Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 16:39
Static task
static1
Behavioral task
behavioral1
Sample
f448a19121fbe153fa7ac2113d70feb0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f448a19121fbe153fa7ac2113d70feb0N.exe
Resource
win10v2004-20240802-en
General
-
Target
f448a19121fbe153fa7ac2113d70feb0N.exe
-
Size
2.7MB
-
MD5
f448a19121fbe153fa7ac2113d70feb0
-
SHA1
7d4f4ad0db81277fae1eb865cca49556819f2f37
-
SHA256
607c607ec847b2190a1f695514914d81bc60921ed29e639f35bb89981f976bbe
-
SHA512
7accafabb944235959473bb337a0a7d82fb99064edc454d9096bf19b2736f059f908f777c2429d7b21215a845703798bf8d811a33f6bc7143468b88c3ce906c0
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB49w4S+:+R0pI/IQlUoMPdmpSpW4X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3636 adobec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Files8A\\adobec.exe" f448a19121fbe153fa7ac2113d70feb0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZIZ\\bodxloc.exe" f448a19121fbe153fa7ac2113d70feb0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f448a19121fbe153fa7ac2113d70feb0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 3636 adobec.exe 3636 adobec.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 3636 adobec.exe 3636 adobec.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 3636 adobec.exe 3636 adobec.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 3636 adobec.exe 3636 adobec.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 3636 adobec.exe 3636 adobec.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 3636 adobec.exe 3636 adobec.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 3636 adobec.exe 3636 adobec.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 3636 adobec.exe 3636 adobec.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 3636 adobec.exe 3636 adobec.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 3636 adobec.exe 3636 adobec.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 3636 adobec.exe 3636 adobec.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 3636 adobec.exe 3636 adobec.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 3636 adobec.exe 3636 adobec.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 3636 adobec.exe 3636 adobec.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 3636 adobec.exe 3636 adobec.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 1016 f448a19121fbe153fa7ac2113d70feb0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1016 wrote to memory of 3636 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 88 PID 1016 wrote to memory of 3636 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 88 PID 1016 wrote to memory of 3636 1016 f448a19121fbe153fa7ac2113d70feb0N.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\f448a19121fbe153fa7ac2113d70feb0N.exe"C:\Users\Admin\AppData\Local\Temp\f448a19121fbe153fa7ac2113d70feb0N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Files8A\adobec.exeC:\Files8A\adobec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5c21e51c07daf94992f7c9d0e99fa0536
SHA19bc75aee599c39e3ca82fa771cf63fbefabdf9a5
SHA2564b3bef3e6dfa66bfeb56c2bb569cc7e38a158dc2b9d62ef14619260e95a331d0
SHA512e3cf1b6f0827c0705ee486fe43a95aea5351f263261ea7ecad4bcb14e139e675f17000ac6ae76b4978f745d6e2299b69068fdc32753fb5fe91b623d179f09a88
-
Filesize
135KB
MD556b685630ddb2903ce17c53e5e7c73ef
SHA141eb300a052c603401d7df98cfeb3f0323cd504a
SHA25651766f8bfc92f55ee21a11829756b6e9f143d9bc57247d60dc6ef4812a5411d3
SHA5122c1050d1f04e86fcc300bfc8d961ac7659fb2f46212c505fc31e0b7228d48acf457ec996e2533e331cc19c7727508627f24418a9072a3682d23ef032d898e691
-
Filesize
2.7MB
MD50845a1abcd363d5f74ab2af728c9ae45
SHA11c8e1147efec3c2f725b144e85e415e72049c582
SHA256058db6ac9143f8c11adc2cb895b76e69b91bcb667d718c2789e22ebebc619028
SHA512e8bee42bc8d6846e28b0f0c02ccabb2ca7a5f4c04c15bd0e0fa6184e280cdf730e002569904b8ae213f3173f921ff111d054a4612977121c9b007dfba43e3c53
-
Filesize
200B
MD50075f89ee2da0fcfb7eef9e8ad439de1
SHA1a37cdf792b62a4fd2175e29ac7af39a47b317e4e
SHA256fbd1f2ffe710c685cdbcba89f52bb8ca6c0f2c9b62ff55483f1f923b700065d8
SHA5129d473c93a4dea56eb1c0b377672469bdb157b59d8ff0198f6604c546236bb208550e4b65274a3c408cddb3b3cf5650230faf883d33c289cd8cde5e1278e78631