Analysis
-
max time kernel
119s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 23:06
Static task
static1
Behavioral task
behavioral1
Sample
23e48f1a2defa4b1e7ed2425512f6400N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
23e48f1a2defa4b1e7ed2425512f6400N.exe
Resource
win10v2004-20240802-en
General
-
Target
23e48f1a2defa4b1e7ed2425512f6400N.exe
-
Size
3.1MB
-
MD5
23e48f1a2defa4b1e7ed2425512f6400
-
SHA1
024cc9d60ae54112394f1d84c418947a47e9889c
-
SHA256
5887dfe404963fad85aed64bc64ad7f359cea72c20f59d80634f415bd7148db9
-
SHA512
c1e7b897796d420a3d3190f497c2185093b665a863b0fe0bb70ba0285436be34a34da1100b43d76593f112c1b5f452583445bd7ba478d786c67139651fe26a70
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB79w4Su+LNfej:+R0pI/IQlUoMPdmpSpH4JkNfej
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4756 devdobsys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeSA\\devdobsys.exe" 23e48f1a2defa4b1e7ed2425512f6400N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBFY\\boddevloc.exe" 23e48f1a2defa4b1e7ed2425512f6400N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23e48f1a2defa4b1e7ed2425512f6400N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devdobsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 4756 devdobsys.exe 4756 devdobsys.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 4756 devdobsys.exe 4756 devdobsys.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 4756 devdobsys.exe 4756 devdobsys.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 4756 devdobsys.exe 4756 devdobsys.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 4756 devdobsys.exe 4756 devdobsys.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 4756 devdobsys.exe 4756 devdobsys.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 4756 devdobsys.exe 4756 devdobsys.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 4756 devdobsys.exe 4756 devdobsys.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 4756 devdobsys.exe 4756 devdobsys.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 4756 devdobsys.exe 4756 devdobsys.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 4756 devdobsys.exe 4756 devdobsys.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 4756 devdobsys.exe 4756 devdobsys.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 4756 devdobsys.exe 4756 devdobsys.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 4756 devdobsys.exe 4756 devdobsys.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 4756 devdobsys.exe 4756 devdobsys.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5024 wrote to memory of 4756 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 86 PID 5024 wrote to memory of 4756 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 86 PID 5024 wrote to memory of 4756 5024 23e48f1a2defa4b1e7ed2425512f6400N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\23e48f1a2defa4b1e7ed2425512f6400N.exe"C:\Users\Admin\AppData\Local\Temp\23e48f1a2defa4b1e7ed2425512f6400N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\AdobeSA\devdobsys.exeC:\AdobeSA\devdobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5b9bf607c4ce7138f8f516b9fac4924d6
SHA11bc824c72a3ae33e8e31a9656cd61659e669f368
SHA256c18d8026ce8a5da19a24c51706da4e91d817ba09725c977b6e2fe2fe88c6c54b
SHA51216be4705087f1286c1ae0d19ca0aad91d92fcbd5153345a49138e4fc90ce535cd18060b5628b43e3e66dd1dac367f5066469281c30eefe41436e54011bcaefcf
-
Filesize
409KB
MD51d577539ab091a24f94d1cec800ac0cc
SHA178e709321601e925cc8fe856c40bd2e84aa7e790
SHA2568b02778adb3a5a3abb73bcdbbf6482f8b63326461f6b4d4fda3420b793089ce1
SHA51202feaf4f8e6440f1a29c15c894e5c71b87ec0d40b1f4efa95cd6141468389549264c21d60f6754fb51189045ff8af780e00ad72fe036f2d2a3d0b43e8e597a1e
-
Filesize
204B
MD5f891e8b2c4d1e94b432e6620512e8e09
SHA1f1a8521c44933ee9dff9f55738f76c5fc36a7bb1
SHA256e22989fc5340abdd3e603d00c296bc21189e99ee59fab43753ba8281e3d49ef4
SHA5129f81dd263dc8991d9f8c3cd0db3beb80a6a8bbfa358f209943e47c63868db9f2f0c07c992517423ccc0a4990a99e9d84bcc73eee51e86e492f080f16a2656dab