Analysis
-
max time kernel
119s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 08:11
Static task
static1
Behavioral task
behavioral1
Sample
c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe
-
Size
2.7MB
-
MD5
c55a1025c4df82e48ceb1a5dc2b5b0b0
-
SHA1
93c653780f77f5ccf2d5579e98735f1b19a24977
-
SHA256
309f7038bb084779ad99eab6dcb95152129a8b5ed2622ec4c6d95ab5d7b888ed
-
SHA512
61a89bcf47e7a21eb4e407832905489499c321154fd626f2881f02fdf56c9fdf41ddbd786fa09915c0c0ad2ef17d1fd10e0100dcca1da946d013039d67770371
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB/9w4Sx:+R0pI/IQlUoMPdmpSpz4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4512 xbodloc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeRD\\xbodloc.exe" c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBO0\\dobxsys.exe" c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbodloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 4512 xbodloc.exe 4512 xbodloc.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 4512 xbodloc.exe 4512 xbodloc.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 4512 xbodloc.exe 4512 xbodloc.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 4512 xbodloc.exe 4512 xbodloc.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 4512 xbodloc.exe 4512 xbodloc.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 4512 xbodloc.exe 4512 xbodloc.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 4512 xbodloc.exe 4512 xbodloc.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 4512 xbodloc.exe 4512 xbodloc.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 4512 xbodloc.exe 4512 xbodloc.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 4512 xbodloc.exe 4512 xbodloc.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 4512 xbodloc.exe 4512 xbodloc.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 4512 xbodloc.exe 4512 xbodloc.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 4512 xbodloc.exe 4512 xbodloc.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 4512 xbodloc.exe 4512 xbodloc.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 4512 xbodloc.exe 4512 xbodloc.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1892 wrote to memory of 4512 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 88 PID 1892 wrote to memory of 4512 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 88 PID 1892 wrote to memory of 4512 1892 c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe"C:\Users\Admin\AppData\Local\Temp\c55a1025c4df82e48ceb1a5dc2b5b0b0N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\AdobeRD\xbodloc.exeC:\AdobeRD\xbodloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5dac427088f5d37a7dab4ab5d5fcaeda1
SHA1518b0c5ab9f62e87d9f1469f5e05fbdd6bb1c199
SHA256ea06d027b23882c532722b9d13756f77a7f2fee94e2f3e8c95d2cb021ef020ed
SHA512e1f2e913e61110082b3c2a817b6731c1cce9feefe3766b2fa66cf0183bc2592ff2f3c4628732eb4262801baf53c734753b626d7f287c0a762f2b79976f6a3286
-
Filesize
2.7MB
MD58cefce4cbd43d66972dbca7bcb7ade26
SHA133d166df153e282f91c67bc079e3894d28221e6d
SHA25605394f94f27e4029ce66aeb13dd8980ee895480904043dd7255f8092e65ee2ff
SHA512872221a1909c84c5f6066f715757a013c9619172297ec5968242d2b55c21a85cf3a2caec86fbabf0768ee588aded63f6333147868ddd6a3680d8fea2efde8522
-
Filesize
200B
MD5e61d3223691d431143f9593e4828d5c3
SHA1335def4d17d72a2fd521adf3d448bbac2c723e15
SHA256d7cef62e40b0e4eba1a999eef1e60492444ee4bf36512011881292dece18ba98
SHA5120ed853f7afa4768cfbe0027095d56b549cec386b55a2d4868e58ea392d7b632e2e17b3d6c6deee8cfefc367968a26702663e4a505bc09947ce48d818015ea1ea