Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-04-2024 06:21
Static task
static1
Behavioral task
behavioral1
Sample
37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe
Resource
win10v2004-20240226-en
General
-
Target
37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe
-
Size
2.7MB
-
MD5
26ca5c12a12b97916dcc72489073dfab
-
SHA1
5438c3151794e6a1601934773dcb2e3bd7b7686b
-
SHA256
37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139
-
SHA512
2f70995483bf30a91229c6e54c0ce9d63bb0ce5a2519ca15976800f0184a91f83d7f4905e0fefc3a6f74d7606431574068e4113d9ce15729b92ec5265c0e0e61
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBa9w4Sx:+R0pI/IQlUoMPdmpSpE4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3808 xbodec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeMM\\xbodec.exe" 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidB9\\optiasys.exe" 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 3808 xbodec.exe 3808 xbodec.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 3808 xbodec.exe 3808 xbodec.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 3808 xbodec.exe 3808 xbodec.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 3808 xbodec.exe 3808 xbodec.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 3808 xbodec.exe 3808 xbodec.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 3808 xbodec.exe 3808 xbodec.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 3808 xbodec.exe 3808 xbodec.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 3808 xbodec.exe 3808 xbodec.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 3808 xbodec.exe 3808 xbodec.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 3808 xbodec.exe 3808 xbodec.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 3808 xbodec.exe 3808 xbodec.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 3808 xbodec.exe 3808 xbodec.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 3808 xbodec.exe 3808 xbodec.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 3808 xbodec.exe 3808 xbodec.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 3808 xbodec.exe 3808 xbodec.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1596 wrote to memory of 3808 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 92 PID 1596 wrote to memory of 3808 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 92 PID 1596 wrote to memory of 3808 1596 37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe"C:\Users\Admin\AppData\Local\Temp\37c3f42d9eedbe62c9b66dbca3abc12cf5f47a38a008cebf30c3b341a087e139.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\AdobeMM\xbodec.exeC:\AdobeMM\xbodec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5248 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵PID:4532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5ec004de48573e68dcaf3fd4a938479b0
SHA14eef49a6ec4bc15cb0b31659b1fac8e4af155943
SHA2560cdd58edc81d49cc5a214fcc0bde177f93fac422aad014dad8eec7045bd05dd6
SHA51285cc8fbc4a4fcccde693c15274f51dea87451eb6b6776a3d3b1bce3ac1202aee0111d7e7ec45999f2edc8edce33ca9daec5c1f6ac8ee1114b0ce6b644c4685b1
-
Filesize
199B
MD57a7fc983be635cca4d8be5d40f6c6674
SHA109448fb56248ceb54bc4fe1e22c3668f46ae31dd
SHA256dbe08c8bf1411c9b5da8295249b54d6fe7e7ca98bb5b9735899b1527695f356f
SHA5123f76ec26a3a517148f3ecb1fe13208350c0502346a64b0c7a4059049b6a17ba99651bdcc3484a3963effca9a0f53fa09d4f9fbd575bfa09d3efbbc21713bd7c8
-
Filesize
2.7MB
MD5476966823a6d8b60d06a623581ee5385
SHA1096faf0f8f491452b2f6906a4947145b0b374420
SHA256e9d960c02792243dd457df6508354a5c73747567d231459a9842de8aea0b25e9
SHA5127aa0423c6263ab00565d8d82522682b1b57cc844d892d004db5dc38be0f0fa25293d6acdd7a0da3557250f296be3272070dde352d888d8743946cad906d765ee