Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 03:47
Static task
static1
Behavioral task
behavioral1
Sample
d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe
Resource
win10v2004-20240426-en
General
-
Target
d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe
-
Size
2.7MB
-
MD5
70943ee260ee8837d0e79c43c41e060f
-
SHA1
20de89048527f4742f1ef0605bfbcc19999a8e4b
-
SHA256
d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea
-
SHA512
6ead323f1b0f238cd4065915836e5207d715ea2b81ba174f9281b83230409a9c9de43e0ce39009cc7b2944cee83bb8a670191dd9214ea6df2264a3adf72adf18
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBW9w4Sx:+R0pI/IQlUoMPdmpSpk4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
xdobsys.exepid process 1532 xdobsys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeX2\\xdobsys.exe" d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidUZ\\optiasys.exe" d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exexdobsys.exepid process 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 1532 xdobsys.exe 1532 xdobsys.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 1532 xdobsys.exe 1532 xdobsys.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 1532 xdobsys.exe 1532 xdobsys.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 1532 xdobsys.exe 1532 xdobsys.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 1532 xdobsys.exe 1532 xdobsys.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 1532 xdobsys.exe 1532 xdobsys.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 1532 xdobsys.exe 1532 xdobsys.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 1532 xdobsys.exe 1532 xdobsys.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 1532 xdobsys.exe 1532 xdobsys.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 1532 xdobsys.exe 1532 xdobsys.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 1532 xdobsys.exe 1532 xdobsys.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 1532 xdobsys.exe 1532 xdobsys.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 1532 xdobsys.exe 1532 xdobsys.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 1532 xdobsys.exe 1532 xdobsys.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 1532 xdobsys.exe 1532 xdobsys.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exedescription pid process target process PID 2208 wrote to memory of 1532 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe xdobsys.exe PID 2208 wrote to memory of 1532 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe xdobsys.exe PID 2208 wrote to memory of 1532 2208 d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe xdobsys.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe"C:\Users\Admin\AppData\Local\Temp\d467fc1822c332b85f6187531434ea91f4b84d5fd50d25b42b3adcf1a954a5ea.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\AdobeX2\xdobsys.exeC:\AdobeX2\xdobsys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\AdobeX2\xdobsys.exeFilesize
2.7MB
MD55ea259509a2f04c9ca82306394681e37
SHA1a86ac0e4fb732fa0a395b284d292fa87dbf67a35
SHA256089fef6fa5dad1b871346bfa7b60cc82f7504aa8b65e9ab9cbb28a2acb49323c
SHA51210c8b87a6dbbe90c55c07dc3ca53745fc02d4606e65fa14e13c83c9cbfefa596e0c1b40d705c5661dd794a067adf92c44adfca272e48053ac747a3bec6829f5c
-
C:\Users\Admin\253086396416_10.0_Admin.iniFilesize
202B
MD548acc867e669ad447f09977735ee5282
SHA1f8a67d415c5968e828c46caf07ab80d791904390
SHA256277b3fdfa509f296e35d0f9f3a10da3b2b83350b0892da7d400658ce154ee140
SHA5122fb3ddba8b1cbcf6606d0f1c6a8b418ba947004b50af4ebd30ed10b90bc4b1f7e5310a4a532782166a64ebf02f91b81d9551003c21789efc8de79a2e6e716492
-
C:\VidUZ\optiasys.exeFilesize
2.7MB
MD52c0c7bfc03e7fd7e449f6b23c4b51d6f
SHA1cdf90fac22bd94dfcddc62605760f7ac65144781
SHA256308fdf1b43110106739af409d7abdcc762d25905d88712e835d251de9c681583
SHA51221bfb9e4f4a6c18ee532c3f7882340c9a644d9fb14d593308932b735649ca2f6606645049ad5bef8b55f74a5e6fd1c169344b398d0ca708a7b8fb61e698078f7