Analysis

  • max time kernel
    119s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05-08-2024 17:26

General

  • Target

    b71c5015b2110c1d4f3431b50f6ee110N.exe

  • Size

    2.7MB

  • MD5

    b71c5015b2110c1d4f3431b50f6ee110

  • SHA1

    13d7d6b6200cc7026d46457fc7d184e61cdba5ee

  • SHA256

    2bb565701aad28e24bbda9ab61998d3f945058f105731261707b3e2acbb49cb4

  • SHA512

    d1bf950d8b161c2865a4d21e40f722218d65382188189716d24ef35d2b878bc5bc17c79b48b808c33461c597515adadb945569c27fd7de2cd86399585ef90678

  • SSDEEP

    49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB79w4Sx:+R0pI/IQlUoMPdmpSp/4

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b71c5015b2110c1d4f3431b50f6ee110N.exe
    "C:\Users\Admin\AppData\Local\Temp\b71c5015b2110c1d4f3431b50f6ee110N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\FilesY2\adobsys.exe
      C:\FilesY2\adobsys.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    199B

    MD5

    d5b673add69311179465d9711a342681

    SHA1

    b7f4bbadfa9b7cba07a9e52eef8411ca05812e39

    SHA256

    da44196627378c109f0a5dbd28f1b1f2e7a6cd8462447f7282b0300cc87cc3e4

    SHA512

    0e9216916415f7a38fe64dbcff1f3960c03faef76eec947aeb59e1659a97b4a3ff457e3b99c07869c557b6bfd5c4664cdef10c5f9b3b97892ce1fb4602fda510

  • C:\VidEH\bodxec.exe

    Filesize

    2.7MB

    MD5

    d4e1d79952b4b8bfc4be0d04a0f0120f

    SHA1

    01e1eb86d0a04552485c2de6a5893e1a381c9dcc

    SHA256

    32cfb80894b9feedb05eed946d25c2bb20b16af4ad15b0666da42d5d0f416df0

    SHA512

    f83ec7f399442087a5b49ac8522ef96405156cb81578a99c320517b7e3a762f6b98e13c2140065a57df3ac538c9215aa514ce9a350e28eb8e137cf75d7883bc3

  • \FilesY2\adobsys.exe

    Filesize

    2.7MB

    MD5

    01641ed8e42237326a0e8e81b585550e

    SHA1

    9a3fdaf01860af1091ee353f8ffa2c5bb3d535f9

    SHA256

    863c873cf997fe46040949083a9cb8bfa89751163c3524aa494f0daed772539c

    SHA512

    a77b0926a0e0a652bdde279a3d3e53bc4b8ccd214155bd8928058177f3683af17acf86480d8d72ce240a2fb49c01399fc15503d9c6537b5046b05df5ce6aa12b