Analysis
-
max time kernel
160s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-06-2022 02:46
Static task
static1
Behavioral task
behavioral1
Sample
23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exe
Resource
win10v2004-20220414-en
General
-
Target
23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exe
-
Size
95KB
-
MD5
c74bb08e57a5cb5535b6348f2272ced9
-
SHA1
fcf7da57789483170bd787e33175c112c776792c
-
SHA256
23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52
-
SHA512
0f8179c997cff1cd793aa51256e5070f4766722cee166674c40586e976656bfd01305996f44092d7fdede9e2504ca67a3c12e1bbbbbf704ce4758b1106ad90ee
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 2 IoCs
Processes:
AdobeARM.exeAdobeARM.exepid process 3320 AdobeARM.exe 4560 AdobeARM.exe -
Processes:
resource yara_rule behavioral2/memory/5096-131-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral2/memory/5096-133-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral2/memory/5096-134-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral2/memory/5096-135-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral2/memory/5096-139-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral2/memory/4560-144-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral2/memory/4560-145-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral2/memory/4560-146-0x0000000000400000-0x000000000048D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exeAdobeARM.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\patches = "1" 23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeARM = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeARM.exe" 23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeARM = "\\AdobeARM.exe" AdobeARM.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeARM = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeARM.exe" AdobeARM.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exeAdobeARM.exedescription pid process target process PID 1136 set thread context of 5096 1136 23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exe 23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exe PID 3320 set thread context of 4560 3320 AdobeARM.exe AdobeARM.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 748 3320 WerFault.exe AdobeARM.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exe23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exeAdobeARM.exedescription pid process target process PID 1136 wrote to memory of 5096 1136 23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exe 23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exe PID 1136 wrote to memory of 5096 1136 23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exe 23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exe PID 1136 wrote to memory of 5096 1136 23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exe 23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exe PID 1136 wrote to memory of 5096 1136 23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exe 23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exe PID 1136 wrote to memory of 5096 1136 23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exe 23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exe PID 5096 wrote to memory of 3320 5096 23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exe AdobeARM.exe PID 5096 wrote to memory of 3320 5096 23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exe AdobeARM.exe PID 5096 wrote to memory of 3320 5096 23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exe AdobeARM.exe PID 3320 wrote to memory of 4560 3320 AdobeARM.exe AdobeARM.exe PID 3320 wrote to memory of 4560 3320 AdobeARM.exe AdobeARM.exe PID 3320 wrote to memory of 4560 3320 AdobeARM.exe AdobeARM.exe PID 3320 wrote to memory of 4560 3320 AdobeARM.exe AdobeARM.exe PID 3320 wrote to memory of 4560 3320 AdobeARM.exe AdobeARM.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exe"C:\Users\Admin\AppData\Local\Temp\23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exe"C:\Users\Admin\AppData\Local\Temp\23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\AdobeARM.exeC:\Users\Admin\AppData\Roaming\AdobeARM.exe 912 "C:\Users\Admin\AppData\Local\Temp\23189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 2804⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\AdobeARM.exe"C:\Users\Admin\AppData\Roaming\AdobeARM.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1136 -ip 11361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3320 -ip 33201⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\AdobeARM.exeFilesize
95KB
MD5c74bb08e57a5cb5535b6348f2272ced9
SHA1fcf7da57789483170bd787e33175c112c776792c
SHA25623189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52
SHA5120f8179c997cff1cd793aa51256e5070f4766722cee166674c40586e976656bfd01305996f44092d7fdede9e2504ca67a3c12e1bbbbbf704ce4758b1106ad90ee
-
C:\Users\Admin\AppData\Roaming\AdobeARM.exeFilesize
95KB
MD5c74bb08e57a5cb5535b6348f2272ced9
SHA1fcf7da57789483170bd787e33175c112c776792c
SHA25623189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52
SHA5120f8179c997cff1cd793aa51256e5070f4766722cee166674c40586e976656bfd01305996f44092d7fdede9e2504ca67a3c12e1bbbbbf704ce4758b1106ad90ee
-
C:\Users\Admin\AppData\Roaming\AdobeARM.exeFilesize
95KB
MD5c74bb08e57a5cb5535b6348f2272ced9
SHA1fcf7da57789483170bd787e33175c112c776792c
SHA25623189cc64c0ccd26a4ddd11602b4af76bd2e381a0a28250bf257d8e239c42e52
SHA5120f8179c997cff1cd793aa51256e5070f4766722cee166674c40586e976656bfd01305996f44092d7fdede9e2504ca67a3c12e1bbbbbf704ce4758b1106ad90ee
-
memory/3320-136-0x0000000000000000-mapping.dmp
-
memory/4560-140-0x0000000000000000-mapping.dmp
-
memory/4560-144-0x0000000000400000-0x000000000048D000-memory.dmpFilesize
564KB
-
memory/4560-145-0x0000000000400000-0x000000000048D000-memory.dmpFilesize
564KB
-
memory/4560-146-0x0000000000400000-0x000000000048D000-memory.dmpFilesize
564KB
-
memory/5096-135-0x0000000000400000-0x000000000048D000-memory.dmpFilesize
564KB
-
memory/5096-134-0x0000000000400000-0x000000000048D000-memory.dmpFilesize
564KB
-
memory/5096-133-0x0000000000400000-0x000000000048D000-memory.dmpFilesize
564KB
-
memory/5096-139-0x0000000000400000-0x000000000048D000-memory.dmpFilesize
564KB
-
memory/5096-130-0x0000000000000000-mapping.dmp
-
memory/5096-131-0x0000000000400000-0x000000000048D000-memory.dmpFilesize
564KB