Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 01:15
Static task
static1
Behavioral task
behavioral1
Sample
97f112cc5d44dfd8315caf9d34e605b0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
97f112cc5d44dfd8315caf9d34e605b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
97f112cc5d44dfd8315caf9d34e605b0N.exe
-
Size
2.7MB
-
MD5
97f112cc5d44dfd8315caf9d34e605b0
-
SHA1
f35f30a9e4892e7157bfa4fc3bb7821dd1c48aa6
-
SHA256
05e3723bdad6d29aac61b6682079c21ca582a56635aa8cb9afe2dd559aab8031
-
SHA512
ea3d3493beaee206c254917fc85214750f3b64bd909588e1d02529a25d587cacf92b4e3c54f1efc545f2bf99c1cd0103ea0b1d71ca6720f225a8877067da422d
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBt9w4S+:+R0pI/IQlUoMPdmpSpl4X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1996 abodloc.exe -
Loads dropped DLL 1 IoCs
pid Process 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxNH\\optidevloc.exe" 97f112cc5d44dfd8315caf9d34e605b0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesCQ\\abodloc.exe" 97f112cc5d44dfd8315caf9d34e605b0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97f112cc5d44dfd8315caf9d34e605b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abodloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 1996 abodloc.exe 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1996 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 30 PID 2040 wrote to memory of 1996 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 30 PID 2040 wrote to memory of 1996 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 30 PID 2040 wrote to memory of 1996 2040 97f112cc5d44dfd8315caf9d34e605b0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\97f112cc5d44dfd8315caf9d34e605b0N.exe"C:\Users\Admin\AppData\Local\Temp\97f112cc5d44dfd8315caf9d34e605b0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\FilesCQ\abodloc.exeC:\FilesCQ\abodloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5e3c59dbd575484e8f31630c3be4c3bd4
SHA14e895f91ef1f87c78167053e313aff3c47031973
SHA2560b60b1f57507d51a07c892515018f267bd0f1e744dca33d576b3ba141e07259c
SHA512e7051f6f41272be0d35b745d8fd5417527611f2fac73275e2c14d0489ab95ada9e2de849d2817ed71229b84deca48224369c1747c6e7eb23b872cea3617ddbbb
-
Filesize
192B
MD5255f8b017db99a023f0c5b8a830433cd
SHA1e1a1f040d63e0bd4cbfa31a6d910ac147a4b4ebe
SHA256a23e2879ae5c81e7a18e8d6fb7b94914c339f0bd17d632ee2d793beb9b280532
SHA512acf47cef0b160eb6afb58c4d22ce2a76eab43b24bf4aec76941556d1d2a4d0222c1c20332bbfc7670c46204a8f309ed682796df3d630bfe215839908cfe4acc1
-
Filesize
2.7MB
MD59827de7ce2531194509d32e623f0a55e
SHA15bba1405a5d6a3e2453ffb3af933ece1e6119096
SHA2561cec0193461da9b6548a3b5cfc5f8aa3ade53fc9634432bdf2ac0005aa3dac7b
SHA512f51077b446d2ae800b15955ada5493e974063b23302eb7696c413a2a4f19891f7e5a859fc962a2984565bd636a54d5e77b35a6ef01f918381625e48454d8bc2d