Analysis
-
max time kernel
133s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
17-05-2022 11:34
Static task
static1
Behavioral task
behavioral1
Sample
0001c0ae92bc16dc5b0ced0adf389dea116f212f48cefb6c1bce03ff3edca4b0.exe
Resource
win7-20220414-en
General
-
Target
0001c0ae92bc16dc5b0ced0adf389dea116f212f48cefb6c1bce03ff3edca4b0.exe
-
Size
2.8MB
-
MD5
4259efb42bb04c33478f4810895659f8
-
SHA1
1b3c9195d7ace9ad65192bb009b3709f6016ecb9
-
SHA256
0001c0ae92bc16dc5b0ced0adf389dea116f212f48cefb6c1bce03ff3edca4b0
-
SHA512
5ec8282882ef7f533cd6f5c85b23e62117172e4274f38b0e222f7e649a3fab13b243258e6cc11c9f0697f4e7c3002494362c92b050c5d39524700bd20e7e9294
Malware Config
Signatures
-
Detects Eternity worm 15 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\tmp3EB9.tmp.exe eternity_worm C:\Users\Admin\AppData\Local\Temp\tmp3EB9.tmp.exe eternity_worm behavioral2/memory/456-139-0x0000000000080000-0x00000000001D6000-memory.dmp eternity_worm C:\Users\Admin\AppData\Local\Temp\AFWAAFRXKO.exe eternity_worm C:\Users\Admin\AppData\Local\Temp\AFWAAFRXKO.exe eternity_worm C:\Users\Admin\AppData\Local\ServiceHub\tmp3EB9.tmp.exe eternity_worm C:\Users\Admin\AppData\Local\ServiceHub\AFWAAFRXKO.exe eternity_worm C:\Users\Admin\AppData\Local\ServiceHub\AFWAAFRXKO.exe eternity_worm C:\Users\Admin\AppData\Local\ServiceHub\tmp3EB9.tmp.exe eternity_worm C:\Users\Admin\AppData\Local\ServiceHub\AFWAAFRXKO.exe eternity_worm C:\Users\Admin\AppData\Local\ServiceHub\tmp3EB9.tmp.exe eternity_worm C:\Users\Admin\AppData\Local\ServiceHub\tmp3EB9.tmp.exe eternity_worm C:\Users\Admin\AppData\Local\ServiceHub\AFWAAFRXKO.exe eternity_worm C:\Users\Admin\AppData\Local\ServiceHub\tmp3EB9.tmp.exe eternity_worm C:\Users\Admin\AppData\Local\ServiceHub\AFWAAFRXKO.exe eternity_worm -
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Executes dropped EXE 11 IoCs
Processes:
YtRMjraM.exetmp3EB9.tmp.exeAFWAAFRXKO.exetmp3EB9.tmp.exeAFWAAFRXKO.exeAFWAAFRXKO.exetmp3EB9.tmp.exetmp3EB9.tmp.exeAFWAAFRXKO.exetmp3EB9.tmp.exeAFWAAFRXKO.exepid process 3728 YtRMjraM.exe 456 tmp3EB9.tmp.exe 4660 AFWAAFRXKO.exe 208 tmp3EB9.tmp.exe 3464 AFWAAFRXKO.exe 2528 AFWAAFRXKO.exe 4860 tmp3EB9.tmp.exe 1624 tmp3EB9.tmp.exe 2008 AFWAAFRXKO.exe 1724 tmp3EB9.tmp.exe 3828 AFWAAFRXKO.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0001c0ae92bc16dc5b0ced0adf389dea116f212f48cefb6c1bce03ff3edca4b0.exeYtRMjraM.exetmp3EB9.tmp.exeAFWAAFRXKO.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 0001c0ae92bc16dc5b0ced0adf389dea116f212f48cefb6c1bce03ff3edca4b0.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation YtRMjraM.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation tmp3EB9.tmp.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation AFWAAFRXKO.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4340 schtasks.exe 2560 schtasks.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
YtRMjraM.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings YtRMjraM.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
