Analysis
-
max time kernel
116s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
17/11/2022, 11:49
Static task
static1
Behavioral task
behavioral1
Sample
Adobe Acrobat/setup.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Adobe Acrobat/setup.exe
Resource
win10v2004-20220812-en
General
-
Target
Adobe Acrobat/setup.exe
-
Size
654.4MB
-
MD5
94032e57b7bd0b054e358ccafe314a5c
-
SHA1
8b693624f57e92da1ae0aff69cf010891710c0ec
-
SHA256
47332ce5b904b959aa814ddfde8662931fdfb5233422dc45053ad04cffc44fb4
-
SHA512
54e8ca05a317e53b7dfee8bd2ec89beb921017c0409c0b8d75cbf3cbea3a540d0e2781ee42a230ad52e92e1026d69e591c140606437ac4d096b13a578ceec242
-
SSDEEP
49152:sM9fgA9cT7dfGHESyneZnyT1M1kpRdjlEao5EBDtGQnlX8f/01A:bgpKEvTUEbG8l
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3616 zxr7KWdv7e.exe 3004 policyintroductoryov.exe 2312 policyintroductoryov.exe 4820 MIDNAUHE.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation policyintroductoryov.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce zxr7KWdv7e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" zxr7KWdv7e.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3004 set thread context of 2312 3004 policyintroductoryov.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
pid Process 4924 timeout.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 224 powershell.exe 224 powershell.exe 932 powershell.exe 932 powershell.exe 3748 powershell.exe 3748 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 5004 wmic.exe Token: SeSecurityPrivilege 5004 wmic.exe Token: SeTakeOwnershipPrivilege 5004 wmic.exe Token: SeLoadDriverPrivilege 5004 wmic.exe Token: SeSystemProfilePrivilege 5004 wmic.exe Token: SeSystemtimePrivilege 5004 wmic.exe Token: SeProfSingleProcessPrivilege 5004 wmic.exe Token: SeIncBasePriorityPrivilege 5004 wmic.exe Token: SeCreatePagefilePrivilege 5004 wmic.exe Token: SeBackupPrivilege 5004 wmic.exe Token: SeRestorePrivilege 5004 wmic.exe Token: SeShutdownPrivilege 5004 wmic.exe Token: SeDebugPrivilege 5004 wmic.exe Token: SeSystemEnvironmentPrivilege 5004 wmic.exe Token: SeRemoteShutdownPrivilege 5004 wmic.exe Token: SeUndockPrivilege 5004 wmic.exe Token: SeManageVolumePrivilege 5004 wmic.exe Token: 33 5004 wmic.exe Token: 34 5004 wmic.exe Token: 35 5004 wmic.exe Token: 36 5004 wmic.exe Token: SeIncreaseQuotaPrivilege 5004 wmic.exe Token: SeSecurityPrivilege 5004 wmic.exe Token: SeTakeOwnershipPrivilege 5004 wmic.exe Token: SeLoadDriverPrivilege 5004 wmic.exe Token: SeSystemProfilePrivilege 5004 wmic.exe Token: SeSystemtimePrivilege 5004 wmic.exe Token: SeProfSingleProcessPrivilege 5004 wmic.exe Token: SeIncBasePriorityPrivilege 5004 wmic.exe Token: SeCreatePagefilePrivilege 5004 wmic.exe Token: SeBackupPrivilege 5004 wmic.exe Token: SeRestorePrivilege 5004 wmic.exe Token: SeShutdownPrivilege 5004 wmic.exe Token: SeDebugPrivilege 5004 wmic.exe Token: SeSystemEnvironmentPrivilege 5004 wmic.exe Token: SeRemoteShutdownPrivilege 5004 wmic.exe Token: SeUndockPrivilege 5004 wmic.exe Token: SeManageVolumePrivilege 5004 wmic.exe Token: 33 5004 wmic.exe Token: 34 5004 wmic.exe Token: 35 5004 wmic.exe Token: 36 5004 wmic.exe Token: SeIncreaseQuotaPrivilege 3208 WMIC.exe Token: SeSecurityPrivilege 3208 WMIC.exe Token: SeTakeOwnershipPrivilege 3208 WMIC.exe Token: SeLoadDriverPrivilege 3208 WMIC.exe Token: SeSystemProfilePrivilege 3208 WMIC.exe Token: SeSystemtimePrivilege 3208 WMIC.exe Token: SeProfSingleProcessPrivilege 3208 WMIC.exe Token: SeIncBasePriorityPrivilege 3208 WMIC.exe Token: SeCreatePagefilePrivilege 3208 WMIC.exe Token: SeBackupPrivilege 3208 WMIC.exe Token: SeRestorePrivilege 3208 WMIC.exe Token: SeShutdownPrivilege 3208 WMIC.exe Token: SeDebugPrivilege 3208 WMIC.exe Token: SeSystemEnvironmentPrivilege 3208 WMIC.exe Token: SeRemoteShutdownPrivilege 3208 WMIC.exe Token: SeUndockPrivilege 3208 WMIC.exe Token: SeManageVolumePrivilege 3208 WMIC.exe Token: 33 3208 WMIC.exe Token: 34 3208 WMIC.exe Token: 35 3208 WMIC.exe Token: 36 3208 WMIC.exe Token: SeIncreaseQuotaPrivilege 3208 WMIC.