Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
4c2710f13741730b028ce8c2416e6bb0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4c2710f13741730b028ce8c2416e6bb0N.exe
Resource
win10v2004-20240802-en
General
-
Target
4c2710f13741730b028ce8c2416e6bb0N.exe
-
Size
2.7MB
-
MD5
4c2710f13741730b028ce8c2416e6bb0
-
SHA1
48cac1dbb843140cf5efd6b60312ce65a3dfe68b
-
SHA256
6cefce0c80f23efe4f6df700691d52cbe155215bbbbcca340b47b88f880599a8
-
SHA512
fba30299f31a2f9269e3e2540e07e42be1e5974e8a7fa76540f85650e30c336eedfa31a97a3e1e7c1cc4fee66b1a06f8e344e46277e63f1401cda2ca99fc93a8
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBo9w4S+:+R0pI/IQlUoMPdmpSpe4X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4884 adobec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeFG\\adobec.exe" 4c2710f13741730b028ce8c2416e6bb0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxPB\\dobaec.exe" 4c2710f13741730b028ce8c2416e6bb0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c2710f13741730b028ce8c2416e6bb0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4884 adobec.exe 4884 adobec.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4884 adobec.exe 4884 adobec.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4884 adobec.exe 4884 adobec.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4884 adobec.exe 4884 adobec.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4884 adobec.exe 4884 adobec.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4884 adobec.exe 4884 adobec.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4884 adobec.exe 4884 adobec.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4884 adobec.exe 4884 adobec.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4884 adobec.exe 4884 adobec.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4884 adobec.exe 4884 adobec.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4884 adobec.exe 4884 adobec.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4884 adobec.exe 4884 adobec.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4884 adobec.exe 4884 adobec.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4884 adobec.exe 4884 adobec.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4884 adobec.exe 4884 adobec.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 4248 4c2710f13741730b028ce8c2416e6bb0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4248 wrote to memory of 4884 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 87 PID 4248 wrote to memory of 4884 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 87 PID 4248 wrote to memory of 4884 4248 4c2710f13741730b028ce8c2416e6bb0N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c2710f13741730b028ce8c2416e6bb0N.exe"C:\Users\Admin\AppData\Local\Temp\4c2710f13741730b028ce8c2416e6bb0N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\AdobeFG\adobec.exeC:\AdobeFG\adobec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD54aa65fcf5d18c068218eee5b79fa3d6a
SHA16f31643e0d1c89e8ba03543711d33304b7bab5fa
SHA256825ee1dc6afdc64b32e7371ffb7017e6c1792df02cb351e99557a0f66c825d22
SHA512470661123a68fe1fdf0d6e415fe03cc14a783dcbaf40ecb63f88923d3485c1e54d3f4090979a7463cfc35b129dd6bd4a94101aa214a896da6ad23603f6b0ef13
-
Filesize
28KB
MD5c0b5a335108a310fc6d5fd355a6901e3
SHA1adcffc72bb6f2d986765a82a5b42cf7ef122f1a2
SHA256652dba79b20ca7d8ab5f06aab64948bddef364ed1ee3b1e7cba3cc6c548004de
SHA5122284a1315376c85f3ce3a235f6369457e0bdf0cc95223992585944f36cf3497ff6762e7ddcac6092600370aff03884a0542c3049e3f7fe96926b7ab4ef2b4bbb
-
Filesize
201B
MD5925ada8ca4b0ef2f08f5fb1b136cc307
SHA1cdb574e79d45689e032107d7b4fa32f1de5648c1
SHA256a95b830fa0f62733e5e8d77ebe7c3c38b2ed4cbd5e77f19fa4fbee534a23f05e
SHA5128beda1ac983badbed457fea8f16931290bf77534960f7336cc98429b532c2d7867e44e3e05310f743c936227a9f069c4185d8d112dbc291cbddc6656a0650246