Analysis
-
max time kernel
119s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 17:37
Static task
static1
Behavioral task
behavioral1
Sample
48659fa38f659570647db84a9e90e600N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
48659fa38f659570647db84a9e90e600N.exe
Resource
win10v2004-20240802-en
General
-
Target
48659fa38f659570647db84a9e90e600N.exe
-
Size
2.7MB
-
MD5
48659fa38f659570647db84a9e90e600
-
SHA1
611d6f1dc7321edeb5270b6f00496a47e0f680e1
-
SHA256
4371806585704c25df9e64848b614d7b649266c88d2557388e9b052dc1e10ecf
-
SHA512
1b073f2d8a33fb06bb31cbfba1a16e781514f406ca216fbf204248e20d1fbba270f9c9157fecd31f623a3ca3f77df23e99028c3ee35064467abfb182ec597685
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBL9w4Sx:+R0pI/IQlUoMPdmpSpf4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3708 xdobsys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeQ0\\xdobsys.exe" 48659fa38f659570647db84a9e90e600N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxWG\\boddevsys.exe" 48659fa38f659570647db84a9e90e600N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48659fa38f659570647db84a9e90e600N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdobsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2520 48659fa38f659570647db84a9e90e600N.exe 2520 48659fa38f659570647db84a9e90e600N.exe 2520 48659fa38f659570647db84a9e90e600N.exe 2520 48659fa38f659570647db84a9e90e600N.exe 3708 xdobsys.exe 3708 xdobsys.exe 2520 48659fa38f659570647db84a9e90e600N.exe 2520 48659fa38f659570647db84a9e90e600N.exe 3708 xdobsys.exe 3708 xdobsys.exe 2520 48659fa38f659570647db84a9e90e600N.exe 2520 48659fa38f659570647db84a9e90e600N.exe 3708 xdobsys.exe 3708 xdobsys.exe 2520 48659fa38f659570647db84a9e90e600N.exe 2520 48659fa38f659570647db84a9e90e600N.exe 3708 xdobsys.exe 3708 xdobsys.exe 2520 48659fa38f659570647db84a9e90e600N.exe 2520 48659fa38f659570647db84a9e90e600N.exe 3708 xdobsys.exe 3708 xdobsys.exe 2520 48659fa38f659570647db84a9e90e600N.exe 2520 48659fa38f659570647db84a9e90e600N.exe 3708 xdobsys.exe 3708 xdobsys.exe 2520 48659fa38f659570647db84a9e90e600N.exe 2520 48659fa38f659570647db84a9e90e600N.exe 3708 xdobsys.exe 3708 xdobsys.exe 2520 48659fa38f659570647db84a9e90e600N.exe 2520 48659fa38f659570647db84a9e90e600N.exe 3708 xdobsys.exe 3708 xdobsys.exe 2520 48659fa38f659570647db84a9e90e600N.exe 2520 48659fa38f659570647db84a9e90e600N.exe 3708 xdobsys.exe 3708 xdobsys.exe 2520 48659fa38f659570647db84a9e90e600N.exe 2520 48659fa38f659570647db84a9e90e600N.exe 3708 xdobsys.exe 3708 xdobsys.exe 2520 48659fa38f659570647db84a9e90e600N.exe 2520 48659fa38f659570647db84a9e90e600N.exe 3708 xdobsys.exe 3708 xdobsys.exe 2520 48659fa38f659570647db84a9e90e600N.exe 2520 48659fa38f659570647db84a9e90e600N.exe 3708 xdobsys.exe 3708 xdobsys.exe 2520 48659fa38f659570647db84a9e90e600N.exe 2520 48659fa38f659570647db84a9e90e600N.exe 3708 xdobsys.exe 3708 xdobsys.exe 2520 48659fa38f659570647db84a9e90e600N.exe 2520 48659fa38f659570647db84a9e90e600N.exe 3708 xdobsys.exe 3708 xdobsys.exe 2520 48659fa38f659570647db84a9e90e600N.exe 2520 48659fa38f659570647db84a9e90e600N.exe 3708 xdobsys.exe 3708 xdobsys.exe 2520 48659fa38f659570647db84a9e90e600N.exe 2520 48659fa38f659570647db84a9e90e600N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2520 wrote to memory of 3708 2520 48659fa38f659570647db84a9e90e600N.exe 89 PID 2520 wrote to memory of 3708 2520 48659fa38f659570647db84a9e90e600N.exe 89 PID 2520 wrote to memory of 3708 2520 48659fa38f659570647db84a9e90e600N.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\48659fa38f659570647db84a9e90e600N.exe"C:\Users\Admin\AppData\Local\Temp\48659fa38f659570647db84a9e90e600N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\AdobeQ0\xdobsys.exeC:\AdobeQ0\xdobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD555ca54a55d60548be4edc2cfd59deb08
SHA1162aa897d175c20538b8baa831286b52a5bd8f4c
SHA256f583dba004fed01273f1b938f34f447e8871a349de48356d0d359033fb4383c0
SHA512b7b67a7e7e63a663dea4eddd598375a95f9bfd51a752f976629cae638a3c50eb3510fd5286ec5a743b52f17fce17bef57f8d36a9c85d1a571f6ef97ed63393df
-
Filesize
2.7MB
MD5b028e4ec42707849081e747d0085264a
SHA18efba02c3f4f17463d9b5964debfc3e433dd6fb9
SHA256abe01b74352bea9bbb87bc32a4e4b1cd601bc4c77459a788a9563fb577343441
SHA512af7b851dc6a20d505ad6b68f3729f3e9badc86f249c0bc194d2a9a0c9eb7f4cd055f5dde2712c8c6f7515566a094e7b9ce7beb17db1dd8781254c30b47cf857d
-
Filesize
204B
MD50ec990ecc0984f38e3fae9c644190cf7
SHA1b05948f7d9a7f7249fbdfcde9bf562ddda914214
SHA256598c655023fe529b125792ba532b077cef72597e429601f1cc57291633a6a529
SHA51275dfe5b6503756c8332cf148140dbc04228d61a557825c7960f9f029c595798993e854e1a2790248424426643918a5df3263352a4c2fca1032791a3cb87bfc98