f6c3c0683a5ecc1626c5dcf
SHA1f5447df858117ef602aaf7f6e2f447079d92bbbd
SHA256c13dd69674f4c757d85e9fe8373f9a4f908e93462583e10e3cd55f9ad21affcb
SHA512fd0cd318ac18be36f3d6d61b2d491bcbcce8603d439faca1aff0a965a89619b0dc8c9b4d02b14adcc5d53601e4ec50732da5885f8162767d84ddf972d3bade0c
-
Filesize
174B
MD5a18a36ae3714a4d24a3add83037098b4
SHA1976a1d5a6b1decca1bf77d75d59b686bf3ac3d27
SHA25605a8aee1b10202916c82dbb443a981d1ae52fb3fad62e3685413219cbc3c57e8
SHA512f9b55534d992e4e37a7b9c0b9e9dbfa340bb7389f9709c70f009e46665a6fa1787a4118c3dc9cf75f26b3cf25558d552ec63701ded8826437a1c0e095db26bbf
-
Filesize
2.6MB
MD5dec41d7287a13cd7d4ee1ba5a6242cbd
SHA1ace442f79e6f45cd35102f094bf16b6df42bb677
SHA2566b1350a4ffac2263e907e5cb6afa88d1f440922f607d97e974166de56d3d2f9d
SHA512726ec30ace61e7012843cef6e79843707b45486c3c8fca78f7108bc8399d7d16601cb86317b3b79a46787af9462475f3befff1b80cbb2da77e7c937e6bfc4c54