Analysis
-
max time kernel
119s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 12:23
Static task
static1
Behavioral task
behavioral1
Sample
5ee20e869e152cdbd4a8a8ebffd71ff58f9d77b20b12467d13f0d53141071423N.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
5ee20e869e152cdbd4a8a8ebffd71ff58f9d77b20b12467d13f0d53141071423N.exe
Resource
win10v2004-20241007-en
General
-
Target
5ee20e869e152cdbd4a8a8ebffd71ff58f9d77b20b12467d13f0d53141071423N.exe
-
Size
2.6MB
-
MD5
e2d44cef0dbefaf78b8b724877c26a90
-
SHA1
7d08b4c6f0cc70ce1a7ae4af7f02cc376c309083
-
SHA256
5ee20e869e152cdbd4a8a8ebffd71ff58f9d77b20b12467d13f0d53141071423
-
SHA512
a9df8181a9c7ccede3898d06f44d8926274c64d9fd53ed63ca6b1ec614201e628b8b4271793def8a8c41601782b7ffe00f0314d972e019bf75208cc8209c053a
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBaB/bS:sxX7QnxrloE5dpUpFb
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe 5ee20e869e152cdbd4a8a8ebffd71ff58f9d77b20b12467d13f0d53141071423N.exe -
Executes dropped EXE 2 IoCs
pid Process 2064 ecxopti.exe 2820 abodloc.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvWU\\abodloc.exe" 5ee20e869e152cdbd4a8a8ebffd71ff58f9d77b20b12467d13f0d53141071423N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxAV\\boddevloc.exe" 5ee20e869e152cdbd4a8a8ebffd71ff58f9d77b20b12467d13f0d53141071423N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ee20e869e152cdbd4a8a8ebffd71ff58f9d77b20b12467d13f0d53141071423N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecxopti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abodloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2380 5ee20e869e152cdbd4a8a8ebffd71ff58f9d77b20b12467d13f0d53141071423N.exe 2380 5ee20e869e152cdbd4a8a8ebffd71ff58f9d77b20b12467d13f0d53141071423N.exe 2380 5ee20e869e152cdbd4a8a8ebffd71ff58f9d77b20b12467d13f0d53141071423N.exe 2380 5ee20e869e152cdbd4a8a8ebffd71ff58f9d77b20b12467d13f0d53141071423N.exe 2064 ecxopti.exe 2064 ecxopti.exe 2820 abodloc.exe 2820 abodloc.exe 2064 ecxopti.exe 2064 ecxopti.exe 2820 abodloc.exe 2820 abodloc.exe 2064 ecxopti.exe 2064 ecxopti.exe 2820 abodloc.exe 2820 abodloc.exe 2064 ecxopti.exe 2064 ecxopti.exe 2820 abodloc.exe 2820 abodloc.exe 2064 ecxopti.exe 2064 ecxopti.exe 2820 abodloc.exe 2820 abodloc.exe 2064 ecxopti.exe 2064 ecxopti.exe 2820 abodloc.exe 2820 abodloc.exe 2064 ecxopti.exe 2064 ecxopti.exe 2820 abodloc.exe 2820 abodloc.exe 2064 ecxopti.exe 2064 ecxopti.exe 2820 abodloc.exe 2820 abodloc.exe 2064 ecxopti.exe 2064 ecxopti.exe 2820 abodloc.exe 2820 abodloc.exe 2064 ecxopti.exe 2064 ecxopti.exe 2820 abodloc.exe 2820 abodloc.exe 2064 ecxopti.exe 2064 ecxopti.exe 2820 abodloc.exe 2820 abodloc.exe 2064 ecxopti.exe 2064 ecxopti.exe 2820 abodloc.exe 2820 abodloc.exe 2064 ecxopti.exe 2064 ecxopti.exe 2820 abodloc.exe 2820 abodloc.exe 2064 ecxopti.exe 2064 ecxopti.exe 2820 abodloc.exe 2820 abodloc.exe 2064 ecxopti.exe 2064 ecxopti.exe 