Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 02:39
Static task
static1
Behavioral task
behavioral1
Sample
b1f4a184fd38944e0992630b1c44e22f59b2c284e977898b5374c375d3c91567.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b1f4a184fd38944e0992630b1c44e22f59b2c284e977898b5374c375d3c91567.exe
Resource
win10v2004-20241007-en
General
-
Target
b1f4a184fd38944e0992630b1c44e22f59b2c284e977898b5374c375d3c91567.exe
-
Size
2.6MB
-
MD5
22fda65c5b7f096466b5086e927f9a5f
-
SHA1
439ddcb43d9ca86e37b532fd9700bce2abd38725
-
SHA256
b1f4a184fd38944e0992630b1c44e22f59b2c284e977898b5374c375d3c91567
-
SHA512
721b7622e8b26d3bbae3e61db53c67b73cd2b5ffbd2c497f56026eafa50cf566f7d494ed1704ac7dc9c12a20121ede75a4e292ecd9d38e679ad79512646a4006
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBjB/bSq:sxX7QnxrloE5dpUpobV
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe b1f4a184fd38944e0992630b1c44e22f59b2c284e977898b5374c375d3c91567.exe -
Executes dropped EXE 2 IoCs
pid Process 2420 ecabod.exe 3124 xdobsys.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Adobe7U\\xdobsys.exe" b1f4a184fd38944e0992630b1c44e22f59b2c284e977898b5374c375d3c91567.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVB5X\\optidevec.exe" b1f4a184fd38944e0992630b1c44e22f59b2c284e977898b5374c375d3c91567.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1f4a184fd38944e0992630b1c44e22f59b2c284e977898b5374c375d3c91567.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecabod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdobsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3608 b1f4a184fd38944e0992630b1c44e22f59b2c284e977898b5374c375d3c91567.exe 3608 b1f4a184fd38944e0992630b1c44e22f59b2c284e977898b5374c375d3c91567.exe 3608 b1f4a184fd38944e0992630b1c44e22f59b2c284e977898b5374c375d3c91567.exe 3608 b1f4a184fd38944e0992630b1c44e22f59b2c284e977898b5374c375d3c91567.exe 2420 ecabod.exe 2420 ecabod.exe 3124 xdobsys.exe 3124 xdobsys.exe 2420 ecabod.exe 2420 ecabod.exe 3124 xdobsys.exe 3124 xdobsys.exe 2420 ecabod.exe 2420 ecabod.exe 3124 xdobsys.exe 3124 xdobsys.exe 2420 ecabod.exe 2420 ecabod.exe 3124 xdobsys.exe 3124 xdobsys.exe 2420 ecabod.exe 2420 ecabod.exe 3124 xdobsys.exe 3124 xdobsys.exe 2420 ecabod.exe 2420 ecabod.exe 3124 xdobsys.exe 3124 xdobsys.exe 2420 ecabod.exe 2420 ecabod.exe 3124 xdobsys.exe 3124 xdobsys.exe 2420 ecabod.exe 2420 ecabod.exe 3124 xdobsys.exe 3124 xdobsys.exe 2420 ecabod.exe 2420 ecabod.exe 3124 xdobsys.exe 3124 xdobsys.exe 2420 ecabod.exe 2420 ecabod.exe 3124 xdobsys.exe 3124 xdobsys.exe 2420 ecabod.exe 2420 ecabod.exe 3124 xdobsys.exe 3124 xdobsys.exe 2420 ecabod.exe 2420 ecabod.exe 3124 xdobsys.exe 3124 xdobsys.exe 2420 ecabod.exe 2420 ecabod.exe 3124 xdobsys.exe 3124 xdobsys.exe 2420 ecabod.exe 2420 ecabod.exe 3124 xdobsys.exe 3124 xdobsys.exe 2420 ecabod.exe 2420 ecabod.exe 3124 xdobsys.exe 3124 xdobsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3608 wrote to memory of 2420 3608 b1f4a184fd38944e0992630b1c44e22f59b2c284e977898b5374c375d3c91567.exe 88 PID 