AcroRd32.exeAdobeARM.exepid process 5052 AcroRd32.exe 5052 AcroRd32.exe 5052 AcroRd32.exe 5052 AcroRd32.exe 5052 AcroRd32.exe 5052 AcroRd32.exe 5052 AcroRd32.exe 5052 AcroRd32.exe 5052 AcroRd32.exe 5052 AcroRd32.exe 5052 AcroRd32.exe 5052 AcroRd32.exe 5052 AcroRd32.exe 5052 AcroRd32.exe 5052 AcroRd32.exe 5052 AcroRd32.exe 5052 AcroRd32.exe 5052 AcroRd32.exe 5052 AcroRd32.exe 5052 AcroRd32.exe 1168 AdobeARM.exe 1168 AdobeARM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
tmp3EB9.tmp.exetmp3EB9.tmp.exetmp3EB9.tmp.exedescription pid process Token: SeDebugPrivilege 208 tmp3EB9.tmp.exe Token: SeDebugPrivilege 1624 tmp3EB9.tmp.exe Token: SeDebugPrivilege 1724 tmp3EB9.tmp.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
AcroRd32.exeAdobeARM.exepid process 5052 AcroRd32.exe 5052 AcroRd32.exe 5052 AcroRd32.exe 5052 AcroRd32.exe 5052 AcroRd32.exe 5052 AcroRd32.exe 1168 AdobeARM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0001c0ae92bc16dc5b0ced0adf389dea116f212f48cefb6c1bce03ff3edca4b0.exeYtRMjraM.exetmp3EB9.tmp.execmd.exeAFWAAFRXKO.execmd.exeAcroRd32.exeRdrCEF.exedescription pid process target process PID 2076 wrote to memory of 3728 2076 0001c0ae92bc16dc5b0ced0adf389dea116f212f48cefb6c1bce03ff3edca4b0.exe YtRMjraM.exe PID 2076 wrote to memory of 3728 2076 0001c0ae92bc16dc5b0ced0adf389dea116f212f48cefb6c1bce03ff3edca4b0.exe YtRMjraM.exe PID 2076 wrote to memory of 3728 2076 0001c0ae92bc16dc5b0ced0adf389dea116f212f48cefb6c1bce03ff3edca4b0.exe YtRMjraM.exe PID 3728 wrote to memory of 5052 3728 YtRMjraM.exe AcroRd32.exe PID 3728 wrote to memory of 5052 3728 YtRMjraM.exe AcroRd32.exe PID 3728 wrote to memory of 5052 3728 YtRMjraM.exe AcroRd32.exe PID 2076 wrote to memory of 456 2076 0001c0ae92bc16dc5b0ced0adf389dea116f212f48cefb6c1bce03ff3edca4b0.exe tmp3EB9.tmp.exe PID 2076 wrote to memory of 456 2076 0001c0ae92bc16dc5b0ced0adf389dea116f212f48cefb6c1bce03ff3edca4b0.exe tmp3EB9.tmp.exe PID 2076 wrote to memory of 456 2076 0001c0ae92bc16dc5b0ced0adf389dea116f212f48cefb6c1bce03ff3edca4b0.exe tmp3EB9.tmp.exe PID 3728 wrote to memory of 4660 3728 YtRMjraM.exe AFWAAFRXKO.exe PID 3728 wrote to memory of 4660 3728 YtRMjraM.exe AFWAAFRXKO.exe PID 3728 wrote to memory of 4660 3728 YtRMjraM.exe AFWAAFRXKO.exe PID 456 wrote to memory of 3736 456 tmp3EB9.tmp.exe cmd.exe PID 456 wrote to memory of 3736 456 tmp3EB9.tmp.exe cmd.exe PID 456 wrote to memory of 3736 456 tmp3EB9.tmp.exe cmd.exe PID 3736 wrote to memory of 4768 3736 cmd.exe chcp.com PID 3736 wrote to memory of 4768 3736 cmd.exe chcp.com PID 3736 wrote to memory of 4768 3736 cmd.exe chcp.com PID 4660 wrote to memory of 4928 4660 AFWAAFRXKO.exe cmd.exe PID 4660 wrote to memory of 4928 4660 AFWAAFRXKO.exe cmd.exe PID 4660 wrote to memory of 4928 4660 AFWAAFRXKO.exe cmd.exe PID 3736 wrote to memory of 1092 3736 cmd.exe PING.EXE PID 3736 wrote to memory of 1092 3736 cmd.exe PING.EXE PID 3736 wrote to memory of 1092 3736 cmd.exe PING.EXE PID 4928 wrote to