Analysis
-
max time kernel
153s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 22:28
Static task
static1
Behavioral task
behavioral1
Sample
4023c1e2bd1e70aed129fcd6a58df22f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4023c1e2bd1e70aed129fcd6a58df22f.exe
Resource
win10v2004-20231215-en
General
-
Target
4023c1e2bd1e70aed129fcd6a58df22f.exe
-
Size
57KB
-
MD5
4023c1e2bd1e70aed129fcd6a58df22f
-
SHA1
dcd1361ab29ce1c2d3a9c786b4fd58b04222cb19
-
SHA256
67752e2f50674670fb58bfb89ccfb4c7f41abdf34944a04fea79c05d1edd1c0f
-
SHA512
7e8d92252b04021c88dfb08fdbd076111341dc1d5040f434e5148c6eba2ab51b8946ed5a9bf7e8b94a42611008abf24236314155282d98d41ff6a02871d5fbab
-
SSDEEP
768:3Ddjl9yHkrAoV+KOwOBIJCTj59WY8QiMso5fl9e1Xl1tqylIwW/+wpzre7+h3:3JjlcPoZQBIkTjXsW5flAhq/wgZ3
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4704 odjebiav.exe 3344 odjebiav.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Ma Svasta Pomalo = "C:\\Users\\Admin\\AppData\\Roaming\\odjebiav.exe" 4023c1e2bd1e70aed129fcd6a58df22f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ma Svasta Pomalo = "C:\\Users\\Admin\\AppData\\Roaming\\odjebiav.exe" 4023c1e2bd1e70aed129fcd6a58df22f.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2384 set thread context of 2560 2384 4023c1e2bd1e70aed129fcd6a58df22f.exe 88 PID 4704 set thread context of 3344 4704 odjebiav.exe 91 -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2560 2384 4023c1e2bd1e70aed129fcd6a58df22f.exe 88 PID 2384 wrote to memory of 2560 2384 4023c1e2bd1e70aed129fcd6a58df22f.exe 88 PID 2384 wrote to memory of 2560 2384 4023c1e2bd1e70aed129fcd6a58df22f.exe 88 PID 2384 wrote to memory of 2560 2384 4023c1e2bd1e70aed129fcd6a58df22f.exe 88 PID 2384 wrote to memory of 2560 2384 4023c1e2bd1e70aed129fcd6a58df22f.exe 88 PID 2384 wrote to memory of 2560 2384 4023c1e2bd1e70aed129fcd6a58df22f.exe 88 PID 2384 wrote to memory of 2560 2384 4023c1e2bd1e70aed129fcd6a58df22f.exe 88 PID 2384 wrote to memory of 2560 2384 4023c1e2bd1e70aed129fcd6a58df22f.exe 88 PID 2560 wrote to memory of 4704 2560 4023c1e2bd1e70aed129fcd6a58df22f.exe 90 PID 2560 wrote to memory of 4704 2560 4023c1e2bd1e70aed129fcd6a58df22f.exe 90 PID 2560 wrote to memory of 4704 2560 4023c1e2bd1e70aed129fcd6a58df22f.exe 90 PID 4704 wrote to memory of 3344 4704 odjebiav.exe 91 PID 4704 wrote to memory of 3344 4704 odjebiav.exe 91 PID 4704 wrote to memory of 3344 4704 odjebiav.exe 91 PID 4704 wrote to memory of 3344 4704 odjebiav.exe 91 PID 4704 wrote to memory of 3344 4704 odjebiav.exe 91 PID 4704 wrote to memory of 3344 4704 odjebiav.exe 91 PID 4704 wrote to memory of 3344 4704 odjebiav.exe 91 PID 4704 wrote to memory of 3344 4704 odjebiav.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\4023c1e2bd1e70aed129fcd6a58df22f.exe"C:\Users\Admin\AppData\Local\Temp\4023c1e2bd1e70aed129fcd6a58df22f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\4023c1e2bd1e70aed129fcd6a58df22f.exe"C:\Users\Admin\AppData\Local\Temp\4023c1e2bd1e70aed129fcd6a58df22f.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Roaming\odjebiav.exe"C:\Users\Admin\AppData\Roaming\odjebiav.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Roaming\odjebiav.exe"C:\Users\Admin\AppData\Roaming\odjebiav.exe"4⤵
- Executes dropped EXE
PID:3344
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD54023c1e2bd1e70aed129fcd6a58df22f
SHA1dcd1361ab29ce1c2d3a9c786b4fd58b04222cb19
SHA25667752e2f50674670fb58bfb89ccfb4c7f41abdf34944a04fea79c05d1edd1c0f
SHA5127e8d92252b04021c88dfb08fdbd076111341dc1d5040f434e5148c6eba2ab51b8946ed5a9bf7e8b94a42611008abf24236314155282d98d41ff6a02871d5fbab