Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 08:39
Static task
static1
Behavioral task
behavioral1
Sample
d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe
Resource
win10v2004-20241007-en
General
-
Target
d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe
-
Size
2.6MB
-
MD5
f5beed01e362e949e31811b8021784e5
-
SHA1
1ece4ea2e5c874d197ab369d5f7116fd25b8e82f
-
SHA256
d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67
-
SHA512
beb7df35b9428e4ee5364af416eba2c044bbf8df8bf3a6e6f590c4bc05be382b926c86835109453a4bb7a711929c934c0c48ce395e8cfb86e6e25de91179ef5b
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBfB/bSy:sxX7QnxrloE5dpUp0b1
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecaopti.exe d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe -
Executes dropped EXE 2 IoCs
Processes:
ecaopti.exeadobec.exepid process 2776 ecaopti.exe 2844 adobec.exe -
Loads dropped DLL 2 IoCs
Processes:
d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exepid process 2736 d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe 2736 d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvM1\\adobec.exe" d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxZ2\\boddevec.exe" d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exeecaopti.exeadobec.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecaopti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exeecaopti.exeadobec.exepid process 2736 d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe 2736 d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe 2776 ecaopti.exe 2844 adobec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exedescription pid process target process PID 2736 wrote to memory of 2776 2736 d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe ecaopti.exe PID 2736 wrote to memory of 2776 2736 d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe ecaopti.exe PID 2736 wrote to memory of 2776 2736 d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe ecaopti.exe PID 2736 wrote to memory of 2776 2736 d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe ecaopti.exe PID 2736 wrote to memory of 2844 2736 d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe adobec.exe PID 2736 wrote to memory of 2844 2736 d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe adobec.exe PID 2736 wrote to memory of 2844 2736 d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe adobec.exe PID 2736 wrote to memory of 2844 2736 d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe adobec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe"C:\Users\Admin\AppData\Local\Temp\d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecaopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecaopti.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2776
-
-
C:\SysDrvM1\adobec.exeC:\SysDrvM1\adobec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5fa5ec97f7c723f1b101a71e705c3fbcd
SHA14d53baffbd8eac14a7ca53e8d03dee2dd518690e
SHA256ecec7e09f5d113831a871a8c5c95b2db3710303b680c89a8181065b6f2a9f423
SHA5126dbfd4c2573e0a99a1f867a10a6de1b0902631b1dc0d3461a1917223fdb808d50b2246c9c963ec6727bf416028b7544218acb5009512a8a39faa3a5a96f4ae6a
-
Filesize
9KB
MD5069c7d5ebc20ead441519fc2807acdfc
SHA194eb49acfddc6450c4810d85271299b49f964a2a
SHA256af2d7152258913747132a41b113c445005357f268ca6a717b1a8a42c3ac7052f
SHA51291dd10db98a2c08140dabc8a5cbe76768d1878b4cbf579f7f2c7fc0466e81b35f6a33d4dc31c97b393de15d2bb730f141974d3a6784c8f6a2748d67bc75433e9
-
Filesize
2.6MB
MD5c90eacce0a136c1116d9a46a6139f12f
SHA1e9741e1abc96cb2e68e89efe9e6cf229cfd75684
SHA25654f24e3d7db128fb1114371ddc399f7b334a8ec1b5fc8f9dae7f273e2d4a4475
SHA512bbbfa3e35d733caf4444ed162aaffa6d6911e892b83cef4823c56bf53ba8a2ee8437cc64b76b1e63e3dd3174408787ced9ad60cf4243cdb2328283bb40a32528
-
Filesize
170B
MD5b13a57bc91c229eb7732fe05eff07ae3
SHA1860916942e6f1ffbc05fdb8d5d369ee191e66f6b
SHA256580bff4d40b6fe5c3e67e3c86cc35f72435435a1913472c047b687ccc1adb33c
SHA512d08dad55964b76dea563f72d9fac2083d2e63bd53c45ea01688e55b7f619ff992689697cd20728ae2119d00b50aa6121b73bae328fc26ffa267e11fdcbe82887
-
Filesize
202B
MD5ff16b9425e951d67c19345bd5df30c88
SHA191405f4f688df57341d2b276030bd6de0f22cf53
SHA256cb23ef16f5476a54b60bf1277b4e73def786c04a8076042d5b807d1397174e44
SHA51276c927b5ee52856a42161f2d2a785bf237b8a70dc89fa8467f67587c18f2f2e82797a2c91cdfc737a53f21c15348b31dc86a6dc0e94eba232d119058530bbad5
-
Filesize
2.6MB
MD5f34e78e24e68b7a4dc62a2520895993d
SHA1d15338f672b7d913b19447588f0bd6e4523e9924
SHA2565c41133d8e841273951428049fecf65c2a95f252a6fe1712cd04c2c8cda87c1a
SHA512119bb8aa083dcf1e3f71a62ea9e92b487c385177da61a1f1c5d137f6122a0db2388c3af0bec6a30d0a5379fcec67f8f593aefff9e8a8b0a0d9a6ee98d146c25a