memory of 2640 4928 cmd.exe chcp.com PID 4928 wrote to memory of 2640 4928 cmd.exe chcp.com PID 4928 wrote to memory of 2640 4928 cmd.exe chcp.com PID 4928 wrote to memory of 1700 4928 cmd.exe PING.EXE PID 4928 wrote to memory of 1700 4928 cmd.exe PING.EXE PID 4928 wrote to memory of 1700 4928 cmd.exe PING.EXE PID 4928 wrote to memory of 2560 4928 cmd.exe schtasks.exe PID 4928 wrote to memory of 2560 4928 cmd.exe schtasks.exe PID 4928 wrote to memory of 2560 4928 cmd.exe schtasks.exe PID 3736 wrote to memory of 4340 3736 cmd.exe schtasks.exe PID 3736 wrote to memory of 4340 3736 cmd.exe schtasks.exe PID 3736 wrote to memory of 4340 3736 cmd.exe schtasks.exe PID 3736 wrote to memory of 208 3736 cmd.exe tmp3EB9.tmp.exe PID 3736 wrote to memory of 208 3736 cmd.exe tmp3EB9.tmp.exe PID 3736 wrote to memory of 208 3736 cmd.exe tmp3EB9.tmp.exe PID 4928 wrote to memory of 3464 4928 cmd.exe AFWAAFRXKO.exe PID 4928 wrote to memory of 3464 4928 cmd.exe AFWAAFRXKO.exe PID 4928 wrote to memory of 3464 4928 cmd.exe AFWAAFRXKO.exe PID 5052 wrote to memory of 2252 5052 AcroRd32.exe RdrCEF.exe PID 5052 wrote to memory of 2252 5052 AcroRd32.exe RdrCEF.exe PID 5052 wrote to memory of 2252 5052 AcroRd32.exe RdrCEF.exe PID 2252 wrote to memory of 1144 2252 RdrCEF.exe RdrCEF.exe PID 2252 wrote to memory of 1144 2252 RdrCEF.exe RdrCEF.exe PID 2252 wrote to memory of 1144 2252 RdrCEF.exe RdrCEF.exe PID 2252 wrote to memory of 1144 2252 RdrCEF.exe RdrCEF.exe PID 2252 wrote to memory of 1144 2252 RdrCEF.exe RdrCEF.exe PID 2252 wrote to memory of 1144 2252 RdrCEF.exe RdrCEF.exe PID 2252 wrote to memory of 1144 2252 RdrCEF.exe RdrCEF.exe PID 2252 wrote to memory of 1144 2252 RdrCEF.exe RdrCEF.exe PID 2252 wrote to memory of 1144 2252 RdrCEF.exe RdrCEF.exe PID 2252 wrote to memory of 1144 2252 RdrCEF.exe RdrCEF.exe PID 2252 wrote to memory of 1144 2252 RdrCEF.exe RdrCEF.exe PID 2252 wrote to memory of 1144 2252 RdrCEF.exe RdrCEF.exe PID 2252 wrote to memory of 1144 2252 RdrCEF.exe RdrCEF.exe PID 2252 wrote to memory of 1144 2252 RdrCEF.exe RdrCEF.exe PID 2252 wrote to memory of 1144 2252 RdrCEF.exe RdrCEF.exe PID 2252 wrote to memory of 1144 2252 RdrCEF.exe RdrCEF.exe PID 2252 wrote to memory of 1144 2252 RdrCEF.exe RdrCEF.exe PID 2252 wrote to memory of 1144 2252 RdrCEF.exe RdrCEF.exe PID 2252 wrote to memory of 1144 2252 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0001c0ae92bc16dc5b0ced0adf389dea116f212f48cefb6c1bce03ff3edca4b0.exe"C:\Users\Admin\AppData\Local\Temp\0001c0ae92bc16dc5b0ced0adf389dea116f212f48cefb6c1bce03ff3edca4b0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\YtRMjraM.exe"C:\Users\Admin\AppData\Local\Temp\YtRMjraM.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\AFWAAFRXKO.pdf"3⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140434⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=19DC71EE0ED6AAAEFA6A3F0FD42C4EA5 --mojo-platform-channel-handle=1724 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:1144
