Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 11:34
Static task
static1
Behavioral task
behavioral1
Sample
c9f2346f4391b19bbcb7aad5546387b0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c9f2346f4391b19bbcb7aad5546387b0N.exe
Resource
win10v2004-20240709-en
General
-
Target
c9f2346f4391b19bbcb7aad5546387b0N.exe
-
Size
2.7MB
-
MD5
c9f2346f4391b19bbcb7aad5546387b0
-
SHA1
883f503130811e03daced1c858a4a94727afad0b
-
SHA256
98053147d8c4a10c374e40c45922beddc21dac8817fa1be9921fbcf63fb9980d
-
SHA512
53adbafae6552e08cdeda72dd7331d16e193f23a728b5acfb7b5fe771c8b2f62d8e7363ecb13e3c99a365e99eb57a560a7674c38ca49f5520a9c347c8a2748e1
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBA9w4Sx:+R0pI/IQlUoMPdmpSp+4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2396 abodec.exe -
Loads dropped DLL 1 IoCs
pid Process 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotYD\\abodec.exe" c9f2346f4391b19bbcb7aad5546387b0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBPP\\optidevloc.exe" c9f2346f4391b19bbcb7aad5546387b0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c9f2346f4391b19bbcb7aad5546387b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abodec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 2396 abodec.exe 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2396 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 31 PID 2036 wrote to memory of 2396 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 31 PID 2036 wrote to memory of 2396 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 31 PID 2036 wrote to memory of 2396 2036 c9f2346f4391b19bbcb7aad5546387b0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9f2346f4391b19bbcb7aad5546387b0N.exe"C:\Users\Admin\AppData\Local\Temp\c9f2346f4391b19bbcb7aad5546387b0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\UserDotYD\abodec.exeC:\UserDotYD\abodec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD57ef033219f4b31a7402b740603fe3664
SHA163562904085c7f934053b4fa0cca79f4a7b7aec6
SHA25654f8625d5639d8d2d105536b166c3d581364c144d4f6b432bb7b22ebb553acbe
SHA512597e00b53fc95645d526078a933bb81d96327d5ea7c57c61736fca29488c92723b71fe51ff77ec37239f22c5d3b47f3b83b16c13ba71e53df9e35610fccac597
-
Filesize
203B
MD5a3c830645fa6137d5f92d144833d5419
SHA17724fe12c2bcfdf929dfe103176b3d4bd994b316
SHA2568926af191f095a161c97198f1436fe68a8307f033dc1df4bbcdd5e5cbf880fa1
SHA5121930d9ff3ea24d607105443d464e6dd9f0f34a9fce43abef611a9b0e373ecd478954222a479b8d81924441f7be4164325158e386a404138aee3a1346ee6d1d74
-
Filesize
2.7MB
MD5b88f27a7ba4e3fb7fd4c97cfa03c724e
SHA12b961b6e05bc6fc52ff744a54e5e575325fd7287
SHA2567202e6132522b8477d779d21b779ae46d36e627acfb8326fe38d4e863ab635ba
SHA51264ace3aaeb8f217d6b508aeea5cb0c4bc7649d16a2bf73a2ababb1588bdc0fd279f4689fca7cf35e44e4ec7c525c81dd33fdbbdaac19d56c43dc171d26422eb0