Analysis
-
max time kernel
119s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 15:17
Static task
static1
Behavioral task
behavioral1
Sample
5de2318df9b9aa7b32408e7fb759da80N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5de2318df9b9aa7b32408e7fb759da80N.exe
Resource
win10v2004-20240802-en
General
-
Target
5de2318df9b9aa7b32408e7fb759da80N.exe
-
Size
2.7MB
-
MD5
5de2318df9b9aa7b32408e7fb759da80
-
SHA1
e27676f3c11575686763ed91a57af4ae6467156e
-
SHA256
5c73a37077fceadedaa90f3b3412f1cf10496bf35ccd01339a7499ae40af50a7
-
SHA512
24b39f1929b1e8ecd0bf06f68bd913651d862b459833c523bc56248a691fbe0f21ef64581c113d1c3a7b44de8ad716bebb3f75a9b7a9c517751ac9fd98d34ac0
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB59w4Sx:+R0pI/IQlUoMPdmpSpB4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5872 adobloc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocW2\\adobloc.exe" 5de2318df9b9aa7b32408e7fb759da80N.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidJE\\optixloc.exe" 5de2318df9b9aa7b32408e7fb759da80N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobloc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5de2318df9b9aa7b32408e7fb759da80N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5872 adobloc.exe 5872 adobloc.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5872 adobloc.exe 5872 adobloc.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5872 adobloc.exe 5872 adobloc.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5872 adobloc.exe 5872 adobloc.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5872 adobloc.exe 5872 adobloc.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5872 adobloc.exe 5872 adobloc.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5872 adobloc.exe 5872 adobloc.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5872 adobloc.exe 5872 adobloc.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5872 adobloc.exe 5872 adobloc.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5872 adobloc.exe 5872 adobloc.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5872 adobloc.exe 5872 adobloc.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5872 adobloc.exe 5872 adobloc.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5872 adobloc.exe 5872 adobloc.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5872 adobloc.exe 5872 adobloc.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5872 adobloc.exe 5872 adobloc.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 5488 5de2318df9b9aa7b32408e7fb759da80N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5488 wrote to memory of 5872 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 90 PID 5488 wrote to memory of 5872 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 90 PID 5488 wrote to memory of 5872 5488 5de2318df9b9aa7b32408e7fb759da80N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\5de2318df9b9aa7b32408e7fb759da80N.exe"C:\Users\Admin\AppData\Local\Temp\5de2318df9b9aa7b32408e7fb759da80N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5488 -
C:\IntelprocW2\adobloc.exeC:\IntelprocW2\adobloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5d33e193afd0cdb0032498db86fc20a24
SHA1199426941a8f42a507a4f0582f852261fadeda6c
SHA2560c10c56232bd80c08043bc9c3c37d57ef7909022984643773d51b8cfd0a04de0
SHA5121230cab4decc432579ab2980acacb3f8bf0dedc6f65fdc128066952a94da81d8c22d4b5d4926b6adea8b875ac8cc4f076908e772874c437af8a20d42b9e022c7
-
Filesize
206B
MD5f5ce26e373c876f18d6a3ca4cac9ddc9
SHA19329b347d963803dc74260ba5992cf9b9374b869
SHA256ad1b3ddade28c947bb4a519e97f0753e23a80d33fbd49c7c52a0b7cfd029f294
SHA5123119aecaf029d5fa8121ce61276ed9d03a487563dbf84ef317c028f481565bdaef584a13073c2cc0fe7b9b14bb5ddfd76673698c4131b7b305729438a4bd3090
-
Filesize
488KB
MD58aaef3f8b26449122e13927420418419
SHA17cfa91758a903fe518c961d7d05d46609d1dcaa3
SHA256fbf786f3c6ee3de335a10b86e8a699b583feef42657d310e50dd7df748f80cad
SHA51208173b13b133bf298a6bd0dcfb365c6be3573c338587dbdd599a8cf66fab6bcdf4a9e0d54fa2358d30f706a3d440887743406f7938b94dbb23612379f5d25311