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=199DC82A6A2CC8266E1849AE32A0772B --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=199DC82A6A2CC8266E1849AE32A0772B --renderer-client-id=2 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job /prefetch:15⤵PID:1856
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=ECB583D232F1EBC18C749C35119E166F --mojo-platform-channel-handle=2288 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:4544
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=9E93AE46EDDD269946B1A44367135BE8 --mojo-platform-channel-handle=2308 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:3468
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B18F7A16761388F65011DF1A2DDA647B --mojo-platform-channel-handle=2140 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:2656
-
-
-
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" /PRODUCT:Reader /VERSION:19.0 /MODE:34⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1168 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"5⤵PID:1224
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\AFWAAFRXKO.exe"C:\Users\Admin\AppData\Local\Temp\AFWAAFRXKO.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "AFWAAFRXKO" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\AFWAAFRXKO.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\AFWAAFRXKO.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\AFWAAFRXKO.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:2640
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
PID:1700
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "AFWAAFRXKO" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\AFWAAFRXKO.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
PID:2560
-
-
C:\Users\Admin\AppData\Local\ServiceHub\AFWAAFRXKO.exe"C:\Users\Admin\AppData\Local\ServiceHub\AFWAAFRXKO.exe"5⤵
- Executes dropped EXE
PID:3464
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp3EB9.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp3EB9.tmp.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "tmp3EB9.tmp" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\tmp3EB9.tmp.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\tmp3EB9.tmp.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\tmp3EB9.tmp.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:4768
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
PID:1092
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "tmp3EB9.tmp" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\tmp3EB9.tmp.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:4340
-
-
C:\Users\Admin\AppData\Local\ServiceHub\tmp3EB9.tmp.exe"C:\Users\Admin\AppData\Local\ServiceHub\tmp3EB9.tmp.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:208
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:628
-
C:\Users\Admin\AppData\Local\ServiceHub\AFWAAFRXKO.exeC:\Users\Admin\AppData\Local\ServiceHub\AFWAAFRXKO.exe1⤵
- Executes dropped EXE
PID:2528
-
