Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 14:14
Static task
static1
Behavioral task
behavioral1
Sample
f45aef6ba76c6c99dd256d0b78fa0875cb5a1c24a10211c1323b33c6e849c868N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f45aef6ba76c6c99dd256d0b78fa0875cb5a1c24a10211c1323b33c6e849c868N.exe
Resource
win10v2004-20241007-en
General
-
Target
f45aef6ba76c6c99dd256d0b78fa0875cb5a1c24a10211c1323b33c6e849c868N.exe
-
Size
2.6MB
-
MD5
a567bf053ab7521a8188fda6e50974c0
-
SHA1
6ea1f4f48797c80dad085098188f712f2486e2e9
-
SHA256
f45aef6ba76c6c99dd256d0b78fa0875cb5a1c24a10211c1323b33c6e849c868
-
SHA512
3d73ef606dbf223a368d0725c3cd72d898d653952fbd058113bfa00bb3b1059d1ebd882158e6caabc53e0e4c1a47a2ced65458e226377ee3bd406d4bb5eb1ffe
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBhB/bS:sxX7QnxrloE5dpUpib
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe f45aef6ba76c6c99dd256d0b78fa0875cb5a1c24a10211c1323b33c6e849c868N.exe -
Executes dropped EXE 2 IoCs
pid Process 2248 ecxopti.exe 3212 abodloc.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesS2\\abodloc.exe" f45aef6ba76c6c99dd256d0b78fa0875cb5a1c24a10211c1323b33c6e849c868N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBB0\\dobaec.exe" f45aef6ba76c6c99dd256d0b78fa0875cb5a1c24a10211c1323b33c6e849c868N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f45aef6ba76c6c99dd256d0b78fa0875cb5a1c24a10211c1323b33c6e849c868N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecxopti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abodloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 456 f45aef6ba76c6c99dd256d0b78fa0875cb5a1c24a10211c1323b33c6e849c868N.exe 456 f45aef6ba76c6c99dd256d0b78fa0875cb5a1c24a10211c1323b33c6e849c868N.exe 456 f45aef6ba76c6c99dd256d0b78fa0875cb5a1c24a10211c1323b33c6e849c868N.exe 456 f45aef6ba76c6c99dd256d0b78fa0875cb5a1c24a10211c1323b33c6e849c868N.exe 2248 ecxopti.exe 2248 ecxopti.exe 3212 abodloc.exe 3212 abodloc.exe 2248 ecxopti.exe 2248 ecxopti.exe 3212 abodloc.exe 3212 abodloc.exe 2248 ecxopti.exe 2248 ecxopti.exe 3212 abodloc.exe 3212 abodloc.exe 2248 ecxopti.exe 2248 ecxopti.exe 3212 abodloc.exe 3212 abodloc.exe 2248 ecxopti.exe 2248 ecxopti.exe 3212 abodloc.exe 3212 abodloc.exe 2248 ecxopti.exe 2248 ecxopti.exe 3212 abodloc.exe 3212 abodloc.exe 2248 ecxopti.exe 2248 ecxopti.exe 3212 abodloc.exe 3212 abodloc.exe 2248 ecxopti.exe 2248 ecxopti.exe 3212 abodloc.exe 3212 abodloc.exe 2248 ecxopti.exe 2248 ecxopti.exe 3212 abodloc.exe 3212 abodloc.exe 2248 ecxopti.exe 2248 ecxopti.exe 3212 abodloc.exe 3212 abodloc.exe 2248 ecxopti.exe 2248 ecxopti.exe 3212 abodloc.exe 3212 abodloc.exe 2248 ecxopti.exe 2248 ecxopti.exe 3212 abodloc.exe 3212 abodloc.exe 2248 ecxopti.exe 2248 ecxopti.exe 3212 abodloc.exe 3212 abodloc.exe 2248 ecxopti.exe 2248 ecxopti.exe 3212 abodloc.exe 3212 abodloc.exe 2248 ecxopti.exe 2248 ecxopti.exe 3212 abodloc.exe 3212 abodloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 456 wrote to memory of 2248 456 f45aef6ba76c6c99dd256d0b78fa0875cb5a1c24a10211c1323b33c6e849c868N.exe 