Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 07:30
Static task
static1
Behavioral task
behavioral1
Sample
e8b3f4dddc7b43ee254b3567a60c0a0077fbb31acdd78888a44365fc1deeb2f8.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e8b3f4dddc7b43ee254b3567a60c0a0077fbb31acdd78888a44365fc1deeb2f8.exe
Resource
win10v2004-20241007-en
General
-
Target
e8b3f4dddc7b43ee254b3567a60c0a0077fbb31acdd78888a44365fc1deeb2f8.exe
-
Size
2.6MB
-
MD5
04d00238e2600955040c93db00a46adb
-
SHA1
f4335ddedf234a652e8cab234384e622da9d7cd7
-
SHA256
e8b3f4dddc7b43ee254b3567a60c0a0077fbb31acdd78888a44365fc1deeb2f8
-
SHA512
a0b5dd9557e893163c4e0aab89be92a33479db4333356bc54a2070bb69bdd0f3e8e61f3dbf3d2ab2513b610f815c2d4851101b42ba9fc547c26717e86b0e0325
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBkB/bSqP:sxX7QnxrloE5dpUp7bVP
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
e8b3f4dddc7b43ee254b3567a60c0a0077fbb31acdd78888a44365fc1deeb2f8.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe e8b3f4dddc7b43ee254b3567a60c0a0077fbb31acdd78888a44365fc1deeb2f8.exe -
Executes dropped EXE 2 IoCs
Processes:
ecxopti.exedevoptiec.exepid process 1176 ecxopti.exe 1372 devoptiec.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
e8b3f4dddc7b43ee254b3567a60c0a0077fbb31acdd78888a44365fc1deeb2f8.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvCC\\devoptiec.exe" e8b3f4dddc7b43ee254b3567a60c0a0077fbb31acdd78888a44365fc1deeb2f8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Mint8L\\bodaec.exe" e8b3f4dddc7b43ee254b3567a60c0a0077fbb31acdd78888a44365fc1deeb2f8.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
e8b3f4dddc7b43ee254b3567a60c0a0077fbb31acdd78888a44365fc1deeb2f8.exeecxopti.exedevoptiec.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8b3f4dddc7b43ee254b3567a60c0a0077fbb31acdd78888a44365fc1deeb2f8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecxopti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devoptiec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e8b3f4dddc7b43ee254b3567a60c0a0077fbb31acdd78888a44365fc1deeb2f8.exeecxopti.exedevoptiec.exepid process 700 e8b3f4dddc7b43ee254b3567a60c0a0077fbb31acdd78888a44365fc1deeb2f8.exe 700 e8b3f4dddc7b43ee254b3567a60c0a0077fbb31acdd78888a44365fc1deeb2f8.exe 700 e8b3f4dddc7b43ee254b3567a60c0a0077fbb31acdd78888a44365fc1deeb2f8.exe 700 e8b3f4dddc7b43ee254b3567a60c0a0077fbb31acdd78888a44365fc1deeb2f8.exe 1176 ecxopti.exe 1176 ecxopti.exe 1372 devoptiec.exe 1372 devoptiec.exe 1176 ecxopti.exe 1176 ecxopti.exe 1372 devoptiec.exe 1372 devoptiec.exe 1176 ecxopti.exe 1176 ecxopti.exe 1372 devoptiec.exe 1372 devoptiec.exe 1176 ecxopti.exe 1176 ecxopti.exe 1372 devoptiec.exe 1372 devoptiec.exe 1176 ecxopti.exe 1176 ecxopti.exe 1372 devoptiec.exe 1372 devoptiec.exe 1176 ecxopti.exe 1176 ecxopti.exe 1372 devoptiec.exe 1372 devoptiec.exe 1176 ecxopti.exe 1176 ecxopti.exe 1372 devoptiec.exe 1372 devoptiec.exe 1176 ecxopti.exe 1176 ecxopti.exe 1372 devoptiec.exe 1372 devoptiec.exe 1176 ecxopti.exe 1176 ecxopti.exe 1372 devoptiec.exe 1372 devoptiec.exe 1176 ecxopti.exe 1176 ecxopti.exe 1372 devoptiec.exe 1372 devoptiec.exe 1176 ecxopti.exe 1176 ecxopti.exe 1372 devoptiec.exe 1372 devoptiec.exe 1176 ecxopti.exe 1176 ecxopti.exe 1372 devoptiec.exe 1372 devoptiec.exe 1176 ecxopti.exe 1176 ecxopti.exe 1372 devoptiec.exe 1372 devoptiec.exe 1176 ecxopti.exe 1176 ecxopti.exe 1372 devoptiec.exe 1372 devoptiec.exe 1176 ecxopti.exe 1176 ecxopti.exe 1372 devoptiec.exe 1372 devoptiec.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
