Analysis

  • max time kernel
    150s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 02:39

General

  • Target

    b1f4a184fd38944e0992630b1c44e22f59b2c284e977898b5374c375d3c91567.exe

  • Size

    2.6MB

  • MD5

    22fda65c5b7f096466b5086e927f9a5f

  • SHA1

    439ddcb43d9ca86e37b532fd9700bce2abd38725

  • SHA256

    b1f4a184fd38944e0992630b1c44e22f59b2c284e977898b5374c375d3c91567

  • SHA512

    721b7622e8b26d3bbae3e61db53c67b73cd2b5ffbd2c497f56026eafa50cf566f7d494ed1704ac7dc9c12a20121ede75a4e292ecd9d38e679ad79512646a4006

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBjB/bSq:sxX7QnxrloE5dpUpobV

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1f4a184fd38944e0992630b1c44e22f59b2c284e977898b5374c375d3c91567.exe
    "C:\Users\Admin\AppData\Local\Temp\b1f4a184fd38944e0992630b1c44e22f59b2c284e977898b5374c375d3c91567.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3608
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2420
    • C:\Adobe7U\xdobsys.exe
      C:\Adobe7U\xdobsys.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Adobe7U\xdobsys.exe

    Filesize

    1.7MB

    MD5

    90321dcca4493ffdc4ef370da952fe6c

    SHA1

    cc3bf62a5aa990586d9e6a90aacdc4adb9c3d54c

    SHA256

    69689983ea345710c1784a4e47db5119d89a343c600f87ebd928dd0c8c59ddfd

    SHA512

    ac5f1cd23567bae92005accac1391d46b8bcbf7fe5b27214d8039639be1c6813cf7788e23acdb79c8370acf99d18f14342faf48b124550e1982e09528a9be269

  • C:\Adobe7U\xdobsys.exe

    Filesize

    2.6MB

    MD5

    c82ae30b2f90b9972d5df351d5e644af

    SHA1

    c669139af49e47ec53aaa9f3fdca99086cdb4ce9

    SHA256

    87f2ae5ddb39c3a2937482c5f1a8dddce12dbc511b5ba68e6a6732a84781c066

    SHA512

    83501a2b18c155d6d53a946fadcfe077772f65c219d0e9275eeefe4ce07f9b3d73fcbdd653ce573cc887525d12bc2d30fd544a37e15f82e81adb12ca87fe2523

  • C:\KaVB5X\optidevec.exe

    Filesize

    92KB

    MD5

    401ada8a78d0baf24245380102b65f39

    SHA1

    0f01f9633c023074aa3871fae3c2710394cd3589

    SHA256

    0c6baf48dbaa3284f1f6cc7f3e43785bd080235d075957371595d0fd7b23b516

    SHA512

    76ffa0108041e3cdd2ad5cf494a3ce59a3e881ebc9e912ea0029630477813161cc7ec87c74ef27dbf8cb3ecbfe55abefbb421da72bcb76c69194be939d26f5d7

  • C:\KaVB5X\optidevec.exe

    Filesize

    2.6MB

    MD5

    bb352a7b9bee6cf52c151f6f273b2e53

    SHA1

    8b8682c7f71b635c03f522e4739eaaea16227889

    SHA256

    f06a14cfa063bfeb0232d74a5f1730289ba86fec14db2c58d82a4ea283c0f2d5

    SHA512

    07e80f8ac337d1c42c6a61c0061f7b645a67b08f86af8c12efff31e41cc74a0c04ed5c90e368ec2104b24b3cce13e5acfac818c6f84eabedd23635ec71ec5230

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    201B

    MD5

    dab59408ec69d32c8c2718546a119e6a

    SHA1

    b75656dcd471a299cb32aae3d7a46de0a85349c4

    SHA256

    86d24c15362b2762ada92ad2373107bf8d77dfa0100fa72ff8666a67ffcb11c3

    SHA512

    a7e781fd0c53c72427d1002ff577323ac37cbbb08856196d4ac08265e567ef15f413a6f800cbe0d4f916a7631ffd7fcd5c809eb4746eb241d20098d5803bf3de

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    169B

    MD5

    4092ec22ea1b6622e1512424f8c6ac02

    SHA1

    ad38d6e7629f088351abde2a149d8785241f4fc3

    SHA256

    5af5250bd944730b078ca387ab8049e24e606f50d25d915d5c89fee6f488e3d3

    SHA512

    f5c56f772009f603eb33f520c953283b8be04b7158f14eb4ab085fee7c55510a2c6ace76fee06889e4b87f72e2d9e72cc811eebcd39248497146cc17f300dc64

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe

    Filesize

    2.6MB

    MD5

    c81f0c76d1aa4715c340432041b17c74

    SHA1

    d26525d5e2e79b832ed5f4d1582ef4f03f7fc99e

    SHA256

    04a7cf2e609ec82019dfe672b6eeaaadce2147fd8f3d2fcb8fd085d524b80985

    SHA512

    b1c763ba6ec9cba139482daeaf99b53e6987cd3eec703358528c60db7a54555889173874d34f1123c3ba63f01beb813c6792b9bd42fa16f79557c15af42345a5