Analysis

  • max time kernel
    119s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 12:23

General

  • Target

    5ee20e869e152cdbd4a8a8ebffd71ff58f9d77b20b12467d13f0d53141071423N.exe

  • Size

    2.6MB

  • MD5

    e2d44cef0dbefaf78b8b724877c26a90

  • SHA1

    7d08b4c6f0cc70ce1a7ae4af7f02cc376c309083

  • SHA256

    5ee20e869e152cdbd4a8a8ebffd71ff58f9d77b20b12467d13f0d53141071423

  • SHA512

    a9df8181a9c7ccede3898d06f44d8926274c64d9fd53ed63ca6b1ec614201e628b8b4271793def8a8c41601782b7ffe00f0314d972e019bf75208cc8209c053a

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBaB/bS:sxX7QnxrloE5dpUpFb

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ee20e869e152cdbd4a8a8ebffd71ff58f9d77b20b12467d13f0d53141071423N.exe
    "C:\Users\Admin\AppData\Local\Temp\5ee20e869e152cdbd4a8a8ebffd71ff58f9d77b20b12467d13f0d53141071423N.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2064
    • C:\SysDrvWU\abodloc.exe
      C:\SysDrvWU\abodloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\GalaxAV\boddevloc.exe

    Filesize

    2.6MB

    MD5

    05918799ac963189cb43a9f5e502e20e

    SHA1

    8162ab3cd2fc9bf1ea6ebeb1496a75e510b34460

    SHA256

    1da2794e3e014f7dbf4f601c2f80c21db109eaa28ee35dfbbc4cd6f75a95bb4d

    SHA512

    0591aea3825475f8b5b13bbd12e73096253762720dcf948e3f9217465fcaaf87e9fcf063098fc90aaa405c39c219baa287266fad762b4691e9d3e7d94836597f

  • C:\GalaxAV\boddevloc.exe

    Filesize

    1.7MB

    MD5

    f621dac2b3c1087576b13518d8ae44e7

    SHA1

    e9ac3ce1219c7b90797969266ea623137ce59bcd

    SHA256

    fe74b0b8ec2cc0f3e55f17cfe6c76945525d5b0b3e1b24f4ea90c2250e60b30c

    SHA512

    52a41c2b1f7bef7ae36275fe20108f6f3833e751b741f052142cd869b5c63f2bed84d4bd667a89d9c070a5145284537cbaefd4ab6c1b3f800681710013c119e4

  • C:\SysDrvWU\abodloc.exe

    Filesize

    2.6MB

    MD5

    c15af5afaed61651fe90022fad19dc1f

    SHA1

    730e7c806b771a2cba240e8e17d3d69fdc93c131

    SHA256

    0caf85b3ab6fffc0f3689073ebe127c55d39b5a3ff14c9f6f0ec889d2a113400

    SHA512

    8058b5fd68530c38cc5d96b9b594cff372996d60d05efbc5af9a63de3e555c20646223c1b689f6049a51a379040bba4b95b51c3e11d96df762411ab38b694547

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    204B

    MD5

    23eda82aa5cbf499ae11f1c43a02c8ba

    SHA1

    46aba51a7dcfd92c9fc8bdbb1ea45738c4029ce2

    SHA256

    d552146ae527e27b561d42169be3f67ce9c2dcca1c8382cdc186e5173e3cdd65

    SHA512

    9b96c9439c362f650a70470e3c9248fc5c30b994ccaad8a5468fa2e40682ed75e8d00feab1da64ca841bb052f6c79e33975065a0037bb8407866fd4309171084

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    172B

    MD5

    acffd60f5282e7887375b51c33903b8c

    SHA1

    10b11d1ab5742766eb83e64c457ba56c632e0045

    SHA256

    6ed6e9ce9aec56e54c51ca8d322d4b9a69e0f814b09e7818188c870c2e598043

    SHA512

    9a0c39433b1ec6292e329ba1fea19ca6995f880af548952606ea2880f95ad1a7bd44a9b476c3f9a30538f8d675682ce96edb74561b93b46112c1bc9eedbbef3d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe

    Filesize

    2.6MB

    MD5

    37d02c8c009c72cde96ec3e10b7120e4

    SHA1

    08666109d545ff3ab83e8bedb4cc19129c2cdc89

    SHA256

    723a9f0f0fd3cc29b46935339fd4c8928bc3b964583ccebba266dce1577daeb2

    SHA512

    efaa53727b449f866f2b4cbec0e5e0f87d45f6fc90ecbfe83b6dde9e261bede3e06280aaa2d5a103d39ec2e53f85380bc9c6135cca8afed4f4b86e1e276c726a