Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 15:12
Static task
static1
Behavioral task
behavioral1
Sample
b6576f3ab56d9eb0ed3c49ae32f79200N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b6576f3ab56d9eb0ed3c49ae32f79200N.exe
Resource
win10v2004-20240802-en
General
-
Target
b6576f3ab56d9eb0ed3c49ae32f79200N.exe
-
Size
2.7MB
-
MD5
b6576f3ab56d9eb0ed3c49ae32f79200
-
SHA1
11b145961a5e0d3866cf04acf6572185cd79bccd
-
SHA256
78db052a45b70fa9641178a25561d4e3c95e2d3cda7264d5f5df68ab6eabb817
-
SHA512
7aacd18b486ba70ed8a99ac1bf6bc87c38f4bcc5b90d2b28e25aaec6dff1883a8d940f4f93de99e519a991b77047074d425dda48d3894a7387960539cdc4c4ba
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBT9w4Sx:+R0pI/IQlUoMPdmpSpv4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1316 adobsys.exe -
Loads dropped DLL 1 IoCs
pid Process 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvK7\\adobsys.exe" b6576f3ab56d9eb0ed3c49ae32f79200N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintVB\\bodxloc.exe" b6576f3ab56d9eb0ed3c49ae32f79200N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobsys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6576f3ab56d9eb0ed3c49ae32f79200N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 1316 adobsys.exe 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1316 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 30 PID 2368 wrote to memory of 1316 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 30 PID 2368 wrote to memory of 1316 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 30 PID 2368 wrote to memory of 1316 2368 b6576f3ab56d9eb0ed3c49ae32f79200N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6576f3ab56d9eb0ed3c49ae32f79200N.exe"C:\Users\Admin\AppData\Local\Temp\b6576f3ab56d9eb0ed3c49ae32f79200N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\SysDrvK7\adobsys.exeC:\SysDrvK7\adobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5096c5b2c3ad37f22e32c025fb2b444c5
SHA10c60ec71c173b897f4863f93bdb00521d79bb1bd
SHA2562faf0f9e26b6c4ddce48cb5a7af38568d37170aef86d384f29b9a2b981071f93
SHA512056ad37e74ca74ddf2b4702313be89612236bf1fb3da4a91dc993e4ed7ad7613e0dc9b5a03987aef00ca5ac7d16fa6cff928cdba163c1e19eff17d5f158f96f6
-
Filesize
202B
MD5ea74e2685fa4aba37d7f7514967613d5
SHA151b26de38680bb68d25572d6fc55981fb2aed36b
SHA25636fd698266abd156c1d122653806b29b32d25b470a6da96b788870ab8141015a
SHA5125ff994afa985ae6ace30219aeab05b0ccddff29099272382596f7b2167e73b0a3158e71f0b7e14436f9edf191844e5b4ebe4a2c9c29fd6c293699a3b43c9e7af
-
Filesize
2.7MB
MD5d17e0a6e089e70818131fe1a3cc43d2e
SHA1a21b08e659f31ec192f6d204f759b74c23170ef6
SHA2568cdc87ccbb3da65fc528c7b469e46fad74f73fa2a415f2559aabf7e692d180fa
SHA512bbcd674d57d0e00d72712192974697933d2bf3a32140b118f7c3534394c172504a00fc18b05db33af7ec8d198cde9ef9e399b2ca7f995f07bdd2fdd365827fa4