Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/08/2024, 12:02

General

  • Target

    a4e52ce67bf172622fd47fd156804470N.exe

  • Size

    2.7MB

  • MD5

    a4e52ce67bf172622fd47fd156804470

  • SHA1

    aa36b3dddf2637ec9e1ba02478f9bc6527d5e896

  • SHA256

    78cc0303b1d42e5a92dbd6dc44706d4915693c096ca55664f8ad10042c00f675

  • SHA512

    53e5a4a7d5dd4b4f37d19404726162158322ebcd0996f4a642ac6bfc0863f76acffb8f9ae0eb7964687894e0e4e6d8eb2e6b4fbcd25283eb68be106a05e1d2db

  • SSDEEP

    49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB89w4Sx:+R0pI/IQlUoMPdmpSpm4

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4e52ce67bf172622fd47fd156804470N.exe
    "C:\Users\Admin\AppData\Local\Temp\a4e52ce67bf172622fd47fd156804470N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3488
    • C:\Adobe8S\adobloc.exe
      C:\Adobe8S\adobloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3736
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4436,i,11251706013556949551,5157034131170452377,262144 --variations-seed-version --mojo-platform-channel-handle=1284 /prefetch:8
    1⤵
      PID:4064

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Adobe8S\adobloc.exe

      Filesize

      2.7MB

      MD5

      95cbedf6ec6e7c82211ed5607c1dbf1f

      SHA1

      c62a0fd0dc76abf0f2c21adbc92d9953295fb0bd

      SHA256

      13913e32c9b1d912431fadae9f19d1f01650dc3fee51b807c6ad4ea48dc215d9

      SHA512

      b02560d79a4ede1b2cb1c546fc56c9681e8e95095b287f387651173327fdcdfe66bdfebbfcaf34ea1d851412442c1f41300b138d1d3f0f64989d108a03db5a79

    • C:\Users\Admin\253086396416_10.0_Admin.ini

      Filesize

      199B

      MD5

      369827674dcf61fcae359a572ba2c3f0

      SHA1

      734648db40cd35a5aeaf8aab498df994152144d5

      SHA256

      d6e15cb27f53306cd2189d0acb8cdbd088fe4cc71a2344b75e344d45905d4e77

      SHA512

      fedb1af3e182d4da71a48e45d05caae521d5f6ed74ef67fb12ca0f466fb1b15c411e9bd3c43913d6887c4b86e06a908329c67ec05d47586fceb339646e4c9224

    • C:\VidR6\dobaec.exe

      Filesize

      2.7MB

      MD5

      561e81526a71a87e038f2076587f80c5

      SHA1

      73dd0204fa4f6a96a352ebaf2152f617ffc67f41

      SHA256

      e8b365121b0ca0b470fafe81fd44727f17a4d04c43e576e64f8379ebbb02eaa1

      SHA512

      867c226bfe1aa03255fc14b6db25c08587c9e93a4f1c7b4653fd7fa2762b549b653d4e00935f30371d41660b18be58c004503828b9d6e10418003efc2495b8eb