Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 11:00
Static task
static1
Behavioral task
behavioral1
Sample
eb07a811518541ef5d2111b0ebc6927f67223450888e00942242367f55236c62.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb07a811518541ef5d2111b0ebc6927f67223450888e00942242367f55236c62.exe
Resource
win10v2004-20241007-en
General
-
Target
eb07a811518541ef5d2111b0ebc6927f67223450888e00942242367f55236c62.exe
-
Size
2.6MB
-
MD5
b7c3d62cad5a0e05f0a2ba6738d4b724
-
SHA1
ac5aff487b1542b78dc24cfee2ed8d3987a05c43
-
SHA256
eb07a811518541ef5d2111b0ebc6927f67223450888e00942242367f55236c62
-
SHA512
260972e6476eb96218de6121782cd94709b59941413ff3fd873b79984e3acb513e0e7b3c96f9ccd5b0c8a5137a018529431b13ba83275c3d2175c9374437b89d
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBAB/bS:sxX7QnxrloE5dpUpbb
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
eb07a811518541ef5d2111b0ebc6927f67223450888e00942242367f55236c62.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecaopti.exe eb07a811518541ef5d2111b0ebc6927f67223450888e00942242367f55236c62.exe -
Executes dropped EXE 2 IoCs
Processes:
ecaopti.exedevdobloc.exepid process 2328 ecaopti.exe 2324 devdobloc.exe -
Loads dropped DLL 2 IoCs
Processes:
eb07a811518541ef5d2111b0ebc6927f67223450888e00942242367f55236c62.exepid process 2888 eb07a811518541ef5d2111b0ebc6927f67223450888e00942242367f55236c62.exe 2888 eb07a811518541ef5d2111b0ebc6927f67223450888e00942242367f55236c62.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
eb07a811518541ef5d2111b0ebc6927f67223450888e00942242367f55236c62.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Intelproc32\\devdobloc.exe" eb07a811518541ef5d2111b0ebc6927f67223450888e00942242367f55236c62.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidV0\\optiaec.exe" eb07a811518541ef5d2111b0ebc6927f67223450888e00942242367f55236c62.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
eb07a811518541ef5d2111b0ebc6927f67223450888e00942242367f55236c62.exeecaopti.exedevdobloc.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb07a811518541ef5d2111b0ebc6927f67223450888e00942242367f55236c62.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecaopti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devdobloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
eb07a811518541ef5d2111b0ebc6927f67223450888e00942242367f55236c62.exeecaopti.exedevdobloc.exepid process 2888 eb07a811518541ef5d2111b0ebc6927f67223450888e00942242367f55236c62.exe 2888 eb07a811518541ef5d2111b0ebc6927f67223450888e00942242367f55236c62.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe 2328 ecaopti.exe 2324 devdobloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
eb07a811518541ef5d2111b0ebc6927f67223450888e00942242367f55236c62.exedescription pid process target process PID 2888 wrote to memory of 2328 2888 eb07a811518541ef5d2111b0ebc6927f67223450888e00942242367f55236c62.exe ecaopti.exe PID 2888 wrote to memory of 2328 2888 eb07a811518541ef5d2111b0ebc6927f67223450888e00942242367f55236c62.exe ecaopti.exe PID 2888 wrote to memory of 2328 2888 eb07a811518541ef5d2111b0ebc6927f67223450888e00942242367f55236c62.exe ecaopti.exe PID 2888 wrote to memory of 2328 2888 eb07a811518541ef5d2111b0ebc6927f67223450888e00942242367f55236c62.exe ecaopti.exe PID 2888 wrote to memory of 2324 2888 eb07a811518541ef5d2111b0ebc6927f67223450888e00942242367f55236c62.exe devdobloc.exe PID 2888 wrote to memory of 2324 2888 eb07a811518541ef5d2111b0ebc6927f67223450888e00942242367f55236c62.exe devdobloc.exe PID 2888 wrote to memory of 2324 2888 eb07a811518541ef5d2111b0ebc6927f67223450888e00942242367f55236c62.exe devdobloc.exe PID 2888 wrote to memory of 2324 2888 eb07a811518541ef5d2111b0ebc6927f67223450888e00942242367f55236c62.exe devdobloc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb07a811518541ef5d2111b0ebc6927f67223450888e00942242367f55236c62.exe"C:\Users\Admin\AppData\Local\Temp\eb07a811518541ef5d2111b0ebc6927f67223450888e00942242367f55236c62.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecaopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecaopti.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2328
-
-
C:\Intelproc32\devdobloc.exeC:\Intelproc32\devdobloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5435ed27504d2c6bb6f9437689819da60
SHA147d2678523a2679ac3dd3105d63809784a5236a5
SHA2561a326bc926db3f022de5206f60643416c78f8dc9c35faeb13a5311bec51daf41
SHA512bea5e4af14f282f749d8e4c6f0d67464427af34d9fcf4b34be898958e2f7ff07231748d7982f57fa3cab8a859d39048dcccdf9486ee0860299d20ce6cea113b2
-
Filesize
173B
MD58f3563447d7fa2ee4114d9edaaace28c
SHA1b80d328397563081ec5b181160e48d6d3a9ba9d7
SHA2561de9bd200313ad70be282191cd30ac039d6cecd538a4f5a062bde08b7e51fc2f
SHA512e43758e6ba5e0182efee8c7254629aa11af99860cc230abe77af661b827c15d45113035d8c94cabaabc552b69590a966cc5b9c662ae586e53f216989097c0bc7
-
Filesize
205B
MD53df6ee48304b79614832261f981092f4
SHA1fcc1a5b69410b1b5e1e8ea7b1d68fccb70277385
SHA256bc4d3336af4b0ed5ba7085e664c1967a7eed2931c86a4c32f9217a0edf3002d5
SHA512c1ad21578932b4a6a98ddc63331c71e2a2cd58152aca45ff2eb01dd567e43269122169f4536eaef30bd46a5d92415e275bab4c9f7d18e9429f7e4b6c877bc1e5
-
Filesize
2.0MB
MD52456e825ceeedb20f71206165d49e947
SHA1890f9632fef2a6bf43a9dfd735746c09de658961
SHA256bed445e013cfb98c10918a7d597b299d1361eedd9c130606df15e64bf7cc7606
SHA512970e403d499e2e6ce89292e5e79ed790e0a90bd1db7ff84e7bb8662441954b77395552a9eff23069355d32fb3163ba55b4761c48c45bc8f4ad37465dad63e20e
-
Filesize
2.6MB
MD5a1251bda35113fa87939fff7989ef70e
SHA178b84bd09f566ee15836ae39ee7ae540d176149b
SHA256f4fe44429b7b870a4f31a5471b25774c9b2130bea0d27f733065ce718dea0ad9
SHA5129de44b9af470fdd1f80832f22fa23feae3b6d89134a961354f9d7bb23b6dc4f461799bd8ee75f5f34280365da88b9a3aea7c1a3307f38841d1f0d5a46fee65c4
-
Filesize
2.6MB
MD54bc94298fe70c4e6627584dcf704598f
SHA1faadb07abbf3e8e59b2ee4547a63cedb146f3a67
SHA256099145f6b90489a5ba71b65f3a706f10e55d422bf720111101418fb01abc3bc3
SHA5129627eef41c38c65c557d97e82fc98ebd41a4c795906727877a58dc19fccd135cbd1077af4332518f45639044f61f6dc7bebaf286da575cd8baa9955632da1329