Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:16
Static task
static1
Behavioral task
behavioral1
Sample
762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe
Resource
win10v2004-20240508-en
General
-
Target
762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe
-
Size
4.1MB
-
MD5
cc8735f627d445498e226718a9f8c452
-
SHA1
1989922ad03ce41fd620ca8037a8ed4c288d31b3
-
SHA256
762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da
-
SHA512
74891582f528113479e5903c1b174ca62919454df0799f039bfd334cdf799a3732263f9d85cfc8c5616f836d2fc9303a77891f413c64876d1efbdbf10bfc7748
-
SSDEEP
98304:+R0pI/IQlUoMPdmpSpC4ADtnkgvNWlw6aTfN41v:+R0pIAQhMPdmF5n9klRKN41v
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
adobec.exepid process 2204 adobec.exe -
Loads dropped DLL 1 IoCs
Processes:
762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exepid process 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDot3N\\adobec.exe" 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBM3\\boddevloc.exe" 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exeadobec.exepid process 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2204 adobec.exe 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exedescription pid process target process PID 2580 wrote to memory of 2204 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe adobec.exe PID 2580 wrote to memory of 2204 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe adobec.exe PID 2580 wrote to memory of 2204 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe adobec.exe PID 2580 wrote to memory of 2204 2580 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe adobec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe"C:\Users\Admin\AppData\Local\Temp\762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\UserDot3N\adobec.exeC:\UserDot3N\adobec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD556ed9a8098b505b46a30bd59ed567576
SHA190eb1d16260a71ab1c11deb716c841c7dbd94a24
SHA256c9e0170b72e0045a0c94295aa4830c2b5d25e25b47dbbcb78eb58bc88328f415
SHA51259c3d08fc681756a76227fdcdab1d13e28fbe9f691296b0b7ae7071965d0c607e30f3651e9aed205b28a095110a35f0350a50d50e5bd18f419cd2270d312f507
-
Filesize
205B
MD567ce51f79c1d9526e94a7e05cd76ee5e
SHA1214d2f08e7b19ccf3222bf10ef734c0df75683fd
SHA2563b4419f0a276ea76d5e8f94dda514e460e442096a1a3a7a0d091390af3c29cce
SHA5126e6c08437fdd32b9e30dd95ff19b546fc2f18d4c1cb0337ac94ef6413824c7023721c583c79ca1728c5176d595c8fe7c8fcbd97d45b523c3e1919b2ab4e592c1
-
Filesize
4.1MB
MD5b3990fa3ba759e6ade94a7c319b1956c
SHA15d61ff7d710c99cd9277b82cd8e6d8bd06a7bfc7
SHA2564fe0a97045cee4279cb5647fac89a04297a37ce82b85f6161dcb8385f85583bd
SHA5129e0a15449bc31e726697279a671a86bb0da7f36b00e75b59ff0ebfdb5e5406afabcdb55e329a7ba0610b85ebb7de51260ded3b9fbee81e369d8ac27dfd828a43