Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 04:31
Static task
static1
Behavioral task
behavioral1
Sample
26d13895532e66adf318a94b972becb0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
26d13895532e66adf318a94b972becb0N.exe
Resource
win10v2004-20240802-en
General
-
Target
26d13895532e66adf318a94b972becb0N.exe
-
Size
2.7MB
-
MD5
26d13895532e66adf318a94b972becb0
-
SHA1
fd190ece74b2c2e76bfc49d4679b084827c9818c
-
SHA256
fd440efe98060b44918fd9c0874a1d2105d2f59864c44c9a22e298fcb571b454
-
SHA512
01a68678ac3180201e38700ea095124c196eb9e539bd8be07123a050ba69b1696e0c0b572bc475ba0695840ba3bb2300688fb1338db5db4d2e598c31c0ede16f
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBL9w4Sx:+R0pI/IQlUoMPdmpSpz4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4748 adobec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Vid9P\\boddevsys.exe" 26d13895532e66adf318a94b972becb0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeQI\\adobec.exe" 26d13895532e66adf318a94b972becb0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26d13895532e66adf318a94b972becb0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3464 26d13895532e66adf318a94b972becb0N.exe 3464 26d13895532e66adf318a94b972becb0N.exe 3464 26d13895532e66adf318a94b972becb0N.exe 3464 26d13895532e66adf318a94b972becb0N.exe 4748 adobec.exe 4748 adobec.exe 3464 26d13895532e66adf318a94b972becb0N.exe 3464 26d13895532e66adf318a94b972becb0N.exe 4748 adobec.exe 4748 adobec.exe 3464 26d13895532e66adf318a94b972becb0N.exe 3464 26d13895532e66adf318a94b972becb0N.exe 4748 adobec.exe 4748 adobec.exe 3464 26d13895532e66adf318a94b972becb0N.exe 3464 26d13895532e66adf318a94b972becb0N.exe 4748 adobec.exe 4748 adobec.exe 3464 26d13895532e66adf318a94b972becb0N.exe 3464 26d13895532e66adf318a94b972becb0N.exe 4748 adobec.exe 4748 adobec.exe 3464 26d13895532e66adf318a94b972becb0N.exe 3464 26d13895532e66adf318a94b972becb0N.exe 4748 adobec.exe 4748 adobec.exe 3464 26d13895532e66adf318a94b972becb0N.exe 3464 26d13895532e66adf318a94b972becb0N.exe 4748 adobec.exe 4748 adobec.exe 3464 26d13895532e66adf318a94b972becb0N.exe 3464 26d13895532e66adf318a94b972becb0N.exe 4748 adobec.exe 4748 adobec.exe 3464 26d13895532e66adf318a94b972becb0N.exe 3464 26d13895532e66adf318a94b972becb0N.exe 4748 adobec.exe 4748 adobec.exe 3464 26d13895532e66adf318a94b972becb0N.exe 3464 26d13895532e66adf318a94b972becb0N.exe 4748 adobec.exe 4748 adobec.exe 3464 26d13895532e66adf318a94b972becb0N.exe 3464 26d13895532e66adf318a94b972becb0N.exe 4748 adobec.exe 4748 adobec.exe 3464 26d13895532e66adf318a94b972becb0N.exe 3464 26d13895532e66adf318a94b972becb0N.exe 4748 adobec.exe 4748 adobec.exe 3464 26d13895532e66adf318a94b972becb0N.exe 3464 26d13895532e66adf318a94b972becb0N.exe 4748 adobec.exe 4748 adobec.exe 3464 26d13895532e66adf318a94b972becb0N.exe 3464 26d13895532e66adf318a94b972becb0N.exe 4748 adobec.exe 4748 adobec.exe 3464 26d13895532e66adf318a94b972becb0N.exe 3464 26d13895532e66adf318a94b972becb0N.exe 4748 adobec.exe 4748 adobec.exe 3464 26d13895532e66adf318a94b972becb0N.exe 3464 26d13895532e66adf318a94b972becb0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3464 wrote to memory of 4748 3464 26d13895532e66adf318a94b972becb0N.exe 89 PID 3464 wrote to memory of 4748 3464 26d13895532e66adf318a94b972becb0N.exe 89 PID 3464 wrote to memory of 4748 3464 26d13895532e66adf318a94b972becb0N.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\26d13895532e66adf318a94b972becb0N.exe"C:\Users\Admin\AppData\Local\Temp\26d13895532e66adf318a94b972becb0N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\AdobeQI\adobec.exeC:\AdobeQI\adobec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5ab2271647a78966d3e6cb4da28d8a038
SHA1d4c158772869dada362ea54fcfe332df5376227f
SHA256ce8019697e569761b566dc388766b425830f14db2dfdfe6021b924f0261b57a9
SHA512d43434030d5ea619dee58d27d4f7d55b0534372e1c1d976943fe6d5ea0209ace14edd524a01be747bcd3da0ea6893b437d5d20951e05fc0bea2751ee0750d41b
-
Filesize
201B
MD5251c502b333462b2edce5756b2d49182
SHA172d79a0e41b51e4c2c117e7e3e2e13c5bab7ecaa
SHA2565c2fb81c63b75cd5b6f0da24e43ae28cdb248b7d07936ba8e841e70d4976a51a
SHA51281c80a00fa6ff5b3266f83c5b325d756dde5be081dda73d5f6e6e13c6535cb4b9de084725c9045b79f514220508c5d0611d8f4868a6ebad274838e524d334bcc
-
Filesize
2.7MB
MD5ee699310897678350cc8cc63b40b8c3b
SHA1c4457d4ef7da5df93bb4bbb546d3107e76b01ead
SHA256e2d866d3065660c2ec5fae3967d92951384f48fdb3639a92c4919f225a32046a
SHA5126ad8b42ff5d777b6a17ac50fa0f49133cea3310ae49cfd2900d800606ab52067a070014c395e0f64988daa3c852d56d544ec03c9a22bbe90ef2782b59dc9c7ca