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 956 wrote to memory of 5004 956 setup.exe 79 PID 956 wrote to memory of 5004 956 setup.exe 79 PID 956 wrote to memory of 4872 956 setup.exe 81 PID 956 wrote to memory of 4872 956 setup.exe 81 PID 4872 wrote to memory of 3208 4872 cmd.exe 83 PID 4872 wrote to memory of 3208 4872 cmd.exe 83 PID 956 wrote to memory of 5060 956 setup.exe 84 PID 956 wrote to memory of 5060 956 setup.exe 84 PID 5060 wrote to memory of 3964 5060 cmd.exe 86 PID 5060 wrote to memory of 3964 5060 cmd.exe 86 PID 956 wrote to memory of 224 956 setup.exe 91 PID 956 wrote to memory of 224 956 setup.exe 91 PID 224 wrote to memory of 3616 224 powershell.exe 92 PID 224 wrote to memory of 3616 224 powershell.exe 92 PID 3616 wrote to memory of 3004 3616 zxr7KWdv7e.exe 94 PID 3616 wrote to memory of 3004 3616 zxr7KWdv7e.exe 94 PID 3004 wrote to memory of 932 3004 policyintroductoryov.exe 99 PID 3004 wrote to memory of 932 3004 policyintroductoryov.exe 99 PID 3004 wrote to memory of 2312 3004 policyintroductoryov.exe 100 PID 3004 wrote to memory of 2312 3004 policyintroductoryov.exe 100 PID 3004 wrote to memory of 2312 3004 policyintroductoryov.exe 100 PID 3004 wrote to memory of 2312 3004 policyintroductoryov.exe 100 PID 3004 wrote to memory of 2312 3004 policyintroductoryov.exe 100 PID 3004 wrote to memory of 2312 3004 policyintroductoryov.exe 100 PID 2312 wrote to memory of 3748 2312 policyintroductoryov.exe 101 PID 2312 wrote to memory of 3748 2312 policyintroductoryov.exe 101 PID 2312 wrote to memory of 3952 2312 policyintroductoryov.exe 103 PID 2312 wrote to memory of 3952 2312 policyintroductoryov.exe 103 PID 3952 wrote to memory of 4924 3952 cmd.exe 105 PID 3952 wrote to memory of 4924 3952 cmd.exe 105 PID 3952 wrote to memory of 4820 3952 cmd.exe 106 PID 3952 wrote to memory of 4820 3952 cmd.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\Adobe Acrobat\setup.exe"C:\Users\Admin\AppData\Local\Temp\Adobe Acrobat\setup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\System32\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:5004
-
-
C:\Windows\system32\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3208
-
-
-
C:\Windows\system32\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\System32\Wbem\WMIC.exewmic cpu get name3⤵PID:3964
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "start-process C:\Users\Admin\AppData\Local\Temp\zxr7KWdv7e.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\zxr7KWdv7e.exe"C:\Users\Admin\AppData\Local\Temp\zxr7KWdv7e.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\policyintroductoryov.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\policyintroductoryov.exe4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA0AA==5⤵
- Suspicious behavior: EnumeratesProcesses
PID:932
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\policyintroductoryov.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\policyintroductoryov.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'6⤵
- Suspicious behavior: EnumeratesProcesses
PID:3748
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp5270.tmp.bat""6⤵
