Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-08-2024 03:36
Static task
static1
Behavioral task
behavioral1
Sample
443d0e9efbd05dc2761753c077069060N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
443d0e9efbd05dc2761753c077069060N.exe
Resource
win10v2004-20240802-en
General
-
Target
443d0e9efbd05dc2761753c077069060N.exe
-
Size
2.7MB
-
MD5
443d0e9efbd05dc2761753c077069060
-
SHA1
57f21bf26cfe7762eeca442a55723ba6c0a9a3d9
-
SHA256
bc3f378ce15ab212fb89368d475798e0377eead4630fcc8935ca3daca48bda06
-
SHA512
27624815a881aceb03fef90f0124ed57ec20845c074a879b3564ba192b0605a37ff835c5afdcfb1f0d10b872367042f703418bead9d56df0a0201eb5b4150de0
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBz9w4S+:+R0pI/IQlUoMPdmpSpf4X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3836 xdobsys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeGS\\xdobsys.exe" 443d0e9efbd05dc2761753c077069060N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidUR\\optixloc.exe" 443d0e9efbd05dc2761753c077069060N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 443d0e9efbd05dc2761753c077069060N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdobsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4812 443d0e9efbd05dc2761753c077069060N.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 3836 xdobsys.exe 3836 xdobsys.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 3836 xdobsys.exe 3836 xdobsys.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 3836 xdobsys.exe 3836 xdobsys.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 3836 xdobsys.exe 3836 xdobsys.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 3836 xdobsys.exe 3836 xdobsys.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 3836 xdobsys.exe 3836 xdobsys.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 3836 xdobsys.exe 3836 xdobsys.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 3836 xdobsys.exe 3836 xdobsys.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 3836 xdobsys.exe 3836 xdobsys.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 3836 xdobsys.exe 3836 xdobsys.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 3836 xdobsys.exe 3836 xdobsys.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 3836 xdobsys.exe 3836 xdobsys.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 3836 xdobsys.exe 3836 xdobsys.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 3836 xdobsys.exe 3836 xdobsys.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 3836 xdobsys.exe 3836 xdobsys.exe 4812 443d0e9efbd05dc2761753c077069060N.exe 4812 443d0e9efbd05dc2761753c077069060N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4812 wrote to memory of 3836 4812 443d0e9efbd05dc2761753c077069060N.exe 91 PID 4812 wrote to memory of 3836 4812 443d0e9efbd05dc2761753c077069060N.exe 91 PID 4812 wrote to memory of 3836 4812 443d0e9efbd05dc2761753c077069060N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\443d0e9efbd05dc2761753c077069060N.exe"C:\Users\Admin\AppData\Local\Temp\443d0e9efbd05dc2761753c077069060N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\AdobeGS\xdobsys.exeC:\AdobeGS\xdobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4336,i,8293235976513689021,7261015831736501466,262144 --variations-seed-version --mojo-platform-channel-handle=4324 /prefetch:81⤵PID:2684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5758beeb50af9c24920a5b58adb8952da
SHA1a405073c4af4df1155f64707da4b733d367ef66a
SHA256b14b8cdea114954529c2385169754832ade3321240fce82c049828255c6dad61
SHA5124cdacffdff2ac2c284216044813e950c2083929767f30a9393b600f07bb248b97557585e88cdb2f5f413ad8d108361bf49a0c43f5c688ea2c33f280b73fabf9d
-
Filesize
201B
MD5b85bcb06612870625342f8343d71dc52
SHA16ba7d416877081da10ab4435db2fd6030c948a86
SHA256c9b84d75c753a37047e31ed734454570b778f403641af38e7ec962c1110593c3
SHA5127cbc65169123b95536ed4913d1ccc6525100fe6726051b281f8b8b1f5a7b50e66f778fbc81d7ca4ee680128efb2582e7b114d12c90de565db695c9c2ad0c178f
-
Filesize
2.7MB
MD574fb540c355c0a10348385a91a81447f
SHA10fb018794fc30560d893727790ca3d839384d622
SHA25697b6ae110694a7e267189e09df3c25b852470ff1b0d3586bdc82822a556a7755
SHA51214ac7aea9dd6d3fccd7b248c9393c33349b1e82cb0d3a230cd4629c7dc69702c3c6b24f81ee69e20baa27a1284552fb085b9a15a9cc9768112c3d43e3c705c74