Analysis
-
max time kernel
14s -
max time network
102s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
08-11-2020 17:47
Static task
static1
Behavioral task
behavioral1
Sample
1659e923ca5d1e286f0d6c624abb7e99f75fa2e364d48e797d98051feffa6492.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
1659e923ca5d1e286f0d6c624abb7e99f75fa2e364d48e797d98051feffa6492.exe
Resource
win10v20201028
General
-
Target
1659e923ca5d1e286f0d6c624abb7e99f75fa2e364d48e797d98051feffa6492.exe
-
Size
1.9MB
-
MD5
5df8c79d010a75696cd308ee58ceb98b
-
SHA1
a60fa7200552f46dc19e3f756a1f40b14f3a93be
-
SHA256
1659e923ca5d1e286f0d6c624abb7e99f75fa2e364d48e797d98051feffa6492
-
SHA512
1f0eb9154dc00253b6a5716f513441dfbbdddb5f98ee29198ec61d7086cfdebd58e8b44e57e69d35f83798a995578e1abacd2a85916b2c31f76481a9ea3df10c
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
autoplay.exepid process 792 autoplay.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
Processes:
1659e923ca5d1e286f0d6c624abb7e99f75fa2e364d48e797d98051feffa6492.exedescription ioc process File opened for modification C:\Program Files (x86)\Adobe Systems Incorporated\Autoplay\autoplay.exe 1659e923ca5d1e286f0d6c624abb7e99f75fa2e364d48e797d98051feffa6492.exe File opened for modification C:\Program Files (x86)\Adobe Systems Incorporated\Autoplay\Uninstall.exe 1659e923ca5d1e286f0d6c624abb7e99f75fa2e364d48e797d98051feffa6492.exe File created C:\Program Files (x86)\Adobe Systems Incorporated\Autoplay\Uninstall.ini 1659e923ca5d1e286f0d6c624abb7e99f75fa2e364d48e797d98051feffa6492.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
autoplay.exepid process 792 autoplay.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
1659e923ca5d1e286f0d6c624abb7e99f75fa2e364d48e797d98051feffa6492.exedescription pid process target process PID 4756 wrote to memory of 792 4756 1659e923ca5d1e286f0d6c624abb7e99f75fa2e364d48e797d98051feffa6492.exe autoplay.exe PID 4756 wrote to memory of 792 4756 1659e923ca5d1e286f0d6c624abb7e99f75fa2e364d48e797d98051feffa6492.exe autoplay.exe PID 4756 wrote to memory of 792 4756 1659e923ca5d1e286f0d6c624abb7e99f75fa2e364d48e797d98051feffa6492.exe autoplay.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1659e923ca5d1e286f0d6c624abb7e99f75fa2e364d48e797d98051feffa6492.exe"C:\Users\Admin\AppData\Local\Temp\1659e923ca5d1e286f0d6c624abb7e99f75fa2e364d48e797d98051feffa6492.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Program Files (x86)\Adobe Systems Incorporated\Autoplay\autoplay.exe"C:\Program Files (x86)\Adobe Systems Incorporated\Autoplay\autoplay.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:792
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Adobe Systems Incorporated\Autoplay\autoplay.exeMD5
d4fb9cb4f499568ad1ff3db84d6c852a
SHA139a23eb91f5fd356700759b951318a4a9c04b51f
SHA2569015be133879332704e9ebe3e7af65c8601da25cf412b0a352604e8c8e193fc2
SHA512091d9fbd7f6c3688ae6387f870c030600ac22dd3133b5ba658b7796df69790453f7e0e73b6474730215ed4b41a558ed12c330b35584bf7a1b339eb00e37b7b49
-
C:\Program Files (x86)\Adobe Systems Incorporated\Autoplay\autoplay.exeMD5
d4fb9cb4f499568ad1ff3db84d6c852a
SHA139a23eb91f5fd356700759b951318a4a9c04b51f
SHA2569015be133879332704e9ebe3e7af65c8601da25cf412b0a352604e8c8e193fc2
SHA512091d9fbd7f6c3688ae6387f870c030600ac22dd3133b5ba658b7796df69790453f7e0e73b6474730215ed4b41a558ed12c330b35584bf7a1b339eb00e37b7b49
-
memory/792-0-0x0000000000000000-mapping.dmp
-
memory/792-3-0x0000000073E90000-0x0000000073F23000-memory.dmpFilesize
588KB