Analysis
-
max time kernel
134s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 18:18
Static task
static1
Behavioral task
behavioral1
Sample
bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe
Resource
win10v2004-20220812-en
General
-
Target
bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe
-
Size
320KB
-
MD5
2cbbb949196ecc932278deba7fb10742
-
SHA1
4ac0c2dd88af0d6756762555c8b9f79dcfdb6700
-
SHA256
bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41
-
SHA512
468e858cdecd7e647b660ce2bc45ec0fcc815bfbd455d55fe005bf13a65183b34b4c3560dcdc64164739f6ac18c041c72833144ecc1760bbe48da977f4cbc45d
-
SSDEEP
6144:p/bILVvWfZc2yLENCXUhielTVtyjXP56OS+Is:p0xWfZc2JE8ieXtyjDP/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
AdobeARMS.exeAdobeARMS.exepid process 2020 AdobeARMS.exe 1988 AdobeARMS.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Loads dropped DLL 3 IoCs
Processes:
bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exeAdobeARMS.exepid process 1644 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe 1644 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe 2020 AdobeARMS.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Adobe Reader and Acrobat Manager = "C:\\Users\\Admin\\AppData\\Local\\Temp\\AdobeARMS.exe" bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe Reader and Acrobat Manager = "C:\\Users\\Admin\\AppData\\Local\\Temp\\AdobeARMS.exe" bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exeAdobeARMS.exepid process 1676 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe 2020 AdobeARMS.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exeAdobeARMS.exedescription pid process target process PID 1676 set thread context of 1644 1676 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe PID 2020 set thread context of 1988 2020 AdobeARMS.exe AdobeARMS.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exeAdobeARMS.exepid process 1676 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe 2020 AdobeARMS.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exeAdobeARMS.exepid process 1676 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe 1676 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe 2020 AdobeARMS.exe 2020 AdobeARMS.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exebb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exeAdobeARMS.exedescription pid process target process PID 1676 wrote to memory of 1644 1676 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe PID 1676 wrote to memory of 1644 1676 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe PID 1676 wrote to memory of 1644 1676 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe PID 1676 wrote to memory of 1644 1676 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe PID 1644 wrote to memory of 944 1644 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe netsh.exe PID 1644 wrote to memory of 944 1644 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe netsh.exe PID 1644 wrote to memory of 944 1644 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe netsh.exe PID 1644 wrote to memory of 944 1644 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe netsh.exe PID 1644 wrote to memory of 2020 1644 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe AdobeARMS.exe PID 1644 wrote to memory of 2020 1644 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe AdobeARMS.exe PID 1644 wrote to memory of 2020 1644 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe AdobeARMS.exe PID 1644 wrote to memory of 2020 1644 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe AdobeARMS.exe PID 2020 wrote to memory of 1988 2020 AdobeARMS.exe AdobeARMS.exe PID 2020 wrote to memory of 1988 2020 AdobeARMS.exe AdobeARMS.exe PID 2020 wrote to memory of 1988 2020 AdobeARMS.exe AdobeARMS.exe PID 2020 wrote to memory of 1988 2020 AdobeARMS.exe AdobeARMS.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe"C:\Users\Admin\AppData\Local\Temp\bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe"C:\Users\Admin\AppData\Local\Temp\bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\AdobeARMS.exe" "Adobe Reader and Acrobat Manager" ENABLE3⤵
- Modifies Windows Firewall
PID:944 -
C:\Users\Admin\AppData\Local\Temp\AdobeARMS.exe"C:\Users\Admin\AppData\Local\Temp\AdobeARMS.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\AdobeARMS.exe"C:\Users\Admin\AppData\Local\Temp\AdobeARMS.exe"4⤵
- Executes dropped EXE
PID:1988
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD52cbbb949196ecc932278deba7fb10742
SHA14ac0c2dd88af0d6756762555c8b9f79dcfdb6700
SHA256bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41
SHA512468e858cdecd7e647b660ce2bc45ec0fcc815bfbd455d55fe005bf13a65183b34b4c3560dcdc64164739f6ac18c041c72833144ecc1760bbe48da977f4cbc45d
-
Filesize
320KB
MD52cbbb949196ecc932278deba7fb10742
SHA14ac0c2dd88af0d6756762555c8b9f79dcfdb6700
SHA256bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41
SHA512468e858cdecd7e647b660ce2bc45ec0fcc815bfbd455d55fe005bf13a65183b34b4c3560dcdc64164739f6ac18c041c72833144ecc1760bbe48da977f4cbc45d
-
Filesize
320KB
MD52cbbb949196ecc932278deba7fb10742
SHA14ac0c2dd88af0d6756762555c8b9f79dcfdb6700
SHA256bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41
SHA512468e858cdecd7e647b660ce2bc45ec0fcc815bfbd455d55fe005bf13a65183b34b4c3560dcdc64164739f6ac18c041c72833144ecc1760bbe48da977f4cbc45d
-
Filesize
320KB
MD52cbbb949196ecc932278deba7fb10742
SHA14ac0c2dd88af0d6756762555c8b9f79dcfdb6700
SHA256bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41
SHA512468e858cdecd7e647b660ce2bc45ec0fcc815bfbd455d55fe005bf13a65183b34b4c3560dcdc64164739f6ac18c041c72833144ecc1760bbe48da977f4cbc45d
-
Filesize
320KB
MD52cbbb949196ecc932278deba7fb10742
SHA14ac0c2dd88af0d6756762555c8b9f79dcfdb6700
SHA256bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41
SHA512468e858cdecd7e647b660ce2bc45ec0fcc815bfbd455d55fe005bf13a65183b34b4c3560dcdc64164739f6ac18c041c72833144ecc1760bbe48da977f4cbc45d
-
Filesize
320KB
MD52cbbb949196ecc932278deba7fb10742
SHA14ac0c2dd88af0d6756762555c8b9f79dcfdb6700
SHA256bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41
SHA512468e858cdecd7e647b660ce2bc45ec0fcc815bfbd455d55fe005bf13a65183b34b4c3560dcdc64164739f6ac18c041c72833144ecc1760bbe48da977f4cbc45d