Analysis
-
max time kernel
119s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2024 07:14
Static task
static1
Behavioral task
behavioral1
Sample
85c99138156e9701c8baeac269b0ac90N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
85c99138156e9701c8baeac269b0ac90N.exe
Resource
win10v2004-20240709-en
General
-
Target
85c99138156e9701c8baeac269b0ac90N.exe
-
Size
3.3MB
-
MD5
85c99138156e9701c8baeac269b0ac90
-
SHA1
4403f9027960f24c39d2e0087efd68341b706de1
-
SHA256
8ddeb7332a07e58355feee924497f8b6e59108d94cf4a2dd010e24c6e86ab3a9
-
SHA512
06ae8c36b9be07f9bc5f9c43df7a7a9840b97261baef37be6bfd34f8d83046fbf7d8ee04d32b2fcfa0f8d4b11e14d628b3995421fda6c7b4b2e95fe25c2ed7d1
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBU9w4SLDtnkgXL35xZzlPBq4:+R0pI/IQlUoMPdmpSpO4ADtnkgvNW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1256 abodec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocKB\\abodec.exe" 85c99138156e9701c8baeac269b0ac90N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Galax49\\bodxloc.exe" 85c99138156e9701c8baeac269b0ac90N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3100 85c99138156e9701c8baeac269b0ac90N.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 1256 abodec.exe 1256 abodec.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 1256 abodec.exe 1256 abodec.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 1256 abodec.exe 1256 abodec.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 1256 abodec.exe 1256 abodec.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 1256 abodec.exe 1256 abodec.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 1256 abodec.exe 1256 abodec.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 1256 abodec.exe 1256 abodec.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 1256 abodec.exe 1256 abodec.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 1256 abodec.exe 1256 abodec.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 1256 abodec.exe 1256 abodec.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 1256 abodec.exe 1256 abodec.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 1256 abodec.exe 1256 abodec.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 1256 abodec.exe 1256 abodec.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 1256 abodec.exe 1256 abodec.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 1256 abodec.exe 1256 abodec.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe 3100 85c99138156e9701c8baeac269b0ac90N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3100 wrote to memory of 1256 3100 85c99138156e9701c8baeac269b0ac90N.exe 90 PID 3100 wrote to memory of 1256 3100 85c99138156e9701c8baeac269b0ac90N.exe 90 PID 3100 wrote to memory of 1256 3100 85c99138156e9701c8baeac269b0ac90N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\85c99138156e9701c8baeac269b0ac90N.exe"C:\Users\Admin\AppData\Local\Temp\85c99138156e9701c8baeac269b0ac90N.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\IntelprocKB\abodec.exeC:\IntelprocKB\abodec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD5b98a0b10c804d3a715e9fbb632233d9f
SHA121db23000d52ca27b53568df7bf01f82026a0338
SHA256b911fc334baadea53baa072127f0a90390dbed9cde5897870a6c194c2b020790
SHA512fea2ed8a4b0aa19320880f564665a34d469e631e1d72e0f72df5d67e1c3324411e4ff4537e998a2089257952175bda314f850b5e47140e8737730b88b46f44d3
-
Filesize
3.3MB
MD5aecafb5e4c8715009766078df05f3c29
SHA1532f53728823331b034a4e8c9eccb8d6f0e11ab3
SHA2568a074faa2f676a150bebde88674e49df6dc2cfbf7c37f422610a97db98192e08
SHA51213a886a1e81bbb09cd11d8bc9a7a1f178b537fd543f158d41a9ea6c64baa6568f3d1114db7c9e612e3df87317a297fc3857db45e4ea78efe6f610cfd45ef3fb7
-
Filesize
204B
MD5770d7742e4e2ba845a337002dd797f07
SHA14d36a3cfd5f38c0c4f468ee8056a28f12ec16c31
SHA2567669862b094b2656b5af33fcb5d7c53ab52f7dcf91753e6b097d135b3bc6a4b8
SHA5120c1e3afc067e4c4101a0e64356df9ba7ed8bad07e93a148a2fa90b41e2152b0581ce9f26ee675f47790c0d4c447a2e321529e959ed8ab12ae7dc42f270279190