Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 18:58
Static task
static1
Behavioral task
behavioral1
Sample
166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe
Resource
win10v2004-20240426-en
General
-
Target
166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe
-
Size
2.7MB
-
MD5
0f1549d34feaa6a20c411e205df2ac28
-
SHA1
e01eee6eb17961f5ee4d5f07667014072bd09452
-
SHA256
166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a
-
SHA512
728f1df304b76320fd16090e239e5ac12a708a8cb816208af556b771a60ee8a4d236896129e64f88bb9725e57a6e0a72520f48027356d0f210859d7fa997e382
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBn9w4Sx:+R0pI/IQlUoMPdmpSpH4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1980 adobec.exe -
Loads dropped DLL 1 IoCs
pid Process 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeY8\\adobec.exe" 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxV4\\optiaec.exe" 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 1980 adobec.exe 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1980 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 28 PID 1732 wrote to memory of 1980 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 28 PID 1732 wrote to memory of 1980 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 28 PID 1732 wrote to memory of 1980 1732 166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe"C:\Users\Admin\AppData\Local\Temp\166fc2e0d819347172df8fc7a1716ea2939f39907de79878de2a7e69a21e314a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\AdobeY8\adobec.exeC:\AdobeY8\adobec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD57fb3aa93a8ed965aab9859052d8f2cf5
SHA102e1081529e187b80f09ec1a451b8f7409e13a5c
SHA256b25ec76b02381e24f67e14f5a55f3eeaaca52e70e38f614a8b53f1732cf505ec
SHA512335398a174b9bd4d33d60030d29e29fb7448508c1f99807445777380d2c103f4f5f3e76fbda9e15fe00f747c018bb57b788f31f835397eea317fc0f278a1b8eb
-
Filesize
203B
MD50d24b9b9e6790b1d429288f7f8ec656a
SHA19384d4b341ec47e6e7b0ebbff6be41f255742b0c
SHA25684b5ca1de418e883ea796e36741cd889ff1bbe656e765020956ccef79a676103
SHA512ae9dd6ed81fb4f4934c656d8a8bc8f8492edad8fad0b38c84bc0ff462522717129d134a6204905014e3b36e4103fcb6a8c37a0347cee7a3559049b87751bfa46
-
Filesize
2.7MB
MD5406c5aec286b8e5bc4dce1fdf33cd8cb
SHA1a6bd337f50868a489ad9b8b8828a761a46bdb2d2
SHA256a8b9773987827cc6954bfa317dc663961127b912bbaabfbe9e462893303e80dd
SHA51239471f9b5033445fdae8d9f675e6648c90eb05322a46fb3091c45914bf5eabaae9e75bf3dc1262428274e70cf640b471392325127295254ca606ff190bb916de