3608 wrote to memory of 2420 3608 b1f4a184fd38944e0992630b1c44e22f59b2c284e977898b5374c375d3c91567.exe 88 PID 3608 wrote to memory of 2420 3608 b1f4a184fd38944e0992630b1c44e22f59b2c284e977898b5374c375d3c91567.exe 88 PID 3608 wrote to memory of 3124 3608 b1f4a184fd38944e0992630b1c44e22f59b2c284e977898b5374c375d3c91567.exe 89 PID 3608 wrote to memory of 3124 3608 b1f4a184fd38944e0992630b1c44e22f59b2c284e977898b5374c375d3c91567.exe 89 PID 3608 wrote to memory of 3124 3608 b1f4a184fd38944e0992630b1c44e22f59b2c284e977898b5374c375d3c91567.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1f4a184fd38944e0992630b1c44e22f59b2c284e977898b5374c375d3c91567.exe"C:\Users\Admin\AppData\Local\Temp\b1f4a184fd38944e0992630b1c44e22f59b2c284e977898b5374c375d3c91567.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2420
-
-
C:\Adobe7U\xdobsys.exeC:\Adobe7U\xdobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD590321dcca4493ffdc4ef370da952fe6c
SHA1cc3bf62a5aa990586d9e6a90aacdc4adb9c3d54c
SHA25669689983ea345710c1784a4e47db5119d89a343c600f87ebd928dd0c8c59ddfd
SHA512ac5f1cd23567bae92005accac1391d46b8bcbf7fe5b27214d8039639be1c6813cf7788e23acdb79c8370acf99d18f14342faf48b124550e1982e09528a9be269
-
Filesize
2.6MB
MD5c82ae30b2f90b9972d5df351d5e644af
SHA1c669139af49e47ec53aaa9f3fdca99086cdb4ce9
SHA25687f2ae5ddb39c3a2937482c5f1a8dddce12dbc511b5ba68e6a6732a84781c066
SHA51283501a2b18c155d6d53a946fadcfe077772f65c219d0e9275eeefe4ce07f9b3d73fcbdd653ce573cc887525d12bc2d30fd544a37e15f82e81adb12ca87fe2523
-
Filesize
92KB
MD5401ada8a78d0baf24245380102b65f39
SHA10f01f9633c023074aa3871fae3c2710394cd3589
SHA2560c6baf48dbaa3284f1f6cc7f3e43785bd080235d075957371595d0fd7b23b516
SHA51276ffa0108041e3cdd2ad5cf494a3ce59a3e881ebc9e912ea0029630477813161cc7ec87c74ef27dbf8cb3ecbfe55abefbb421da72bcb76c69194be939d26f5d7
-
Filesize
2.6MB
MD5bb352a7b9bee6cf52c151f6f273b2e53
SHA18b8682c7f71b635c03f522e4739eaaea16227889
SHA256f06a14cfa063bfeb0232d74a5f1730289ba86fec14db2c58d82a4ea283c0f2d5
SHA51207e80f8ac337d1c42c6a61c0061f7b645a67b08f86af8c12efff31e41cc74a0c04ed5c90e368ec2104b24b3cce13e5acfac818c6f84eabedd23635ec71ec5230
-
Filesize
201B
MD5dab59408ec69d32c8c2718546a119e6a
SHA1b75656dcd471a299cb32aae3d7a46de0a85349c4
SHA25686d24c15362b2762ada92ad2373107bf8d77dfa0100fa72ff8666a67ffcb11c3
SHA512a7e781fd0c53c72427d1002ff577323ac37cbbb08856196d4ac08265e567ef15f413a6f800cbe0d4f916a7631ffd7fcd5c809eb4746eb241d20098d5803bf3de
-
Filesize
169B
MD54092ec22ea1b6622e1512424f8c6ac02
SHA1ad38d6e7629f088351abde2a149d8785241f4fc3
SHA2565af5250bd944730b078ca387ab8049e24e606f50d25d915d5c89fee6f488e3d3
SHA512f5c56f772009f603eb33f520c953283b8be04b7158f14eb4ab085fee7c55510a2c6ace76fee06889e4b87f72e2d9e72cc811eebcd39248497146cc17f300dc64
-
Filesize
2.6MB
MD5c81f0c76d1aa4715c340432041b17c74
SHA1d26525d5e2e79b832ed5f4d1582ef4f03f7fc99e
SHA25604a7cf2e609ec82019dfe672b6eeaaadce2147fd8f3d2fcb8fd085d524b80985
SHA512b1c763ba6ec9cba139482daeaf99b53e6987cd3eec703358528c60db7a54555889173874d34f1123c3ba63f01beb813c6792b9bd42fa16f79557c15af42345a5