Analysis
-
max time kernel
119s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 07:57
Static task
static1
Behavioral task
behavioral1
Sample
ab8c916707269105a4ab4e9086f8a4b0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ab8c916707269105a4ab4e9086f8a4b0N.exe
Resource
win10v2004-20240709-en
General
-
Target
ab8c916707269105a4ab4e9086f8a4b0N.exe
-
Size
2.7MB
-
MD5
ab8c916707269105a4ab4e9086f8a4b0
-
SHA1
8273d2fd32f313a0e99d50b47a5991420423c14e
-
SHA256
fa2ef8046fdd2a42ba0affdc439e70886fe80ef99ea7983067f4046587c8005c
-
SHA512
6e914647e89ff5e48e50587164cf4d875e04cdc758f5260fabc45eabbe869c4ad7d1ce90c3c67e807fac89279eab050961382ad7b44ff541326d0155d823b402
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBW9w4Sx:+R0pI/IQlUoMPdmpSpM4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2524 adobloc.exe -
Loads dropped DLL 1 IoCs
pid Process 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvXG\\adobloc.exe" ab8c916707269105a4ab4e9086f8a4b0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZUD\\bodxsys.exe" ab8c916707269105a4ab4e9086f8a4b0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab8c916707269105a4ab4e9086f8a4b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 2524 adobloc.exe 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2524 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 31 PID 3056 wrote to memory of 2524 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 31 PID 3056 wrote to memory of 2524 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 31 PID 3056 wrote to memory of 2524 3056 ab8c916707269105a4ab4e9086f8a4b0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab8c916707269105a4ab4e9086f8a4b0N.exe"C:\Users\Admin\AppData\Local\Temp\ab8c916707269105a4ab4e9086f8a4b0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\SysDrvXG\adobloc.exeC:\SysDrvXG\adobloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5a8484e8314e4a938b7f068caf740b6b6
SHA1dfb8996b5bda64cfe84b4d19dd7b40a59d5571ff
SHA256a6e6a71dcea426edbbef5d5965b9b16d37ff51ddcf1a5606c6b95a5f1100ef55
SHA512841eb2b934110a680a577f91cd105d997c2d90315ab8b971a1ddd865b11228bc719645481dc4c63595b4ab5d3536572cc9aeb050693eb6f019868595ba0a92b2
-
Filesize
201B
MD55ea6ef73b76a5d6b9cf36b70c2da4438
SHA1e892814409be8b5981410c31856ab296674849e6
SHA2563fe53cbd1afd58db48869c856a50e87a19026d08699545f74108630304ba514a
SHA5122f12bf24f43386793fe3917452746860979d5f6e0282cd6967fa8e4654ef6eabbe40dfebc1d248082c636a1c4663393dfbfac666129bd8b92653f92f253f31be
-
Filesize
2.7MB
MD5cbb496aa6ca7ac96f216f1142646b6d4
SHA1ae93da7b958b4504b4def56c21a519383ec81dc0
SHA256c44abfd5830aab1ae089df8a44ebbb09574334b87414e5223eefdd2f476fb7b8
SHA512b6658e16e5a60786eed3c163491416d17155a403ea93283c18df58b82a812a64cbb4d024676feada0622af0e18f3152645719e7c1b5ba122d1100ef0ed15d5ea