Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2024, 23:14
Static task
static1
Behavioral task
behavioral1
Sample
7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe
Resource
win10v2004-20240226-en
General
-
Target
7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe
-
Size
2.7MB
-
MD5
9f53088c6f9267219159053154dae9ea
-
SHA1
7013b61682343854d4cfcb247889c9bbff75c5cd
-
SHA256
7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2
-
SHA512
53eec167c886f1bae0bb6b8dcb6d7ef4fa46ba96769192d71c27b126bff2298a54e3d5ce5506c42522f51a8202d087994b0ce216546bc8463f0d05f1b5f2e537
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBf9w4Sx:+R0pI/IQlUoMPdmpSpD4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4860 abodec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotBI\\abodec.exe" 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBHM\\bodxec.exe" 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 4860 abodec.exe 4860 abodec.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 4860 abodec.exe 4860 abodec.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 4860 abodec.exe 4860 abodec.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 4860 abodec.exe 4860 abodec.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 4860 abodec.exe 4860 abodec.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 4860 abodec.exe 4860 abodec.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 4860 abodec.exe 4860 abodec.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 4860 abodec.exe 4860 abodec.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 4860 abodec.exe 4860 abodec.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 4860 abodec.exe 4860 abodec.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 4860 abodec.exe 4860 abodec.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 4860 abodec.exe 4860 abodec.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 4860 abodec.exe 4860 abodec.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 4860 abodec.exe 4860 abodec.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 4860 abodec.exe 4860 abodec.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1132 wrote to memory of 4860 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 89 PID 1132 wrote to memory of 4860 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 89 PID 1132 wrote to memory of 4860 1132 7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe"C:\Users\Admin\AppData\Local\Temp\7bac44ad28971f81d7e6ac53ce2ef4f987b9099f4d6c5db2811cd2b8449269a2.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\UserDotBI\abodec.exeC:\UserDotBI\abodec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5f50eb1ebd4ee701879e8c03d064afd58
SHA1eb1a7a67b8bd0977d53d594c2f9e43d31f5024cb
SHA256b950c10082662b6a53bba8d6f2426a5786dc166c58941b989979d27d12ef6ce8
SHA51213888808972f1e28088b943c0a3505e84874098b9565d4305bfaffa0c3b8666d03cb5088f451fcbfb031711222f7ae409eccb1c79d71bde45c5ad55d3a643945
-
Filesize
2.7MB
MD57d04f75fe05381da7f2cc279350928e9
SHA13b9230c8efbdb9b49151d35c7f0b4e9ab64ada77
SHA256be08ba04444628053e16674daaa90c5400b1bcbf4fe2f78586a20ab929512a60
SHA512a70700b19845947d6e1fb3978c0ecc67d0874bd865ebbd969b55c3be2a9ca20cbc1df8768e2c50fe83f4cb08b6f9eccb475db8f1e42857c80f6258a993963fbf
-
Filesize
2.7MB
MD5ca304aea38439fdafed05137a76afa13
SHA19b5cbfe7b1b852b1d5462e4e953a7bc856f802e8
SHA256103ac0e7e8cd37e0e49cb860ee54418a07bf599757d9e04c0c71137c4f7078a7
SHA512ec57e1db7aad197f1da0af2d85347ab42b45c40fd033d5454ba9a41b2613f86a20bea017256335d380adfc405a077d60f0ae4daabe861ce6e044c3941a2ec4af
-
Filesize
202B
MD58a73e69819f70e3a1ad594fc8dceda03
SHA1cc7cdbb795b334d78e9a3e53959c693960981b1c
SHA256ae0778497f282c595bf6765db9aece411429b54c30aa71c9071a67e57be2c145
SHA51257ca3f0e27bb9128e05128015a6553daf7226e7d759a751ce903fdfd3b614420091c0ff7736cb516e93d8df5fe7a48e37280b161e2ececa18b162d07738c42ad