Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 18:27
Static task
static1
Behavioral task
behavioral1
Sample
09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe
Resource
win10v2004-20240226-en
General
-
Target
09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe
-
Size
4.1MB
-
MD5
9af8cd06eda45dda6af626f5e1bb4876
-
SHA1
8041d152ebf87ac6047a43aad9740b20c10c907b
-
SHA256
09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e
-
SHA512
95e142354b99bc590453cf268d8c56c6df19fe662c3b5d272ee5e42a44678df189c2c51d9e8245762e5c85563454919f6d618aae09f8ee3b42e4c1ed9508718c
-
SSDEEP
98304:+R0pI/IQlUoMPdmpSpw4ADtnkgvNWlw6aTfN41v:+R0pIAQhMPdmj5n9klRKN41v
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
adobloc.exepid process 4604 adobloc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvL9\\adobloc.exe" 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBUQ\\dobxsys.exe" 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exeadobloc.exepid process 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 4604 adobloc.exe 4604 adobloc.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 4604 adobloc.exe 4604 adobloc.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 4604 adobloc.exe 4604 adobloc.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 4604 adobloc.exe 4604 adobloc.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 4604 adobloc.exe 4604 adobloc.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 4604 adobloc.exe 4604 adobloc.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 4604 adobloc.exe 4604 adobloc.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 4604 adobloc.exe 4604 adobloc.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 4604 adobloc.exe 4604 adobloc.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 4604 adobloc.exe 4604 adobloc.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 4604 adobloc.exe 4604 adobloc.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 4604 adobloc.exe 4604 adobloc.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 4604 adobloc.exe 4604 adobloc.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 4604 adobloc.exe 4604 adobloc.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 4604 adobloc.exe 4604 adobloc.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exedescription pid process target process PID 5080 wrote to memory of 4604 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe adobloc.exe PID 5080 wrote to memory of 4604 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe adobloc.exe PID 5080 wrote to memory of 4604 5080 09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe adobloc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe"C:\Users\Admin\AppData\Local\Temp\09421bc6429c5804e1948ae9dc4c45b2583975164583e08f2b968106f0ef6b0e.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\SysDrvL9\adobloc.exeC:\SysDrvL9\adobloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4604
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3776 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:81⤵PID:3752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD5df4bf3eebb9fd7521cd115f6e818df71
SHA10a14fcc11d5715e8c4715fcba9675ed2a0958701
SHA2564597dd996212ba3e89e44c2d403cb7952927407280ac5c20a1a30a69b45ab56a
SHA512aa965d669aa51dc4836cde2f71fb1ca2573c5fc7a68fcefd354f76d5634a261708c746db126120aa25ce6d91d7d0bebe19c3e9a675773da6a037a287499fe624
-
Filesize
4.1MB
MD5635afbe2de581c7339a25a6cf21b6a6e
SHA1ba7fcc8b9a6512a9f2a2418e509d2e6ebba0e7e7
SHA256d330cf75b69ae857fe5018fea254e66b6da9b778382f8f4878f1a4ef57be753e
SHA512c23faa15aadb3241987a0012d06da27b8fffd332f8062f0db715a71197085de2e2e291888818c75613aa2ba80377663334833b6b92a3ff04d0752cd933f81050
-
Filesize
201B
MD5d15b86fa4a65f5a73bbb1985df042be3
SHA1306b20014f182f12a1924adbd7b1c46e0b8cec19
SHA2560501e90008ad56759efc75890869233dc5f857810d53974ff6c0c7cf3b5bbd4b
SHA5123a8e8a31b5f9cf868dcb81e2a66bd122990245903bf4a1676daa12e48a14f6fcd4f140f7cca95333c4120cf0e3ec96bfa6a5615800cab457bda83922ca9bba93