Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 11:49
Static task
static1
Behavioral task
behavioral1
Sample
5b56c863f47943a3e5f7db1d2ea1b0d293d1f436f3095aa8c9a8e0d7db37b3a9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5b56c863f47943a3e5f7db1d2ea1b0d293d1f436f3095aa8c9a8e0d7db37b3a9.exe
Resource
win10v2004-20220812-en
General
-
Target
5b56c863f47943a3e5f7db1d2ea1b0d293d1f436f3095aa8c9a8e0d7db37b3a9.exe
-
Size
838KB
-
MD5
253e8f12aad6ffb867d0a6b53b1c2ec0
-
SHA1
2350e1574abd921920e2b98c63ae6997d49a8bfb
-
SHA256
5b56c863f47943a3e5f7db1d2ea1b0d293d1f436f3095aa8c9a8e0d7db37b3a9
-
SHA512
fa74598c6d865de4d0fe506f6b9f5dcfdfcf0725247b90aa075f6739b56f6fb28a7de9f8d705d9b559a5d6bdd7257ebd6a63efe41364770483979830d0230869
-
SSDEEP
24576:lWbwA8k1lP0GoDBFNTkDsqqGUJSd13ajpQDscxklMi:u8k/P0GoDBFisPGP13ajmscx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 5b56c863f47943a3e5f7db1d2ea1b0d293d1f436f3095aa8c9a8e0d7db37b3a9.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\Temp AdobeARM.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\Backup AdobeARM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 976 5b56c863f47943a3e5f7db1d2ea1b0d293d1f436f3095aa8c9a8e0d7db37b3a9.exe 976 5b56c863f47943a3e5f7db1d2ea1b0d293d1f436f3095aa8c9a8e0d7db37b3a9.exe 976 5b56c863f47943a3e5f7db1d2ea1b0d293d1f436f3095aa8c9a8e0d7db37b3a9.exe 976 5b56c863f47943a3e5f7db1d2ea1b0d293d1f436f3095aa8c9a8e0d7db37b3a9.exe 976 5b56c863f47943a3e5f7db1d2ea1b0d293d1f436f3095aa8c9a8e0d7db37b3a9.exe 976 5b56c863f47943a3e5f7db1d2ea1b0d293d1f436f3095aa8c9a8e0d7db37b3a9.exe 976 5b56c863f47943a3e5f7db1d2ea1b0d293d1f436f3095aa8c9a8e0d7db37b3a9.exe 976 5b56c863f47943a3e5f7db1d2ea1b0d293d1f436f3095aa8c9a8e0d7db37b3a9.exe 976 5b56c863f47943a3e5f7db1d2ea1b0d293d1f436f3095aa8c9a8e0d7db37b3a9.exe 976 5b56c863f47943a3e5f7db1d2ea1b0d293d1f436f3095aa8c9a8e0d7db37b3a9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1424 AdobeARM.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 976 wrote to memory of 1424 976 5b56c863f47943a3e5f7db1d2ea1b0d293d1f436f3095aa8c9a8e0d7db37b3a9.exe 83 PID 976 wrote to memory of 1424 976 5b56c863f47943a3e5f7db1d2ea1b0d293d1f436f3095aa8c9a8e0d7db37b3a9.exe 83 PID 976 wrote to memory of 1424 976 5b56c863f47943a3e5f7db1d2ea1b0d293d1f436f3095aa8c9a8e0d7db37b3a9.exe 83 PID 1424 wrote to memory of 204 1424 AdobeARM.exe 86 PID 1424 wrote to memory of 204 1424 AdobeARM.exe 86 PID 1424 wrote to memory of 204 1424 AdobeARM.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b56c863f47943a3e5f7db1d2ea1b0d293d1f436f3095aa8c9a8e0d7db37b3a9.exe"C:\Users\Admin\AppData\Local\Temp\5b56c863f47943a3e5f7db1d2ea1b0d293d1f436f3095aa8c9a8e0d7db37b3a9.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"2⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"3⤵PID:204
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
358B
MD5882d5bcb5d081c33ffb6868cf34840a0
SHA12f67a691f61370b48ec7731b71b23e07389b8b71
SHA2561366c6175e55b6fd7f942386403e04331fff1387ff49cf7a3b82ca3575a0c468
SHA512c9cf261dbf3d189d55f6e82b3775c1852eb9bd81955d851effea2fb197288738f9603492cb3db365cc11a952dad0ea79491354fdef945a58acd535f4bbbd07de