Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 12:24
Static task
static1
Behavioral task
behavioral1
Sample
a31ead333aa7b97f839a5707f7c36667cfa724dca841f453fe08c46e5d559dad.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a31ead333aa7b97f839a5707f7c36667cfa724dca841f453fe08c46e5d559dad.exe
Resource
win10v2004-20241007-en
General
-
Target
a31ead333aa7b97f839a5707f7c36667cfa724dca841f453fe08c46e5d559dad.exe
-
Size
2.6MB
-
MD5
1f08fc51760141f8fcc0241621d294dc
-
SHA1
f0b46968bfb2b9d8018bb03eae64e87fec953c9f
-
SHA256
a31ead333aa7b97f839a5707f7c36667cfa724dca841f453fe08c46e5d559dad
-
SHA512
20a47be284ec924902aa09435c5103a512fc8ae86404ab1e1c0dec372d5f277ac06661a341ad341591efde06357ea712c9f8cd248e792ed9832b3064f4a16a73
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBnB/bSW:sxX7QnxrloE5dpUpIbv
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe a31ead333aa7b97f839a5707f7c36667cfa724dca841f453fe08c46e5d559dad.exe -
Executes dropped EXE 2 IoCs
pid Process 5032 locadob.exe 5080 abodloc.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotMA\\abodloc.exe" a31ead333aa7b97f839a5707f7c36667cfa724dca841f453fe08c46e5d559dad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintM7\\boddevsys.exe" a31ead333aa7b97f839a5707f7c36667cfa724dca841f453fe08c46e5d559dad.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a31ead333aa7b97f839a5707f7c36667cfa724dca841f453fe08c46e5d559dad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locadob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abodloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2088 a31ead333aa7b97f839a5707f7c36667cfa724dca841f453fe08c46e5d559dad.exe 2088 a31ead333aa7b97f839a5707f7c36667cfa724dca841f453fe08c46e5d559dad.exe 2088 a31ead333aa7b97f839a5707f7c36667cfa724dca841f453fe08c46e5d559dad.exe 2088 a31ead333aa7b97f839a5707f7c36667cfa724dca841f453fe08c46e5d559dad.exe 5032 locadob.exe 5032 locadob.exe 5080 abodloc.exe 5080 abodloc.exe 5032 locadob.exe 5032 locadob.exe 5080 abodloc.exe 5080 abodloc.exe 5032 locadob.exe 5032 locadob.exe 5080 abodloc.exe 5080 abodloc.exe 5032 locadob.exe 5032 locadob.exe 5080 abodloc.exe 5080 abodloc.exe 5032 locadob.exe 5032 locadob.exe 5080 abodloc.exe 5080 abodloc.exe 5032 locadob.exe 5032 locadob.exe 5080 abodloc.exe 5080 abodloc.exe 5032 locadob.exe 5032 locadob.exe 5080 abodloc.exe 5080 abodloc.exe 5032 locadob.exe 5032 locadob.exe 5080 abodloc.exe 5080 abodloc.exe 5032 locadob.exe 5032 locadob.exe 5080 abodloc.exe 5080 abodloc.exe 5032 locadob.exe 5032 locadob.exe 5080 abodloc.exe 5080 abodloc.exe 5032 locadob.exe 5032 locadob.exe 5080 abodloc.exe 5080 abodloc.exe 5032 locadob.exe 5032 locadob.exe 5080 abodloc.exe 5080 abodloc.exe 5032 locadob.exe 5032 locadob.exe 5080 abodloc.exe 5080 abodloc.exe 5032 locadob.exe 5032 locadob.exe 5080 abodloc.exe 5080 abodloc.exe 5032 locadob.exe 5032 locadob.exe 5080 abodloc.exe 5080 abodloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2088 wrote to memory of 5032 2088 a31ead333aa7b97f839a5707f7c36667cfa724dca841f453fe08c46e5d559dad.exe 87 PID 2088 wrote to memory of 5032 2088 a31ead333aa7b97f839a5707f7c36667cfa724dca841f453fe08c46e5d559dad.exe 87 PID 2088 wrote to memory of 5032 2088 a31ead333aa7b97f839a5707f7c36667cfa724dca841f453fe08c46e5d559dad.exe 87 PID 2088 wrote to memory of 5080 2088 a31ead333aa7b97f839a5707f7c36667cfa724dca841f453fe08c46e5d559dad.exe 88 PID 2088 wrote to memory of 5080 2088 a31ead333aa7b97f839a5707f7c36667cfa724dca841f453fe08c46e5d559dad.exe 88 PID 2088 wrote to memory of 5080 2088 a31ead333aa7b97f839a5707f7c36667cfa724dca841f453fe08c46e5d559dad.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\a31ead333aa7b97f839a5707f7c36667cfa724dca841f453fe08c46e5d559dad.exe"C:\Users\Admin\AppData\Local\Temp\a31ead333aa7b97f839a5707f7c36667cfa724dca841f453fe08c46e5d559dad.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\UserDotMA\abodloc.exeC:\UserDotMA\abodloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5befa4be5750a8a5d3f2a767f05adc4c5
SHA1d2b748a8ae0c4347c0e64bfd492fd3c34245163f
SHA2569901cd69a0f15b79e4eb232e5013dbfc61ab08e4fcb54c3502811d5fb7684a11
SHA5128921b248fba99fc3f8a0720eb5ec334d4ee1b7397ad195532db3ce1a00dabecf70fce5f1478c63720285e5fd391408a9d633ac3976797abc9002878498396f0e
-
Filesize
190KB
MD504b8d1eb5687c7615ceb21c31b070b23
SHA1b9f51f8545eb0812c6b771ed8d4e5c2663f81a34
SHA25635f9d868472ad44b4adbe38ad84f6da6e173335e0d31d7b3b8adef267e449d1f
SHA512a84af33f29ec41948cb246d6f75232883ebdc7ebe6890e3baa0ef5580d8bbb91b41361976508271e76c7266c15ed03b25db84005df4812056a40e8353d810bd0
-
Filesize
2.6MB
MD5c16c704874fdaba5bb4062a6df8f561e
SHA1bfd7bd834b146410708151d56aea00874c224c2d
SHA256864756befd63963e0a98533465beb76d6d2f4f28670f6a96518f2460671d272e
SHA512b6abe336f590faf2059e90d71757600c16e9fc01a5a088831322ae333bfb2d58dee6af7e510005bbfce6b622c0164388eb156d8ce62e2f901adcf96abf1b3ca5
-
Filesize
204B
MD52d3e4ef3ca1e3eeddea7cedf110fa310
SHA1c84d1dccd16f9d49499ecf9e8b5dcb860ec1cb8c
SHA25699580c5a86b93887657787813e59ee96ad95f64bf6d03e2ddf9d91a89a6c85f9
SHA5120741df0564d21f0dec15eae75c7d0b7eac728f061400b1935862e043e7f9f597b8c559fbc800580a45a2ea92bd43391cbe2cc6862d0075caa322ab342006fd97
-
Filesize
172B
MD56985337162f279cdc8080e79b189511e
SHA1c88986542fea18ac907d55fe2931b1d8ef725f75
SHA256078bf5cb81a489b997e97a7c5489a352348543cf958f6f978fba895c0caa5768
SHA512d2711d31a45b3125b601669e1116f746eef98839e312055fb09b93c61482cb3e3ef6aeffaa16ff8fa54d49c6353a7bbba2333a65c5f59c54bbdf81b38c34bb8e
-
Filesize
2.6MB
MD5ef830dc1fc02f4e473b9d531993c1335
SHA10f8130c5a09978c15c041113eafa93178e97e439
SHA2561b2422fa0a8c883f56fe142c57a84dcff95175aa6084e77c7c7bbd52649ced9b
SHA51213a0b10b7022a954a1a17becc8654d7cb07dae1b688f76038cb61e276a4fc3461b604f8fdc5e2484e3c0e169701248672995e611ad6ecf047e707c8527133002