e8b3f4dddc7b43ee254b3567a60c0a0077fbb31acdd78888a44365fc1deeb2f8.exedescription pid process target process PID 700 wrote to memory of 1176 700 e8b3f4dddc7b43ee254b3567a60c0a0077fbb31acdd78888a44365fc1deeb2f8.exe ecxopti.exe PID 700 wrote to memory of 1176 700 e8b3f4dddc7b43ee254b3567a60c0a0077fbb31acdd78888a44365fc1deeb2f8.exe ecxopti.exe PID 700 wrote to memory of 1176 700 e8b3f4dddc7b43ee254b3567a60c0a0077fbb31acdd78888a44365fc1deeb2f8.exe ecxopti.exe PID 700 wrote to memory of 1372 700 e8b3f4dddc7b43ee254b3567a60c0a0077fbb31acdd78888a44365fc1deeb2f8.exe devoptiec.exe PID 700 wrote to memory of 1372 700 e8b3f4dddc7b43ee254b3567a60c0a0077fbb31acdd78888a44365fc1deeb2f8.exe devoptiec.exe PID 700 wrote to memory of 1372 700 e8b3f4dddc7b43ee254b3567a60c0a0077fbb31acdd78888a44365fc1deeb2f8.exe devoptiec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8b3f4dddc7b43ee254b3567a60c0a0077fbb31acdd78888a44365fc1deeb2f8.exe"C:\Users\Admin\AppData\Local\Temp\e8b3f4dddc7b43ee254b3567a60c0a0077fbb31acdd78888a44365fc1deeb2f8.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1176
-
-
C:\SysDrvCC\devoptiec.exeC:\SysDrvCC\devoptiec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5822770034a28a812e8a1b105f734f8b9
SHA1b8cdc0cbb7bb4e7ca2d35ae01ff7bcaa53a4821b
SHA256710962217f39da4fbff83f13c3a5ea0e1571297e266a3cd1a8f5dcf17ccd87c2
SHA512b7609c51c1c5b5b0d6eab5fd0fe6c02d9a6d454a9dde8131477102c2578cc5c08053de2f4ce696d87c85a9b1819c3f22c8cc5868f151a2201cd5cb6b84378505
-
Filesize
510KB
MD51b98169e9b1a1f77d96aa1f60f5e8d36
SHA1bafe1d3a9925ff5aa296d04dd848db6ea4bf4c61
SHA2562884baa93e3e428c4d20c55d6cb143b3655b0d4eb6be0ad452e25d603883ceb1
SHA512e3a2fd09167b5e09b150a75586b590b5c59e5702e8cb1692ebbb497751563502122d8fa2f0870fc78960ef47982003094a9c92e6e2a18b89793f93664b0e59a1
-
Filesize
2.6MB
MD5493943c2e0f212a3db50e75dd7561918
SHA1b23244e05f26372559264a3ee916ca6ee2cf000c
SHA25681d4c3489703f5363db1f4895f47d7e5377a2444d46f6df28c96be957bf8d6f8
SHA512347ad720e750fcffa0a27be09f91792f036ac3170f6398a07a0d002bac4a692565b429efd1cf54ba7892638b2c81e9f395fb51bb2b57b79f6ee06e2a4e4c84dd
-
Filesize
202B
MD5dc24b351410250c47bcb245238db2ef2
SHA1f474dce5b47194129661349b52134dbbc65dd54b
SHA256b3e7c2d9e8065b21b9100f16112dda24b9f96332ed83c8d3381c2f3251d70687
SHA512e4b35f2d060e32f3324b6b9c1fa24bbc78723a2f532d86085cdf1fc458764e0ebd47120c21805a6213888266fef300962636947529f4ea0e1bdcb22501b5926b
-
Filesize
170B
MD5f4743ed69c2610d628f1c65972f5fd75
SHA1c1c0f7643090432642a45994fca7b34b1f538cde
SHA256af41e46e4ec8b48c51b113c0557dcae755871c3ac31936dcdb42c4db09a95d04
SHA5123d86418c07d5ab01fb205e98e4fbfbeca19f1b7e0a42d6b8f83d8b8971cc2b6c0e2b5d14f4e6b0100ce1d3fa9d21c84da65086f4afe9e99dc272f8a4316b4ca1
-
Filesize
2.6MB
MD541cde965cacc183d0c3ab46702c1f26f
SHA1916f449f29da0fbf05a4d301800591e963643543
SHA256d0e36934d81d89fa3cab919bc0a2dfce1e1948d0065577e34b9012cae3589687
SHA512e8e204d7fd516b27fd1e41dac5ccdcfed96cafec30b577a1aa0560198c1cd56392e9034e2d7c93f1d5d2377118e057af9b988718569448ad862c6a410ac54ae2