C:\Users\Admin\AppData\Local\ServiceHub\tmp3EB9.tmp.exeC:\Users\Admin\AppData\Local\ServiceHub\tmp3EB9.tmp.exe1⤵
- Executes dropped EXE
PID:4860
-
C:\Users\Admin\AppData\Local\ServiceHub\tmp3EB9.tmp.exeC:\Users\Admin\AppData\Local\ServiceHub\tmp3EB9.tmp.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
C:\Users\Admin\AppData\Local\ServiceHub\AFWAAFRXKO.exeC:\Users\Admin\AppData\Local\ServiceHub\AFWAAFRXKO.exe1⤵
- Executes dropped EXE
PID:2008
-
C:\Users\Admin\AppData\Local\ServiceHub\AFWAAFRXKO.exeC:\Users\Admin\AppData\Local\ServiceHub\AFWAAFRXKO.exe1⤵
- Executes dropped EXE
PID:3828
-
C:\Users\Admin\AppData\Local\ServiceHub\tmp3EB9.tmp.exeC:\Users\Admin\AppData\Local\ServiceHub\tmp3EB9.tmp.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1724
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
1.3MB
MD5c8d852fb1561658cae72fa498777bfbd
SHA1ea689804b69e9e7611059d11eff2fdadd656e6fb
SHA256757eb1dc48fc181b770984905c3ec14c7be9c8f9bdf813108417e318479051f5
SHA5127b7df94405cb28d26993eaf1e18cec5ab2b695ae280d4c31c65c80ce19a87a3ac6187c259fa3ae8339a2c33f64c6448655b2e02c74f90ff19284f4c92485a13a
-
Filesize
1.3MB
MD5c8d852fb1561658cae72fa498777bfbd
SHA1ea689804b69e9e7611059d11eff2fdadd656e6fb
SHA256757eb1dc48fc181b770984905c3ec14c7be9c8f9bdf813108417e318479051f5
SHA5127b7df94405cb28d26993eaf1e18cec5ab2b695ae280d4c31c65c80ce19a87a3ac6187c259fa3ae8339a2c33f64c6448655b2e02c74f90ff19284f4c92485a13a
-
Filesize
1.3MB
MD5c8d852fb1561658cae72fa498777bfbd
SHA1ea689804b69e9e7611059d11eff2fdadd656e6fb
SHA256757eb1dc48fc181b770984905c3ec14c7be9c8f9bdf813108417e318479051f5
SHA5127b7df94405cb28d26993eaf1e18cec5ab2b695ae280d4c31c65c80ce19a87a3ac6187c259fa3ae8339a2c33f64c6448655b2e02c74f90ff19284f4c92485a13a
-
Filesize
1.3MB
MD5c8d852fb1561658cae72fa498777bfbd
SHA1ea689804b69e9e7611059d11eff2fdadd656e6fb
SHA256757eb1dc48fc181b770984905c3ec14c7be9c8f9bdf813108417e318479051f5
SHA5127b7df94405cb28d26993eaf1e18cec5ab2b695ae280d4c31c65c80ce19a87a3ac6187c259fa3ae8339a2c33f64c6448655b2e02c74f90ff19284f4c92485a13a
-
Filesize
1.3MB
MD5c8d852fb1561658cae72fa498777bfbd
SHA1ea689804b69e9e7611059d11eff2fdadd656e6fb
SHA256757eb1dc48fc181b770984905c3ec14c7be9c8f9bdf813108417e318479051f5
SHA5127b7df94405cb28d26993eaf1e18cec5ab2b695ae280d4c31c65c80ce19a87a3ac6187c259fa3ae8339a2c33f64c6448655b2e02c74f90ff19284f4c92485a13a
-
Filesize
1.3MB
MD5c8d852fb1561658cae72fa498777bfbd
SHA1ea689804b69e9e7611059d11eff2fdadd656e6fb
SHA256757eb1dc48fc181b770984905c3ec14c7be9c8f9bdf813108417e318479051f5
SHA5127b7df94405cb28d26993eaf1e18cec5ab2b695ae280d4c31c65c80ce19a87a3ac6187c259fa3ae8339a2c33f64c6448655b2e02c74f90ff19284f4c92485a13a
-
Filesize
1.3MB
MD5c8d852fb1561658cae72fa498777bfbd
SHA1ea689804b69e9e7611059d11eff2fdadd656e6fb
SHA256757eb1dc48fc181b770984905c3ec14c7be9c8f9bdf813108417e318479051f5
SHA5127b7df94405cb28d26993eaf1e18cec5ab2b695ae280d4c31c65c80ce19a87a3ac6187c259fa3ae8339a2c33f64c6448655b2e02c74f90ff19284f4c92485a13a
-
Filesize
1.3MB
MD5c8d852fb1561658cae72fa498777bfbd
