Analysis
-
max time kernel
119s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 01:55
Static task
static1
Behavioral task
behavioral1
Sample
50b69055278acd61d583b1ee97970960N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
50b69055278acd61d583b1ee97970960N.exe
Resource
win10v2004-20240709-en
General
-
Target
50b69055278acd61d583b1ee97970960N.exe
-
Size
2.7MB
-
MD5
50b69055278acd61d583b1ee97970960
-
SHA1
688496cb8f3969c2477b5ca551b6ef04ae8c5eea
-
SHA256
fd2ed74bf18c5ae5cd0eeafb1b07b9bd94a43102adc1ba99ed8aacd60c58306b
-
SHA512
ef0a31729a7fd9449cafb413db752bed0c8d0253a6ebb081b9bae14fc7981b915231e6084b1612cf397dd55f8fad46a215fb1cee9a18494bfd03b6e877ca4c6b
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBs9w4Sx:+R0pI/IQlUoMPdmpSpe4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2012 abodsys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeNN\\abodsys.exe" 50b69055278acd61d583b1ee97970960N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintE2\\optixsys.exe" 50b69055278acd61d583b1ee97970960N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 50b69055278acd61d583b1ee97970960N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abodsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1168 50b69055278acd61d583b1ee97970960N.exe 1168 50b69055278acd61d583b1ee97970960N.exe 1168 50b69055278acd61d583b1ee97970960N.exe 1168 50b69055278acd61d583b1ee97970960N.exe 2012 abodsys.exe 2012 abodsys.exe 1168 50b69055278acd61d583b1ee97970960N.exe 1168 50b69055278acd61d583b1ee97970960N.exe 2012 abodsys.exe 2012 abodsys.exe 1168 50b69055278acd61d583b1ee97970960N.exe 1168 50b69055278acd61d583b1ee97970960N.exe 2012 abodsys.exe 2012 abodsys.exe 1168 50b69055278acd61d583b1ee97970960N.exe 1168 50b69055278acd61d583b1ee97970960N.exe 2012 abodsys.exe 2012 abodsys.exe 1168 50b69055278acd61d583b1ee97970960N.exe 1168 50b69055278acd61d583b1ee97970960N.exe 2012 abodsys.exe 2012 abodsys.exe 1168 50b69055278acd61d583b1ee97970960N.exe 1168 50b69055278acd61d583b1ee97970960N.exe 2012 abodsys.exe 2012 abodsys.exe 1168 50b69055278acd61d583b1ee97970960N.exe 1168 50b69055278acd61d583b1ee97970960N.exe 2012 abodsys.exe 2012 abodsys.exe 1168 50b69055278acd61d583b1ee97970960N.exe 1168 50b69055278acd61d583b1ee97970960N.exe 2012 abodsys.exe 2012 abodsys.exe 1168 50b69055278acd61d583b1ee97970960N.exe 1168 50b69055278acd61d583b1ee97970960N.exe 2012 abodsys.exe 2012 abodsys.exe 1168 50b69055278acd61d583b1ee97970960N.exe 1168 50b69055278acd61d583b1ee97970960N.exe 2012 abodsys.exe 2012 abodsys.exe 1168 50b69055278acd61d583b1ee97970960N.exe 1168 50b69055278acd61d583b1ee97970960N.exe 2012 abodsys.exe 2012 abodsys.exe 1168 50b69055278acd61d583b1ee97970960N.exe 1168 50b69055278acd61d583b1ee97970960N.exe 2012 abodsys.exe 2012 abodsys.exe 1168 50b69055278acd61d583b1ee97970960N.exe 1168 50b69055278acd61d583b1ee97970960N.exe 2012 abodsys.exe 2012 abodsys.exe 1168 50b69055278acd61d583b1ee97970960N.exe 1168 50b69055278acd61d583b1ee97970960N.exe 2012 abodsys.exe 2012 abodsys.exe 1168 50b69055278acd61d583b1ee97970960N.exe 1168 50b69055278acd61d583b1ee97970960N.exe 2012 abodsys.exe 2012 abodsys.exe 1168 50b69055278acd61d583b1ee97970960N.exe 1168 50b69055278acd61d583b1ee97970960N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1168 wrote to memory of 2012 1168 50b69055278acd61d583b1ee97970960N.exe 89 PID 1168 wrote to memory of 2012 1168 50b69055278acd61d583b1ee97970960N.exe 89 PID 1168 wrote to memory of 2012 1168 50b69055278acd61d583b1ee97970960N.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\50b69055278acd61d583b1ee97970960N.exe"C:\Users\Admin\AppData\Local\Temp\50b69055278acd61d583b1ee97970960N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\AdobeNN\abodsys.exeC:\AdobeNN\abodsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5b7624673ea883950bc0ca27aa32cb1e6
SHA1a48d5dd27e98dab31699deed95801d70a87534c1
SHA256572abab0fa079d57d727ca01d297fd679ef2647b44530228a21161587154a542
SHA51283769862cdf89d321304bfc0b83974f9f0c62f58a483c60af8793ee0cd5ffb6772049f135ff1f8527122d37cd56b747724f7ec7f3e06df5fa26e3caa9a89dc5a
-
Filesize
342KB
MD55ca82217c7a6c70c5a767fa3f0ba4d12
SHA1d61947c5c54ec5f788c1b3cc94439e5063c8937f
SHA256610714ba9d7e8d1e0ee41a8b8f8d5a35317a10f612fa0989d030fc9306e97454
SHA5125638ba7d2bdeed4be71e973590d4536320cb161e9f282a03a69f02ba4532478f7afb33b90d42ce2888422ea3c47b2b8e51e9ed36d72b8372e4f9bc09e5c0e4cf
-
Filesize
2.7MB
MD55d0f7ec6835cefa25e1262cd9bd29f49
SHA101d1c7a17ac8fc6c4975c20ad92f636fac56089e
SHA256fd34ef35631a36fd9f82de009d6b9427c13e4af4f746767b02b55bbbe8727274
SHA5123f8730c2787737397948d14b6ef923de844798ff24792af171ca8d3d2ba268ae8fa0882f1e6e084fccaa1821be855e600906fc8fa0a04b1f4e010e3c8063a1f6
-
Filesize
201B
MD5ceb9608b2b139088d13f14373ed477bc
SHA1bf10e4104652bbb00741063399b365b83545074f
SHA256f2c4f7e3b1551cdb1a07d31ea80cc21997119609a55fc6f7a9ae05feb1e0f918
SHA5125a65b252bb5856eb7e717a9c4db92274f09cc4435ed51665d6b661784315b10b0d146d771cddf241f1f6b7324f58e15f3b2b920e46a5ff67dab14e5e0013a7de