Analysis
-
max time kernel
119s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 20:37
Static task
static1
Behavioral task
behavioral1
Sample
8bf62b994617b4b305d7162e907355c0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8bf62b994617b4b305d7162e907355c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
8bf62b994617b4b305d7162e907355c0N.exe
-
Size
2.7MB
-
MD5
8bf62b994617b4b305d7162e907355c0
-
SHA1
155a5a449e89431fd616b877020fd0677eb18a83
-
SHA256
03af4a29336a171ee7b72d17cd1ad82ce32371ef93dae4b8245c51f189e43527
-
SHA512
191a07b6812e08cb0e3f6daa8c0c48a03b388d829930522b60128bf18ff799d4333b328f1940fa911f26cc3765cd1c8d23e9acbba25abaff4cd4656066d9931b
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB69w4Sx:+R0pI/IQlUoMPdmpSpg4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4116 xdobloc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeSD\\xdobloc.exe" 8bf62b994617b4b305d7162e907355c0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxQX\\boddevec.exe" 8bf62b994617b4b305d7162e907355c0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8bf62b994617b4b305d7162e907355c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdobloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3984 8bf62b994617b4b305d7162e907355c0N.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 4116 xdobloc.exe 4116 xdobloc.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 4116 xdobloc.exe 4116 xdobloc.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 4116 xdobloc.exe 4116 xdobloc.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 4116 xdobloc.exe 4116 xdobloc.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 4116 xdobloc.exe 4116 xdobloc.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 4116 xdobloc.exe 4116 xdobloc.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 4116 xdobloc.exe 4116 xdobloc.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 4116 xdobloc.exe 4116 xdobloc.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 4116 xdobloc.exe 4116 xdobloc.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 4116 xdobloc.exe 4116 xdobloc.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 4116 xdobloc.exe 4116 xdobloc.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 4116 xdobloc.exe 4116 xdobloc.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 4116 xdobloc.exe 4116 xdobloc.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 4116 xdobloc.exe 4116 xdobloc.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 4116 xdobloc.exe 4116 xdobloc.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe 3984 8bf62b994617b4b305d7162e907355c0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3984 wrote to memory of 4116 3984 8bf62b994617b4b305d7162e907355c0N.exe 90 PID 3984 wrote to memory of 4116 3984 8bf62b994617b4b305d7162e907355c0N.exe 90 PID 3984 wrote to memory of 4116 3984 8bf62b994617b4b305d7162e907355c0N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bf62b994617b4b305d7162e907355c0N.exe"C:\Users\Admin\AppData\Local\Temp\8bf62b994617b4b305d7162e907355c0N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\AdobeSD\xdobloc.exeC:\AdobeSD\xdobloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD59d34542776cb3364063ab8097b574830
SHA13c97ce96ac2b02d3a4d587868086d8fbcfe269ce
SHA256425dcb87c7794003f29d627d4050b200432518011fc9093afcd03f3fe3943fee
SHA5122c66584ade3c448f1836bc00e41df6ec0f4cd5d6ca7a91646ced1f9b89ff3876833ff9f6bbe78ae9b5b6f46179558252dc528f5ea0374832da1e932a4966204c
-
Filesize
135KB
MD5ca4f54a252e10abf9a3faf25cdb28884
SHA1b2553ee6adb54abd68b3019a463dc5a72a25592e
SHA25647041a255022b0311863b35db8f8a38c557bc969a927ab925358bdbe3d635717
SHA512889cc61891ae862eb8adfa3073a772f0510571573bba2e7a9a690054869a7884080554cd5f0db6b1fcdd440d58d20221a724321091ccf56e9726dea49fcc1c48
-
Filesize
2.7MB
MD5566e44c07939202c7e5aca2204a2e2f1
SHA163275687898af770608e8e0402703abd3e571192
SHA256469115b5bdaccc3f77cb72dd738a471e1530d1c2fb6488227797580b163a82e8
SHA5125dd87f6ce43e6b7eefc3e83694a19293e079ae93956e23174f0c060db33965f78ad833d2315915e19e4df00da475daeaa58e79ac89cb6803bdc551f27585439b
-
Filesize
204B
MD5f50c05477dba14571cd9458e07b782cf
SHA161224ae6da8df8dba816b6461766b2af43bfff7a
SHA256d846b88f68bcbbe28f28f272b538f0767dcfaf43b7e11166bd275edff4218c5a
SHA51200771bee8b7d4b1d8ab76dea1d0000b8b006acbfa8c8cf62c4bf13ff6d5772497caf0502fc3e3f219b98ca48d7549a0a7a265ffea1c6c738ae53ed2d4cd401df