Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe
Resource
win10v2004-20240508-en
General
-
Target
76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe
-
Size
4.1MB
-
MD5
f5f093d8abee3daf51d723cf46340aa9
-
SHA1
3b7e0a0ec232d31f6f32bf8e3b100eda6b7770f3
-
SHA256
76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a
-
SHA512
41d4a5ca07059d65a50907cca6527b3135bb26e18684143ab039b81d6aba5423efb9384ac5872f0a32140505f9e657c39486e1d6f0dad619a4c09eb6c382a31f
-
SSDEEP
98304:+R0pI/IQlUoMPdmpSpU4ADtnkgvNWlw6aTfN41v:+R0pIAQhMPdmD5n9klRKN41v
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2572 adobec.exe -
Loads dropped DLL 1 IoCs
pid Process 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesFH\\adobec.exe" 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZ60\\dobdevsys.exe" 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 2572 adobec.exe 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2572 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 28 PID 2124 wrote to memory of 2572 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 28 PID 2124 wrote to memory of 2572 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 28 PID 2124 wrote to memory of 2572 2124 76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe"C:\Users\Admin\AppData\Local\Temp\76fe425e228b2d552190f01af817f873990e57ee03e7ba51caf824809943e05a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\FilesFH\adobec.exeC:\FilesFH\adobec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD5a37586eae1fa086dbc92ed8744a7a1b2
SHA18c9d192b2b6d65b22389afa0e7d4d2ce75211626
SHA25634e359d0be59f8981e56cd8de7f09c8531b0a287ade17a1304ad1f929f5d39a5
SHA512bc9ec5b20f4e59a6ec3d400a1dc94820d1d5765095fcfb7a4c166b581705480717325e0f20c11ce6100add6e4a35c5367d5d66b531f5f20afb83c6f94a131454
-
Filesize
202B
MD5e38472fc33032d3d240eea5dbdddff4e
SHA101e50e445e1479942020295a5d0fe9e9a8d1edca
SHA25654c1abb14e4ab18035d88650980d2513355152d759efd80c8297d774e36570fc
SHA5120b55e67f1eadb42ca829c3ad2b9dad73da55513fad2a7b59eb133cd786f1d21585555e03ace40cb7e99980b0ca2e956c046f59538ea53756a7ebf5b9d0779acf
-
Filesize
4.1MB
MD54c6e1ab96ae86283f0aed9d76c8f99cf
SHA188c36ba15c23746ae239cccff57e3254d94b14fc
SHA2562499323c83bec06adda995cdc1e7c3e58ee708c263c43676b8950de3338a58f7
SHA5126ff3649b187c895cb17db627d813b299d8aec102f1d15fdf54892ee7a290069df01e453735331cbf5a195125a2105571eb80f4a09572d23c76a07e2382c9748b