88 PID 456 wrote to memory of 2248 456 f45aef6ba76c6c99dd256d0b78fa0875cb5a1c24a10211c1323b33c6e849c868N.exe 88 PID 456 wrote to memory of 2248 456 f45aef6ba76c6c99dd256d0b78fa0875cb5a1c24a10211c1323b33c6e849c868N.exe 88 PID 456 wrote to memory of 3212 456 f45aef6ba76c6c99dd256d0b78fa0875cb5a1c24a10211c1323b33c6e849c868N.exe 89 PID 456 wrote to memory of 3212 456 f45aef6ba76c6c99dd256d0b78fa0875cb5a1c24a10211c1323b33c6e849c868N.exe 89 PID 456 wrote to memory of 3212 456 f45aef6ba76c6c99dd256d0b78fa0875cb5a1c24a10211c1323b33c6e849c868N.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\f45aef6ba76c6c99dd256d0b78fa0875cb5a1c24a10211c1323b33c6e849c868N.exe"C:\Users\Admin\AppData\Local\Temp\f45aef6ba76c6c99dd256d0b78fa0875cb5a1c24a10211c1323b33c6e849c868N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2248
-
-
C:\FilesS2\abodloc.exeC:\FilesS2\abodloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5906e3595156f9e420811629768bf2c11
SHA1e7fee45fcf34468246ba5185127f2751af0c33c5
SHA2568a64cd9ed65b9872807349266e85034ffa20b5bb92e12263ee9ba6a0b72c0da3
SHA512dfed7178e0bb47cb2c2e89e638a77874116c879c1120ac7182cc8052b222b24c7d6c6da840d97e84a9dc6b2ff4452ba7ec0a4d9e1f632a4105149ec942fe752e
-
Filesize
2.6MB
MD50198f1ac92d5c9a4d4448d555fb76080
SHA1a865f35d484a3bb22d20a89f62a622e1038d9632
SHA25684fa351283908e3e150acb608021981ada8a95b877ff17c41725b7b1378a177d
SHA51245e887ddee3a00ed38758e7593f22e91af88fe2fd144f387ef11e8ef42324d5e7147844d942a51cacf56e97ffaba733eed4d0f5305e279245ddb5fec6e812623
-
Filesize
512B
MD5e5f87ced043dbdc34bbd32a8dd98972e
SHA164802c7da01c2a964cff79e6e5038fd6aa5ba388
SHA256481c17ffa324206b6ad488b63518822bcdb94e0b8487044790d29812cb164295
SHA5121b6992d7e5a3b0472b16f5ac08ad73b4a5f15cbc0b383e94c2a67c7d35a779abd25b5a0551f1aa5716bab77a9dcd396e2131b700f7d679b9f8518f173b80613f
-
Filesize
2.6MB
MD58186f4a310edff1ac6107118345d3403
SHA166fa9f10563a8c7d9eb51eecf386bc193686aa98
SHA2560dce947f44ee80cc0ffe811f40253d8b15de2888c021830ae823d65fc2d47270
SHA512c66e9c7663793ab14cfc073aa197d84bb7cbe6abc216d2a7797f304cc6736ff9982100bf4f2be8f81753b416dff535560211353fab86d80ea53b3ae308f6daa6
-
Filesize
199B
MD5ed332a2f80ee8042f88fd887386ab600
SHA17d03d26ef16806a5040b89bf5ca7e0b77e922bce
SHA2569d77ba689b61f0e801c78f5754be585afe43459ca89cb227620b78c51755773e
SHA512209b4aaac042c45806710b96ecddf78f031c413004da7b8be24ed9f54bd90a325630c1479207420a8f932990cc14e49d026d5b2d516d484d783df0992afe19a4
-
Filesize
167B
MD578af4d46f75e73957194c7bc28e813bb
SHA14b9702842c37845813c09215203dad78595a71aa
SHA256e63c925d5d0b40266e12016a780a585385bbf1cec208fc87754b93b840e09944
SHA5129808df8deb3f731735bc5991ac3de4e4c12c6fed21bcd86a824efeb1add26236048f96e80ad180f8bf22617ac795cb141125b1b57565d0a20be10427577af40c
-
Filesize
2.6MB
MD5338354be7aa4498749e44abd27f519be
SHA142b5dc6a4d825189a8f59eb08a6a16348b3c27e9
SHA256ebf834327cd31cb96c43f79dd68057b1d5b6386f58cb5103a11f768912729090
SHA512949891e433b3671d3f0ac3269b3e985612f38258fbae2aa1430e50d1f797c47194aea28702c07fe4be18868bb62b8224c2371283219fd754c5436e762b261a7b