Analysis
-
max time kernel
119s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 10:54
Static task
static1
Behavioral task
behavioral1
Sample
7dcfdf2a3f5c279d8b7a481e0b565e80N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7dcfdf2a3f5c279d8b7a481e0b565e80N.exe
Resource
win10v2004-20240802-en
General
-
Target
7dcfdf2a3f5c279d8b7a481e0b565e80N.exe
-
Size
2.7MB
-
MD5
7dcfdf2a3f5c279d8b7a481e0b565e80
-
SHA1
057017f108dd148b4043ce6411358a302e5c766c
-
SHA256
752a4dccee7a0d49ca10b04ba344ef5790cf37bddbcc8a92e11f663fd3581b75
-
SHA512
36e0966dda82fbbbe43b27e95eb305e4ce7e8a13d10d893dc7ed3c4d5339c911ed67ea88dc8130e22efcd42f548706fd726a79e8b65370d1e5f374a9108e9b92
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBS9w4S+:+R0pI/IQlUoMPdmpSpg4X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2020 abodsys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Intelproc5U\\abodsys.exe" 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintJY\\bodasys.exe" 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abodsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2020 abodsys.exe 2020 abodsys.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2020 abodsys.exe 2020 abodsys.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2020 abodsys.exe 2020 abodsys.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2020 abodsys.exe 2020 abodsys.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2020 abodsys.exe 2020 abodsys.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2020 abodsys.exe 2020 abodsys.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2020 abodsys.exe 2020 abodsys.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2020 abodsys.exe 2020 abodsys.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2020 abodsys.exe 2020 abodsys.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2020 abodsys.exe 2020 abodsys.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2020 abodsys.exe 2020 abodsys.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2020 abodsys.exe 2020 abodsys.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2020 abodsys.exe 2020 abodsys.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2020 abodsys.exe 2020 abodsys.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2020 abodsys.exe 2020 abodsys.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2020 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 89 PID 2988 wrote to memory of 2020 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 89 PID 2988 wrote to memory of 2020 2988 7dcfdf2a3f5c279d8b7a481e0b565e80N.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dcfdf2a3f5c279d8b7a481e0b565e80N.exe"C:\Users\Admin\AppData\Local\Temp\7dcfdf2a3f5c279d8b7a481e0b565e80N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Intelproc5U\abodsys.exeC:\Intelproc5U\abodsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD596e2066e15008674ef42ec68f7d670e3
SHA100d5e4ca7ad34afe55d9d7b6c9060dbcf0f319d5
SHA256ed2330243d5ec773cf50e2540445b16b1e8f385a4e3d5bbd8925c4ee6e731054
SHA5124466e6ea6eef525c5998c26d0e8cf828f8b4e4aeb3bc9d26171c0259841eea9adbfa82e45ccc22da63df2234284c24eadb23582fb313aaad64d17a0a82024808
-
Filesize
77KB
MD5963a064ea93e8527f0ac5336f025d98d
SHA1108279179d21224b622cbde801674b56c9a84e69
SHA256d13724d347e56358e1317a8099c0952fba21a5ce950e9fe755e28b65bb78f2e1
SHA5126f4dbbf753c498d53f6d58cb434a802e408bac5e1b70238aedf86b6fe52c602ba288306a4b8b559b4959e49d6fdaafbef3496aad8945b0a36456df8eac088c24
-
Filesize
204B
MD5b2ac35ac3af45b88f5c73cb4b002f842
SHA14b5c4fe1d97fabdaeeb2b6c403943fb5a6672d74
SHA256f6401c2781ed40a63b16c83b02e592f918afc7598abf71635918764c83e58cf8
SHA512d4b43a0cc9f6041730dc44ba48287744bd31f2b41d47dcba3b568c46bd667ad8e79881476b1001679e1eabfffbb2bb7b5d31154ea001db3d52eab5c34635a0bc