Analysis
-
max time kernel
119s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/08/2024, 02:14
Static task
static1
Behavioral task
behavioral1
Sample
359566155d4d86edcd3aff0503f2de60N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
359566155d4d86edcd3aff0503f2de60N.exe
Resource
win10v2004-20240802-en
General
-
Target
359566155d4d86edcd3aff0503f2de60N.exe
-
Size
2.7MB
-
MD5
359566155d4d86edcd3aff0503f2de60
-
SHA1
d8afde49e367fcfb81f7c3327d53b233fc842173
-
SHA256
0523ba20256e25031f9d6464847507098b208c063704548b76ea2df80ff5bc68
-
SHA512
a2fc9ce029894d9a6ce6e9cf7ce9ec796159fb7df52627600a86225b8321ec32fe9f03ec311139010dec0cf4ae2abd610febdcd90c93156a7aaeff07ba5df36a
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBc9w4Sx:+R0pI/IQlUoMPdmpSpy4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1812 abodsys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Intelproc5U\\abodsys.exe" 359566155d4d86edcd3aff0503f2de60N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintJY\\bodasys.exe" 359566155d4d86edcd3aff0503f2de60N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 359566155d4d86edcd3aff0503f2de60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abodsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2100 359566155d4d86edcd3aff0503f2de60N.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 1812 abodsys.exe 1812 abodsys.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 1812 abodsys.exe 1812 abodsys.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 1812 abodsys.exe 1812 abodsys.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 1812 abodsys.exe 1812 abodsys.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 1812 abodsys.exe 1812 abodsys.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 1812 abodsys.exe 1812 abodsys.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 1812 abodsys.exe 1812 abodsys.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 1812 abodsys.exe 1812 abodsys.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 1812 abodsys.exe 1812 abodsys.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 1812 abodsys.exe 1812 abodsys.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 1812 abodsys.exe 1812 abodsys.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 1812 abodsys.exe 1812 abodsys.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 1812 abodsys.exe 1812 abodsys.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 1812 abodsys.exe 1812 abodsys.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 1812 abodsys.exe 1812 abodsys.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe 2100 359566155d4d86edcd3aff0503f2de60N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2100 wrote to memory of 1812 2100 359566155d4d86edcd3aff0503f2de60N.exe 84 PID 2100 wrote to memory of 1812 2100 359566155d4d86edcd3aff0503f2de60N.exe 84 PID 2100 wrote to memory of 1812 2100 359566155d4d86edcd3aff0503f2de60N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\359566155d4d86edcd3aff0503f2de60N.exe"C:\Users\Admin\AppData\Local\Temp\359566155d4d86edcd3aff0503f2de60N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Intelproc5U\abodsys.exeC:\Intelproc5U\abodsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD52c3af1daaaa6b20aa8e027bfa4349fe5
SHA18db3c0652d3213547192c09f5e6407712300836a
SHA2563794c9f85d5bd4aaa9dbb06b550b9691f0fcbb54543d1555236bf0f258f15f13
SHA5128e0e944cfdb24d7ca43ede3eed872026d4fd47f6bcb76c63fcb858173cf97feadb814dd33f850b94300d4190207575253a426fe34f132bee48b2acad9bab0091
-
Filesize
293KB
MD5431e6864aaa04fc0846ff4ee3955ebd9
SHA1ae85a69469d315c5dab7ba5e3ca19adb980138e2
SHA256c7bdca22ae9f1b9d89edd02fe94861d19c6441f61e11c19ddb574edacebc2425
SHA51254772eddcb43249e3c425a773923d345f1de17bcbafd72d1902c9e1659781d2399e21727bc0286047b975a1a30db404fd84b60e60addcc7c0c6957c6809a72c7
-
Filesize
2.7MB
MD5a56073a1c552da33eeb6ad320775e9ca
SHA1aaff55c4b55d3a6ec6c690afc7abe82fea191e89
SHA256da71be2f2c416da4c80492714eb82c684ff2cbbdb6a41b121e0ee010d1013931
SHA5129e50c3cc71ff06e94bc5607501beae1eae74bd7b41865139e7f9eaf1b6f0cc105fac197e9e500853b9c1eb573be20fa9559ea84325226d0b0b45c2302e74a370
-
Filesize
204B
MD5d9d1e99f341751bd1db454ac67278971
SHA1889e8a0fdefaffed530db65d58c27fe4acf8cb59
SHA256954637c2a892893fb3026c7a4fd66985e3e2a96ff53c876e09082bfc23eef4f9
SHA512930053a9666cd73d970c94e07f94ca62068d4b67a47c62985da6ccc848462c8377b40cf1ad53c50153cbe250fdc89661a98bddc00248cb8b940b8882cac81d55