Analysis
-
max time kernel
119s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 15:09
Static task
static1
Behavioral task
behavioral1
Sample
22e19e5ffef48f570272fa10a8323220N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
22e19e5ffef48f570272fa10a8323220N.exe
Resource
win10v2004-20240709-en
General
-
Target
22e19e5ffef48f570272fa10a8323220N.exe
-
Size
2.7MB
-
MD5
22e19e5ffef48f570272fa10a8323220
-
SHA1
3ee2b9852b6153ff8ece701483518be61efe313b
-
SHA256
7058cb79aaa703aa5f95a4665df0816d6f784c96da699227811009a9ebc9471f
-
SHA512
90acd7a9d010cfa6c3a1e68efad08a6a006276f90e2e4e9f3cd91b9d76589d480311957eb5086d22fe27c41ee729ccabff9d5c19a32adb9c37f6a9c5d305f61c
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBQ9w4Sx:+R0pI/IQlUoMPdmpSpe4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 732 adobsys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvWI\\adobsys.exe" 22e19e5ffef48f570272fa10a8323220N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBOQ\\optixloc.exe" 22e19e5ffef48f570272fa10a8323220N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22e19e5ffef48f570272fa10a8323220N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2512 22e19e5ffef48f570272fa10a8323220N.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 732 adobsys.exe 732 adobsys.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 732 adobsys.exe 732 adobsys.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 732 adobsys.exe 732 adobsys.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 732 adobsys.exe 732 adobsys.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 732 adobsys.exe 732 adobsys.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 732 adobsys.exe 732 adobsys.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 732 adobsys.exe 732 adobsys.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 732 adobsys.exe 732 adobsys.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 732 adobsys.exe 732 adobsys.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 732 adobsys.exe 732 adobsys.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 732 adobsys.exe 732 adobsys.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 732 adobsys.exe 732 adobsys.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 732 adobsys.exe 732 adobsys.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 732 adobsys.exe 732 adobsys.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 732 adobsys.exe 732 adobsys.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe 2512 22e19e5ffef48f570272fa10a8323220N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2512 wrote to memory of 732 2512 22e19e5ffef48f570272fa10a8323220N.exe 87 PID 2512 wrote to memory of 732 2512 22e19e5ffef48f570272fa10a8323220N.exe 87 PID 2512 wrote to memory of 732 2512 22e19e5ffef48f570272fa10a8323220N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\22e19e5ffef48f570272fa10a8323220N.exe"C:\Users\Admin\AppData\Local\Temp\22e19e5ffef48f570272fa10a8323220N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\SysDrvWI\adobsys.exeC:\SysDrvWI\adobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5257872c63d3458cd8b28354e502fb21d
SHA110495775eeb25349b1a6e7f4fb1b3ff2b9489646
SHA2563156a201a1973344424ee78365796f27d21220f59ce6c5587b46d80837e0ea09
SHA512cfa2137ad8844438f4f8f768105040753b99113ebde8b63e639ff7f2dfdde6817e5ba6cda98c06b131b7311f995230f3a53ec7479607b10e894e21ef57cb5355
-
Filesize
2.7MB
MD5b5a94225c12f65d2a0a5c2661b9dada6
SHA1fc8c408a0cc97bc1cad8176f4a69bb999d716993
SHA25608b16017c2394216a5c5de661eb6cc8fb47a0ea3fc492221a2890318db3e8759
SHA512b33c076d975ffe3bc0da4cb170efff27fbcd6a78688ab152d5cd9bb79ecd42807b79307ec578bd58132da704d16e0cd7487a9eae0ca93793a16f3363201a9acd
-
Filesize
205B
MD51624e17a40f7b98f5ac640d7c31140e1
SHA1eccdcf2346490b93b7ffd5bd8a8d3d65c990b838
SHA2561e3d3120587cfd6d640594789d3f2f8792c71607291e1aa5ef9f174a1eaa3674
SHA512f9a01ecbd75126e0ce0b7d0981d2065de769cec6fc0de122b8d6a8075e0665ee56b3d2185fadda06fd18c9f80457d7051d12a9edc871b5db8c684972f1bbffac