Overview
overview
10Static
static
Advance ve...ce.exe
windows7_x64
3Advance ve...ce.exe
windows10-2004_x64
7AvastProxy.exe
windows7_x64
10AvastProxy.exe
windows10-2004_x64
10Report of ...n).pdf
windows7_x64
1Report of ...n).pdf
windows10-2004_x64
1acrord32.dll
windows7_x64
8acrord32.dll
windows10-2004_x64
8wsc.dll
windows7_x64
1wsc.dll
windows10-2004_x64
1Analysis
-
max time kernel
151s -
max time network
91s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
04-06-2022 19:33
Static task
static1
Behavioral task
behavioral1
Sample
Advance version of the 2020 Report of the Secretary-General on Peacebuilding and Sustaining Peace.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Advance version of the 2020 Report of the Secretary-General on Peacebuilding and Sustaining Peace.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
AvastProxy.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
AvastProxy.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
Report of the Secretary-General on Peacebuilding and Sustaining Peace (advance version).pdf
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
Report of the Secretary-General on Peacebuilding and Sustaining Peace (advance version).pdf
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
acrord32.dll
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
acrord32.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral9
Sample
wsc.dll
Resource
win7-20220414-en
Behavioral task
behavioral10
Sample
wsc.dll
Resource
win10v2004-20220414-en
General
-
Target
acrord32.dll
-
Size
972KB
-
MD5
e0977e26e7b850e20fd94fefc79af65f
-
SHA1
4a3749c33d235715a84ec4964e1d69d758645a82
-
SHA256
eef56bfc68959c6eaa66ab6abcaaf8fb54aa5b5a7da0866d97a1effeae0952b8
-
SHA512
5cc59cf2fe32f325861bdc593ceb71fe7bf348c3a4726418cda1b6a61b2c2da8cf734525f67df7d497592810f38184d8040c3bd62605885f3c140fce254e27ec
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 3 1672 rundll32.exe 4 1672 rundll32.exe 6 1672 rundll32.exe 7 1672 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2000 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2000 AcroRd32.exe 2000 AcroRd32.exe 2000 AcroRd32.exe 2000 AcroRd32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1672 2036 rundll32.exe 28 PID 2036 wrote to memory of 1672 2036 rundll32.exe 28 PID 2036 wrote to memory of 1672 2036 rundll32.exe 28 PID 2036 wrote to memory of 1672 2036 rundll32.exe 28 PID 2036 wrote to memory of 1672 2036 rundll32.exe 28 PID 2036 wrote to memory of 1672 2036 rundll32.exe 28 PID 2036 wrote to memory of 1672 2036 rundll32.exe 28 PID 1672 wrote to memory of 2000 1672 rundll32.exe 29 PID 1672 wrote to memory of 2000 1672 rundll32.exe 29 PID 1672 wrote to memory of 2000 1672 rundll32.exe 29 PID 1672 wrote to memory of 2000 1672 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\acrord32.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\acrord32.dll,#12⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Report of the Secretary-General on Peacebuilding and Sustaining Peace (advance version).pdf"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2000
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Report of the Secretary-General on Peacebuilding and Sustaining Peace (advance version).pdf
Filesize936KB
MD5bc5f2edf0f23957e0fbbcd845c744eb2
SHA1b0c167333780626ca8bd6b3b2a9fc54f20a59f34
SHA25654b491541376bda85ffb02b9bb40b9b5adba644f08b630fc1b47392625e1e60a
SHA51284f8c65a02dfd9db2286df405d711595e62ba114c8f911b30561b90818d579879542c4af09950ca8b8c2a9f82186e1cecc25933c17fef7c41e0fbf158d5ee102