Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05-08-2024 17:26
Static task
static1
Behavioral task
behavioral1
Sample
b71c5015b2110c1d4f3431b50f6ee110N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b71c5015b2110c1d4f3431b50f6ee110N.exe
Resource
win10v2004-20240802-en
General
-
Target
b71c5015b2110c1d4f3431b50f6ee110N.exe
-
Size
2.7MB
-
MD5
b71c5015b2110c1d4f3431b50f6ee110
-
SHA1
13d7d6b6200cc7026d46457fc7d184e61cdba5ee
-
SHA256
2bb565701aad28e24bbda9ab61998d3f945058f105731261707b3e2acbb49cb4
-
SHA512
d1bf950d8b161c2865a4d21e40f722218d65382188189716d24ef35d2b878bc5bc17c79b48b808c33461c597515adadb945569c27fd7de2cd86399585ef90678
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB79w4Sx:+R0pI/IQlUoMPdmpSp/4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2768 adobsys.exe -
Loads dropped DLL 1 IoCs
pid Process 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesY2\\adobsys.exe" b71c5015b2110c1d4f3431b50f6ee110N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidEH\\bodxec.exe" b71c5015b2110c1d4f3431b50f6ee110N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b71c5015b2110c1d4f3431b50f6ee110N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 2768 adobsys.exe 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2768 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 30 PID 2668 wrote to memory of 2768 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 30 PID 2668 wrote to memory of 2768 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 30 PID 2668 wrote to memory of 2768 2668 b71c5015b2110c1d4f3431b50f6ee110N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b71c5015b2110c1d4f3431b50f6ee110N.exe"C:\Users\Admin\AppData\Local\Temp\b71c5015b2110c1d4f3431b50f6ee110N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\FilesY2\adobsys.exeC:\FilesY2\adobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
199B
MD5d5b673add69311179465d9711a342681
SHA1b7f4bbadfa9b7cba07a9e52eef8411ca05812e39
SHA256da44196627378c109f0a5dbd28f1b1f2e7a6cd8462447f7282b0300cc87cc3e4
SHA5120e9216916415f7a38fe64dbcff1f3960c03faef76eec947aeb59e1659a97b4a3ff457e3b99c07869c557b6bfd5c4664cdef10c5f9b3b97892ce1fb4602fda510
-
Filesize
2.7MB
MD5d4e1d79952b4b8bfc4be0d04a0f0120f
SHA101e1eb86d0a04552485c2de6a5893e1a381c9dcc
SHA25632cfb80894b9feedb05eed946d25c2bb20b16af4ad15b0666da42d5d0f416df0
SHA512f83ec7f399442087a5b49ac8522ef96405156cb81578a99c320517b7e3a762f6b98e13c2140065a57df3ac538c9215aa514ce9a350e28eb8e137cf75d7883bc3
-
Filesize
2.7MB
MD501641ed8e42237326a0e8e81b585550e
SHA19a3fdaf01860af1091ee353f8ffa2c5bb3d535f9
SHA256863c873cf997fe46040949083a9cb8bfa89751163c3524aa494f0daed772539c
SHA512a77b0926a0e0a652bdde279a3d3e53bc4b8ccd214155bd8928058177f3683af17acf86480d8d72ce240a2fb49c01399fc15503d9c6537b5046b05df5ce6aa12b