2820 abodloc.exe 2820 abodloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2064 2380 5ee20e869e152cdbd4a8a8ebffd71ff58f9d77b20b12467d13f0d53141071423N.exe 89 PID 2380 wrote to memory of 2064 2380 5ee20e869e152cdbd4a8a8ebffd71ff58f9d77b20b12467d13f0d53141071423N.exe 89 PID 2380 wrote to memory of 2064 2380 5ee20e869e152cdbd4a8a8ebffd71ff58f9d77b20b12467d13f0d53141071423N.exe 89 PID 2380 wrote to memory of 2820 2380 5ee20e869e152cdbd4a8a8ebffd71ff58f9d77b20b12467d13f0d53141071423N.exe 90 PID 2380 wrote to memory of 2820 2380 5ee20e869e152cdbd4a8a8ebffd71ff58f9d77b20b12467d13f0d53141071423N.exe 90 PID 2380 wrote to memory of 2820 2380 5ee20e869e152cdbd4a8a8ebffd71ff58f9d77b20b12467d13f0d53141071423N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ee20e869e152cdbd4a8a8ebffd71ff58f9d77b20b12467d13f0d53141071423N.exe"C:\Users\Admin\AppData\Local\Temp\5ee20e869e152cdbd4a8a8ebffd71ff58f9d77b20b12467d13f0d53141071423N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
-
C:\SysDrvWU\abodloc.exeC:\SysDrvWU\abodloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD505918799ac963189cb43a9f5e502e20e
SHA18162ab3cd2fc9bf1ea6ebeb1496a75e510b34460
SHA2561da2794e3e014f7dbf4f601c2f80c21db109eaa28ee35dfbbc4cd6f75a95bb4d
SHA5120591aea3825475f8b5b13bbd12e73096253762720dcf948e3f9217465fcaaf87e9fcf063098fc90aaa405c39c219baa287266fad762b4691e9d3e7d94836597f
-
Filesize
1.7MB
MD5f621dac2b3c1087576b13518d8ae44e7
SHA1e9ac3ce1219c7b90797969266ea623137ce59bcd
SHA256fe74b0b8ec2cc0f3e55f17cfe6c76945525d5b0b3e1b24f4ea90c2250e60b30c
SHA51252a41c2b1f7bef7ae36275fe20108f6f3833e751b741f052142cd869b5c63f2bed84d4bd667a89d9c070a5145284537cbaefd4ab6c1b3f800681710013c119e4
-
Filesize
2.6MB
MD5c15af5afaed61651fe90022fad19dc1f
SHA1730e7c806b771a2cba240e8e17d3d69fdc93c131
SHA2560caf85b3ab6fffc0f3689073ebe127c55d39b5a3ff14c9f6f0ec889d2a113400
SHA5128058b5fd68530c38cc5d96b9b594cff372996d60d05efbc5af9a63de3e555c20646223c1b689f6049a51a379040bba4b95b51c3e11d96df762411ab38b694547
-
Filesize
204B
MD523eda82aa5cbf499ae11f1c43a02c8ba
SHA146aba51a7dcfd92c9fc8bdbb1ea45738c4029ce2
SHA256d552146ae527e27b561d42169be3f67ce9c2dcca1c8382cdc186e5173e3cdd65
SHA5129b96c9439c362f650a70470e3c9248fc5c30b994ccaad8a5468fa2e40682ed75e8d00feab1da64ca841bb052f6c79e33975065a0037bb8407866fd4309171084
-
Filesize
172B
MD5acffd60f5282e7887375b51c33903b8c
SHA110b11d1ab5742766eb83e64c457ba56c632e0045
SHA2566ed6e9ce9aec56e54c51ca8d322d4b9a69e0f814b09e7818188c870c2e598043
SHA5129a0c39433b1ec6292e329ba1fea19ca6995f880af548952606ea2880f95ad1a7bd44a9b476c3f9a30538f8d675682ce96edb74561b93b46112c1bc9eedbbef3d
-
Filesize
2.6MB
MD537d02c8c009c72cde96ec3e10b7120e4
SHA108666109d545ff3ab83e8bedb4cc19129c2cdc89
SHA256723a9f0f0fd3cc29b46935339fd4c8928bc3b964583ccebba266dce1577daeb2
SHA512efaa53727b449f866f2b4cbec0e5e0f87d45f6fc90ecbfe83b6dde9e261bede3e06280aaa2d5a103d39ec2e53f85380bc9c6135cca8afed4f4b86e1e276c726a