Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 01:47
Static task
static1
Behavioral task
behavioral1
Sample
4179f6ff845787c1d207b6a6f6302540N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4179f6ff845787c1d207b6a6f6302540N.exe
Resource
win10v2004-20240709-en
General
-
Target
4179f6ff845787c1d207b6a6f6302540N.exe
-
Size
3.1MB
-
MD5
4179f6ff845787c1d207b6a6f6302540
-
SHA1
28e6f2db566261cb232f917d6f3124b5a4d3641f
-
SHA256
f3004e7d9434d1236876f916dc8c1284bd9a79d75509328c57879f4199db6ee7
-
SHA512
138859299ffdaedcd95a72bffad828bb1671f81b833e554c93d1911def86859528efdd2099f22a5817f6c6a8cf3bba333add7f925cafb14c91d5a85254883df8
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBQ9w4Su+LNfej:+R0pI/IQlUoMPdmpSpS4JkNfej
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2876 devdobec.exe -
Loads dropped DLL 1 IoCs
pid Process 2632 4179f6ff845787c1d207b6a6f6302540N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeIW\\devdobec.exe" 4179f6ff845787c1d207b6a6f6302540N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidFG\\dobxec.exe" 4179f6ff845787c1d207b6a6f6302540N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe 2876 devdobec.exe 2632 4179f6ff845787c1d207b6a6f6302540N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2876 2632 4179f6ff845787c1d207b6a6f6302540N.exe 30 PID 2632 wrote to memory of 2876 2632 4179f6ff845787c1d207b6a6f6302540N.exe 30 PID 2632 wrote to memory of 2876 2632 4179f6ff845787c1d207b6a6f6302540N.exe 30 PID 2632 wrote to memory of 2876 2632 4179f6ff845787c1d207b6a6f6302540N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4179f6ff845787c1d207b6a6f6302540N.exe"C:\Users\Admin\AppData\Local\Temp\4179f6ff845787c1d207b6a6f6302540N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\AdobeIW\devdobec.exeC:\AdobeIW\devdobec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201B
MD532670c2fd917e2a5dd7b2c99bdc9c8cd
SHA1f4c1f15ce2934d982c4d9b8599f0c9438875a2f2
SHA256ed7f480adb3aff31c9b5b5d0fa9df8edd91aa7108d04dbdfb8953a822b433a0f
SHA512b5eb2e3b95048c16fd517099fbfd1a7bf9faf99d1aa8baf11e2968c1827af0ba47ba0a1f9f50c0dfd7072a6ae44c277e2b496d8f475ba655df053653650e7b60
-
Filesize
3.1MB
MD5a3e4ce374800c82c44749459390d90b7
SHA1416ba74c091b8d2b41c25086e72f3c8cdabf031a
SHA2563cf02af75c43ee711ee8c4419d44ee92a8bb8e61f2e3ad0a44a0508e91cb5de5
SHA51200fa5cba0eafb29385f37af4db957721d80a9a02ee31ae5d8db0496df160d5564da55fbe4edb1ac48991b596e70ea8db4fe67a8a4c479cb3685905ece43329d5
-
Filesize
3.1MB
MD5a5e02e6fa5fb08ec0ea007bfcfd0adf6
SHA141093feaeb435eb4bd077084a48db8c1510f69de
SHA2562a70439f5d60fa57546ca82acf5bcc260fc920d20ca8f54d64a20ab206c40542
SHA512da6b91fa36fdffb248e1fa9e445576c7624a134c62c6eb398b172e05bb965bbb8bb7704005fe01b008c13e97b2cdbd7a6730f37f13293e0094be4516d15cbea9