SHA1ea689804b69e9e7611059d11eff2fdadd656e6fb
SHA256757eb1dc48fc181b770984905c3ec14c7be9c8f9bdf813108417e318479051f5
SHA5127b7df94405cb28d26993eaf1e18cec5ab2b695ae280d4c31c65c80ce19a87a3ac6187c259fa3ae8339a2c33f64c6448655b2e02c74f90ff19284f4c92485a13a
-
Filesize
1.3MB
MD5c8d852fb1561658cae72fa498777bfbd
SHA1ea689804b69e9e7611059d11eff2fdadd656e6fb
SHA256757eb1dc48fc181b770984905c3ec14c7be9c8f9bdf813108417e318479051f5
SHA5127b7df94405cb28d26993eaf1e18cec5ab2b695ae280d4c31c65c80ce19a87a3ac6187c259fa3ae8339a2c33f64c6448655b2e02c74f90ff19284f4c92485a13a
-
Filesize
1.3MB
MD5c8d852fb1561658cae72fa498777bfbd
SHA1ea689804b69e9e7611059d11eff2fdadd656e6fb
SHA256757eb1dc48fc181b770984905c3ec14c7be9c8f9bdf813108417e318479051f5
SHA5127b7df94405cb28d26993eaf1e18cec5ab2b695ae280d4c31c65c80ce19a87a3ac6187c259fa3ae8339a2c33f64c6448655b2e02c74f90ff19284f4c92485a13a
-
Filesize
1.3MB
MD5c8d852fb1561658cae72fa498777bfbd
SHA1ea689804b69e9e7611059d11eff2fdadd656e6fb
SHA256757eb1dc48fc181b770984905c3ec14c7be9c8f9bdf813108417e318479051f5
SHA5127b7df94405cb28d26993eaf1e18cec5ab2b695ae280d4c31c65c80ce19a87a3ac6187c259fa3ae8339a2c33f64c6448655b2e02c74f90ff19284f4c92485a13a
-
Filesize
1.3MB
MD5c8d852fb1561658cae72fa498777bfbd
SHA1ea689804b69e9e7611059d11eff2fdadd656e6fb
SHA256757eb1dc48fc181b770984905c3ec14c7be9c8f9bdf813108417e318479051f5
SHA5127b7df94405cb28d26993eaf1e18cec5ab2b695ae280d4c31c65c80ce19a87a3ac6187c259fa3ae8339a2c33f64c6448655b2e02c74f90ff19284f4c92485a13a
-
Filesize
1KB
MD5e655d05deda782a6fe1e44028236d3a4
SHA1abef573ca92d8cd16e5ace5c300a6bf07df79722
SHA25669fc1a8f39f8bd7e956a4c8ec0ec6210e8f4c7e223b49c20369a2b47f8512528
SHA51225837aeeb2772bf69684bdb344208188e115aa8fcb06d5428f84d2ed15f4972fc6874b128ca3682d28900f5c0eb8b305151f831962d3021ee7bbd1447dae93f5
-
Filesize
1.5MB
MD5500c5f4115032ea49f24f821af1cf4d6
SHA1f1ed6de81263428cdfdfc388fac5629190874360
SHA2563609b3c9b3cc7619b8de91e84493bcdeb9266cd1d0d8b923bede057250e031d4
SHA51243c1fff20120972799c1476fb2ccff8ffb6d409667220655663f41860cff05047786a6987cbfef7a5a978ca8e04295580699573e5d38caf86a1e9703c14f22e1
-
Filesize
1.5MB
MD5500c5f4115032ea49f24f821af1cf4d6
SHA1f1ed6de81263428cdfdfc388fac5629190874360
SHA2563609b3c9b3cc7619b8de91e84493bcdeb9266cd1d0d8b923bede057250e031d4
SHA51243c1fff20120972799c1476fb2ccff8ffb6d409667220655663f41860cff05047786a6987cbfef7a5a978ca8e04295580699573e5d38caf86a1e9703c14f22e1
-
Filesize
1.3MB
MD5c8d852fb1561658cae72fa498777bfbd
SHA1ea689804b69e9e7611059d11eff2fdadd656e6fb
SHA256757eb1dc48fc181b770984905c3ec14c7be9c8f9bdf813108417e318479051f5
SHA5127b7df94405cb28d26993eaf1e18cec5ab2b695ae280d4c31c65c80ce19a87a3ac6187c259fa3ae8339a2c33f64c6448655b2e02c74f90ff19284f4c92485a13a
-
Filesize
1.3MB
MD5c8d852fb1561658cae72fa498777bfbd
SHA1ea689804b69e9e7611059d11eff2fdadd656e6fb
SHA256757eb1dc48fc181b770984905c3ec14c7be9c8f9bdf813108417e318479051f5
SHA5127b7df94405cb28d26993eaf1e18cec5ab2b695ae280d4c31c65c80ce19a87a3ac6187c259fa3ae8339a2c33f64c6448655b2e02c74f90ff19284f4c92485a13a