Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 12:02
Static task
static1
Behavioral task
behavioral1
Sample
a4e52ce67bf172622fd47fd156804470N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a4e52ce67bf172622fd47fd156804470N.exe
Resource
win10v2004-20240802-en
General
-
Target
a4e52ce67bf172622fd47fd156804470N.exe
-
Size
2.7MB
-
MD5
a4e52ce67bf172622fd47fd156804470
-
SHA1
aa36b3dddf2637ec9e1ba02478f9bc6527d5e896
-
SHA256
78cc0303b1d42e5a92dbd6dc44706d4915693c096ca55664f8ad10042c00f675
-
SHA512
53e5a4a7d5dd4b4f37d19404726162158322ebcd0996f4a642ac6bfc0863f76acffb8f9ae0eb7964687894e0e4e6d8eb2e6b4fbcd25283eb68be106a05e1d2db
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB89w4Sx:+R0pI/IQlUoMPdmpSpm4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3736 adobloc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Adobe8S\\adobloc.exe" a4e52ce67bf172622fd47fd156804470N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidR6\\dobaec.exe" a4e52ce67bf172622fd47fd156804470N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4e52ce67bf172622fd47fd156804470N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3488 a4e52ce67bf172622fd47fd156804470N.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3736 adobloc.exe 3736 adobloc.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3736 adobloc.exe 3736 adobloc.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3736 adobloc.exe 3736 adobloc.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3736 adobloc.exe 3736 adobloc.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3736 adobloc.exe 3736 adobloc.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3736 adobloc.exe 3736 adobloc.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3736 adobloc.exe 3736 adobloc.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3736 adobloc.exe 3736 adobloc.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3736 adobloc.exe 3736 adobloc.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3736 adobloc.exe 3736 adobloc.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3736 adobloc.exe 3736 adobloc.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3736 adobloc.exe 3736 adobloc.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3736 adobloc.exe 3736 adobloc.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3736 adobloc.exe 3736 adobloc.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3736 adobloc.exe 3736 adobloc.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe 3488 a4e52ce67bf172622fd47fd156804470N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3488 wrote to memory of 3736 3488 a4e52ce67bf172622fd47fd156804470N.exe 95 PID 3488 wrote to memory of 3736 3488 a4e52ce67bf172622fd47fd156804470N.exe 95 PID 3488 wrote to memory of 3736 3488 a4e52ce67bf172622fd47fd156804470N.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4e52ce67bf172622fd47fd156804470N.exe"C:\Users\Admin\AppData\Local\Temp\a4e52ce67bf172622fd47fd156804470N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Adobe8S\adobloc.exeC:\Adobe8S\adobloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4436,i,11251706013556949551,5157034131170452377,262144 --variations-seed-version --mojo-platform-channel-handle=1284 /prefetch:81⤵PID:4064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD595cbedf6ec6e7c82211ed5607c1dbf1f
SHA1c62a0fd0dc76abf0f2c21adbc92d9953295fb0bd
SHA25613913e32c9b1d912431fadae9f19d1f01650dc3fee51b807c6ad4ea48dc215d9
SHA512b02560d79a4ede1b2cb1c546fc56c9681e8e95095b287f387651173327fdcdfe66bdfebbfcaf34ea1d851412442c1f41300b138d1d3f0f64989d108a03db5a79
-
Filesize
199B
MD5369827674dcf61fcae359a572ba2c3f0
SHA1734648db40cd35a5aeaf8aab498df994152144d5
SHA256d6e15cb27f53306cd2189d0acb8cdbd088fe4cc71a2344b75e344d45905d4e77
SHA512fedb1af3e182d4da71a48e45d05caae521d5f6ed74ef67fb12ca0f466fb1b15c411e9bd3c43913d6887c4b86e06a908329c67ec05d47586fceb339646e4c9224
-
Filesize
2.7MB
MD5561e81526a71a87e038f2076587f80c5
SHA173dd0204fa4f6a96a352ebaf2152f617ffc67f41
SHA256e8b365121b0ca0b470fafe81fd44727f17a4d04c43e576e64f8379ebbb02eaa1
SHA512867c226bfe1aa03255fc14b6db25c08587c9e93a4f1c7b4653fd7fa2762b549b653d4e00935f30371d41660b18be58c004503828b9d6e10418003efc2495b8eb