Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 02:12
Static task
static1
Behavioral task
behavioral1
Sample
afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe
Resource
win10v2004-20240426-en
General
-
Target
afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe
-
Size
2.7MB
-
MD5
cb49ef5518dfa3dcf902c5b9fdde2e45
-
SHA1
3249053aa5c45eb8fdf169d4290fa16d7e0ddd73
-
SHA256
afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341
-
SHA512
ae87b270940101ce6ca38fcfbab3028e2a6130a1b353b6693abac19baefa35c9cd51d9a755c33b0a860e21b695190826d4e6eed5b3c383a33d7a81b16772b903
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB69w4Sx:+R0pI/IQlUoMPdmpSpk4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1032 abodloc.exe -
Loads dropped DLL 1 IoCs
pid Process 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvXC\\abodloc.exe" afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidHX\\bodaloc.exe" afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 1032 abodloc.exe 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1032 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 28 PID 1712 wrote to memory of 1032 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 28 PID 1712 wrote to memory of 1032 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 28 PID 1712 wrote to memory of 1032 1712 afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe"C:\Users\Admin\AppData\Local\Temp\afc779712b01eb6aec174a2da6cbf5739cfbd3a866eabde5dc0fd527c42f7341.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\SysDrvXC\abodloc.exeC:\SysDrvXC\abodloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202B
MD5473cc99ad7480bf85ca0e56c67d9d0cd
SHA1c2b7ec950a64841d26fd62a28cd877b9b0492fbb
SHA2569e97143f71fe9a49ba5acb051fbf44c64ac8c6bba05e2fd9b6fcc4f9ac214927
SHA5125890b8652bc9c4928a062c6fafaffb085d8d6352a9a73e6881d04a8d1d3915ad6f4eff21f0e6d384e70d0f1039b65c11f7ff5473e0a45d5f84409e6541664a74
-
Filesize
2.7MB
MD50d59bcf29a8179df342324f8b3e09ee8
SHA1f26a29389d4f7912210175e8da2b4689a3c69ed4
SHA2563c6425484c0271a5ec61546d3014691a1f297f193e7ead8ca1f8d1b11ec9e0e2
SHA512da7535903efad9c8a5e71af702179747ce9398aacbf013be283245c95625026c2bdf709fce67a76fae94a33a72240033dc23871428d48c637680058de025a0fa
-
Filesize
2.7MB
MD51fc89a2fd9dfa1795079e72d7278eb86
SHA1aa72cd40dbed44d3c11fce89a5247c6af9d1f816
SHA2561054f6e5deae17fe40574c31ed501705d55e33c5827284504ad2c9495ba13738
SHA512a0341ac9111b97d9c71aeee360f620d6a0350d97b0a1306c3c7074639a9354ffe2d14980e437fb23656b95dde0f16f7186accd5609f58c6d71da27525130fd1d