Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 09:18
Static task
static1
Behavioral task
behavioral1
Sample
518e54f2369a4355c3abfbd26dd86f00N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
518e54f2369a4355c3abfbd26dd86f00N.exe
Resource
win10v2004-20240802-en
General
-
Target
518e54f2369a4355c3abfbd26dd86f00N.exe
-
Size
2.7MB
-
MD5
518e54f2369a4355c3abfbd26dd86f00
-
SHA1
737936e67b5c5b5154e83bd6126478931a40be4d
-
SHA256
174e92ef5dae2751614bd63a55a89ee181e3eb2ecf932039b4a123db513cdc95
-
SHA512
4adee3b2007a2d6a3c5eadb0c7d96bb31e1f2951f7152de222f0cdac7e0ab7859322bb7fc714129dcf431eb24a51f7992dd23db7f19d12d4ffec1fab13137fb0
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBU9w4Sx:+R0pI/IQlUoMPdmpSpK4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2508 abodec.exe -
Loads dropped DLL 1 IoCs
pid Process 3032 518e54f2369a4355c3abfbd26dd86f00N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDot71\\abodec.exe" 518e54f2369a4355c3abfbd26dd86f00N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZUF\\bodaloc.exe" 518e54f2369a4355c3abfbd26dd86f00N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 518e54f2369a4355c3abfbd26dd86f00N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abodec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 2508 abodec.exe 3032 518e54f2369a4355c3abfbd26dd86f00N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2508 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 30 PID 3032 wrote to memory of 2508 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 30 PID 3032 wrote to memory of 2508 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 30 PID 3032 wrote to memory of 2508 3032 518e54f2369a4355c3abfbd26dd86f00N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\518e54f2369a4355c3abfbd26dd86f00N.exe"C:\Users\Admin\AppData\Local\Temp\518e54f2369a4355c3abfbd26dd86f00N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\UserDot71\abodec.exeC:\UserDot71\abodec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5db653b2ce97f8a9422b6197ad7e1ef6e
SHA1d9f3dd6a4ae216c583fa5b66fae68603bfb66d74
SHA2564a6abd52cd8e28438e9ad0334fc58b7190725e10c7af327235227f34560a001a
SHA5121527a6bf85240e7f5514578dd7680c347e3098deb7a0d775d37b0055cb815a4a3c376cce37a95c101e0b17c896a5717bcea4386d55badf79d76d17ee34fecef1
-
Filesize
202B
MD5ab2b2d219889cbb5a14f5fd337a117cd
SHA1602a4ae80481869074ac075a97d94349239da3ca
SHA256be2b8206c6861a0d452b44cbee55e97a7c978622b2eec6ed843787214922c197
SHA5125b8f208cd5bc31a541608f3ded908f4ca023799b71a4786df3d5876863d85f50a3c00111d0ff4728c5b8f0abc4083976830effd3f1334d57fb0cf31570384db1
-
Filesize
2.7MB
MD5b874ebbc99da9ebf9e6db3bbc91d3b97
SHA1e2347345bb68c77702acb673138d8fe306bf29ef
SHA25664d9e7727ce3f52db5fd324b42fc4064e087f909e934e227085eb6c6cf872d90
SHA5120960600b8dde7116c754db2c15259a1818133baea91f440ea2d65045a1a6632e1ffa337ec9eb5d41af7689bf2b647c7192baf551deabcd09efb6b5c7e784ca36