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\system32\timeout.exetimeout 37⤵
- Delays execution with timeout.exe
PID:4924
-
-
C:\ProgramData\Microsoft\MIDNAUHE.exe"C:\ProgramData\Microsoft\MIDNAUHE.exe"7⤵
- Executes dropped EXE
PID:4820
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
203.8MB
MD5c2ed376147e6a1aa114458aabb62074c
SHA183812be0c85e742b264ce2af8208b604de68714f
SHA256fd36e30260a7f7a31622f8d345de16ed433ea8e1a4fcea46eb9f42d9aeb0349d
SHA51212c26445126f9ca457fec4bb39ac170be256709b883d820caf1c70107ee56f169ea52a47b9a2709302e1744d442a1b46981f48bd2913286621f91f0dfa755769
-
Filesize
196.2MB
MD5e18be0fdb02c435b9c25159d37819906
SHA1f53336f9d4a55f85a02d14ee62ad014af1fec638
SHA256e08b05f26684f7fe91306062ab07cf2cb7acef7c77e944ea0a3fc8c7f7d70715
SHA51205e11c5a68f0c885f6b068714f8011b3c61e756e2c4fb3e3afc5ee5db6a2363ac58e138d26586f13d03c6c42e72681e6e8d2a066edeb2dc46615ce8e2c9f6e6b
-
Filesize
1KB
MD51d35832a5dffff9f6b8b8bf1afe49e22
SHA13e5a0a843a954ee61e78813ede5f9c9e0f22199e
SHA256cd69818b4c7223a79498e2706cd488ea3619388e6ce3de950bd1cca1ffeb40d3
SHA512356c3b815a410939b2ab55198ba043125fce24ac2518e56b548d924c4fec1a617169819c76c11188143476d20bc117577fb92b89524ec84dba029d0049b4b784
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
64B
MD5d8b9a260789a22d72263ef3bb119108c
SHA1376a9bd48726f422679f2cd65003442c0b6f6dd5
SHA256d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc
SHA512550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b
-
Filesize
1KB
MD563e62e02ee9c90b7adfb2eefe7efa04f
SHA19bc1eda86f7f95345c2a3901288b6867447dee6b
SHA256cbafbcef08446541d49da9d11842ab860628a7d317db15f570b7b1e1048ade11
SHA5123d2bf16c2a9b42e28dc9d2c18d6d697d3749b14f2f6c708ea9e587022aeb5fbbcffaa49c4f4f994f1cd1f6c886b8d8b6ab3a29d3b65fe0659ea0f2fa9d47ba52
-
Filesize
357.6MB
MD59cac86ba6401ceec99e64adc76922684
SHA12a79d539a701ad8d9f36c931e32a550d29718ac2
SHA25635695ee171cad89e3378abad9e5fa24c26a8b467ef9d3115277d8d981d23712c
SHA512097d36d45251b950a6b0e7e8e68fa86dfbdfb8d1cb87832ba81cf47c0cabc6e4e85e9c3b18dfc08078f7c8f9b08ec8787938c0dd096e315a44148d7166f0adce
-
Filesize
357.6MB
MD59cac86ba6401ceec99e64adc76922684
SHA12a79d539a701ad8d9f36c931e32a550d29718ac2
SHA25635695ee171cad89e3378abad9e5fa24c26a8b467ef9d3115277d8d981d23712c
SHA512097d36d45251b950a6b0e7e8e68fa86dfbdfb8d1cb87832ba81cf47c0cabc6e4e85e9c3b18dfc08078f7c8f9b08ec8787938c0dd096e315a44148d7166f0adce
-
Filesize
357.5MB
MD5ad1c2b9180d4527ea2e4cac0bfcc70c2
SHA1bcf1f2f9a1916c74ae0fabf70b8459fc0b1bfc67
SHA2565a294a251842cc8b54e9154d8f85276ebfb2cfbd848fc584291c51c4ca56f692
SHA5122fb541c7d8c8e2df106a2830178a1fd1b8300ee0a05b000b3de4658a45ba40c8141e5f9a830987fae0d7a4587106bf51c25d5949ea4c2d5848d5edda1fb13e93
-
Filesize
146B
MD56bf57b6bf6874661aee93aca9af1dc79
SHA1b1798c73c8da4b7942c29c0b99d80f5a930ff50f
SHA2568db6d22c8237f5a5b1a4f97b80681deea7b440219a2d707ac78b7ffb794d9090
SHA512ddb66a3b890e1d1e908798d1ee7a66883f41b298858908733f64730ce6cd21e2e394a14b96662e38e35584c819b1596dfbee357e645686942774dfa0d25c4c79
-
Filesize
1.7MB
MD5238a69aa001a8f4801f018863fa06a7c
SHA1809b9edf1e948c7aff5443b446d240d3ee80226c
SHA2568e24e96e1e87cf00e27c3a3745414636fbf6e148077c0f6815a2b87bacf85c8d
SHA51260573a5a53bb7f8a3d60efa915a94acb46f17ef4ca8eb1b778ac0719af98f67010aeef964e2afe45c8cb07e946c96546f2a350ab9402efd5ae265d4cdd5a2f3c
-
Filesize
1.7MB
MD5238a69aa001a8f4801f018863fa06a7c
SHA1809b9edf1e948c7aff5443b446d240d3ee80226c
SHA2568e24e96e1e87cf00e27c3a3745414636fbf6e148077c0f6815a2b87bacf85c8d
SHA51260573a5a53bb7f8a3d60efa915a94acb46f17ef4ca8eb1b778ac0719af98f67010aeef964e2afe45c8cb07e946c96546f2a350ab9402efd5ae265d4cdd5a2f3c