Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 19:02
Static task
static1
Behavioral task
behavioral1
Sample
012755ccc0c4c25632653658c117cc3a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
012755ccc0c4c25632653658c117cc3a.exe
Resource
win10v2004-20231215-en
General
-
Target
012755ccc0c4c25632653658c117cc3a.exe
-
Size
1.5MB
-
MD5
012755ccc0c4c25632653658c117cc3a
-
SHA1
20632a682d1cb5e5a6af8573c46fd2de04bb7747
-
SHA256
cb784822fcaa9dd262d06813105993fcb5d2e4ff1a5c0e129c60d4ca924e0ee0
-
SHA512
feb82c70215bdb39a5d32c1a2cc11f149ee710ceedd3a29a9d154c1481a545f75bea76e5ef30472a4512c7db6df9141a09faac9d04338e48d2e082a0c0639fdf
-
SSDEEP
24576:lqet3SdZ9xauWImtIfQ0d44Et22FcNUbl8R4OvJayv8lsnrKLs+rs4ied6Mp:VkdQSmtNxt2LNH4OvoyCErD+44iU6U
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 012755ccc0c4c25632653658c117cc3a.exe -
Executes dropped EXE 2 IoCs
pid Process 1080 obadah.exe 2780 obadah.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1080 set thread context of 2780 1080 obadah.exe 24 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process 2128 1080 WerFault.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings 012755ccc0c4c25632653658c117cc3a.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3544 vlc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2780 obadah.exe 2780 obadah.exe 2780 obadah.exe 2780 obadah.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3544 vlc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 4176 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4176 AUDIODG.EXE Token: 33 3544 vlc.exe Token: SeIncBasePriorityPrivilege 3544 vlc.exe -
Suspicious use of FindShellTrayWindow 40 IoCs
pid Process 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe 3544 vlc.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1080 2028 012755ccc0c4c25632653658c117cc3a.exe 25 PID 2028 wrote to memory of 1080 2028 012755ccc0c4c25632653658c117cc3a.exe 25 PID 2028 wrote to memory of 1080 2028 012755ccc0c4c25632653658c117cc3a.exe 25 PID 1080 wrote to memory of 2780 1080 obadah.exe 24 PID 1080 wrote to memory of 2780 1080 obadah.exe 24 PID 1080 wrote to memory of 2780 1080 obadah.exe 24 PID 1080 wrote to memory of 2780 1080 obadah.exe 24 PID 1080 wrote to memory of 2780 1080 obadah.exe 24 PID 2028 wrote to memory of 3544 2028 012755ccc0c4c25632653658c117cc3a.exe 19 PID 2028 wrote to memory of 3544 2028 012755ccc0c4c25632653658c117cc3a.exe 19 PID 2780 wrote to memory of 3560 2780 obadah.exe 55 PID 2780 wrote to memory of 3560 2780 obadah.exe 55 PID 2780 wrote to memory of 3560 2780 obadah.exe 55 PID 2780 wrote to memory of 3560 2780 obadah.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\012755ccc0c4c25632653658c117cc3a.exe"C:\Users\Admin\AppData\Local\Temp\012755ccc0c4c25632653658c117cc3a.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\ÊäÊÇß ØíÇÒí.wmv"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3544
-
-
C:\obadah.exe"C:\obadah.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1080 -s 3121⤵
- Program crash
PID:2128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1080 -ip 10801⤵PID:4224
-
C:\obadah.exeC:\obadah.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2780
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4ec 0x1501⤵
- Suspicious use of AdjustPrivilegeToken
PID:4176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD5ade2d9fe0cecc4dffbaaf6fced5aeefc
SHA1345023485a17eae171d92cac174151f21530e452
SHA256fccb081986e5cf25e5f7ef9dd7bf9bb1da97f29aed3bdd7f8517f71b1d661c5f
SHA512c1d7238c9c763f8789a9e9a6526de03d73bed45fe4b59a732f92f16956ec9aef849828f59b88b6605d9f131c7d1322a613164c740435989681670568f5a15420
-
Filesize
386KB
MD5350844efb6685786fe56ec0587042216
SHA1511be8be567a919224395d46190acf547ece8efe
SHA256d70b2ade77c2d8f88ecbf550f43052187ff23cb00516007384ab717b267d73eb
SHA5127e40455374b41b9e35147c7878080cd1c4d6780662669c496573e8832097b072fd2e53146d1b84dec7fa0732efe26cb7b86225772ded98625f8a163bcc3c1a10
-
Filesize
381KB
MD5fcb8f6ea7ca8fd5392b695d750a4ac29
SHA1113c53056d6f4d127aecc3f5f5b4b206bcaa505c
SHA256af7d92398bd9d1bc6e0f492fb0e404eee11de8dc637cebf209fea4f149ae9e8c
SHA512b3e17ea510bd4bf32499aa2f28da9820a03990a678c1f76813ff9492a497d80f6afbc156f48ad66808ee12d642545815431e974b79fadbbc44981c064a2ddfb9