Analysis

  • max time kernel
    149s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 22:05

General

  • Target

    5ad124b45d3c5fee7453bfb4e981e1337a948e4b23a810fd667293f053724149.exe

  • Size

    2.7MB

  • MD5

    d316d995470af9a7c01a519ae87a99ae

  • SHA1

    74bec262e1b457283603a957e5e9979e4ba79d0c

  • SHA256

    5ad124b45d3c5fee7453bfb4e981e1337a948e4b23a810fd667293f053724149

  • SHA512

    be0e633e8740f14c706f4cb6dfc8476ace960c87e6f2733d1ac2c6b934220d6c15be0d4964e46867b06cdea7cc626caeb83aa6d275cef4babe8b40f95c3ce62c

  • SSDEEP

    49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBC9w4Sx:+R0pI/IQlUoMPdmpSp04

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ad124b45d3c5fee7453bfb4e981e1337a948e4b23a810fd667293f053724149.exe
    "C:\Users\Admin\AppData\Local\Temp\5ad124b45d3c5fee7453bfb4e981e1337a948e4b23a810fd667293f053724149.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Intelproc6C\abodloc.exe
      C:\Intelproc6C\abodloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Intelproc6C\abodloc.exe

    Filesize

    2.7MB

    MD5

    bb6677ac739f4e0a6983c0f590728926

    SHA1

    de2cec1c0f117e38c247e437fc00993a01c7c369

    SHA256

    0bfe838c586bf1587e4b01088fef4583c36496c203daa1ee8f36183bf5e85fa9

    SHA512

    3f3d2c2aa53224b7ef5580a000fa81338abdbe31e2b6b27278d0f2bdd9d1f06a6a7f4d136b53306ea5bb6c728938b443084847d00f0629ee18beea1d8b5ef7e6

  • C:\KaVBDI\optixloc.exe

    Filesize

    2.7MB

    MD5

    8e31eb34c37ba2fa8645f380a485abb9

    SHA1

    5192d866585954fd41cc994c7fc7c0d843b9ad2b

    SHA256

    97af6c04b518b73fa9cea101dfaafb53e41c966d56a6fc109c591fb717ac718f

    SHA512

    329151d2ca94dd4d4288c4813ef8b24e7f03b02801b405740a67ffc6a47c44c8eac6150f55cc63883521be562b10b805f897d4bd2145b2aef20b41c2b7c88efc

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    207B

    MD5

    93072faab6dec743dc8dbeb7d70eed44

    SHA1

    2323e6ca5e6759274e7707779a86cddc6d4204de

    SHA256

    18dec69c4a557d23c6ea2da3e93cb9883d77680b4f6dbbb4788e7ed14ba03eca

    SHA512

    5db2d8347be9209e6a812d061dc138b50e5c719b47a12b2f7da26274f657ecadc47708e81650d5f9eb7b1eaba45d4c979e70942756ecabedb087e5ba481eeb7e