Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 18:18
Static task
static1
Behavioral task
behavioral1
Sample
bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe
Resource
win10v2004-20220812-en
General
-
Target
bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe
-
Size
320KB
-
MD5
2cbbb949196ecc932278deba7fb10742
-
SHA1
4ac0c2dd88af0d6756762555c8b9f79dcfdb6700
-
SHA256
bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41
-
SHA512
468e858cdecd7e647b660ce2bc45ec0fcc815bfbd455d55fe005bf13a65183b34b4c3560dcdc64164739f6ac18c041c72833144ecc1760bbe48da977f4cbc45d
-
SSDEEP
6144:p/bILVvWfZc2yLENCXUhielTVtyjXP56OS+Is:p0xWfZc2JE8ieXtyjDP/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
AdobeARMS.exeAdobeARMS.exepid process 3036 AdobeARMS.exe 4600 AdobeARMS.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe Reader and Acrobat Manager = "C:\\Users\\Admin\\AppData\\Local\\Temp\\AdobeARMS.exe" bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe Reader and Acrobat Manager = "C:\\Users\\Admin\\AppData\\Local\\Temp\\AdobeARMS.exe" bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exeAdobeARMS.exepid process 1744 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe 3036 AdobeARMS.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exeAdobeARMS.exedescription pid process target process PID 1744 set thread context of 4320 1744 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe PID 3036 set thread context of 4600 3036 AdobeARMS.exe AdobeARMS.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exeAdobeARMS.exepid process 1744 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe 3036 AdobeARMS.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exeAdobeARMS.exepid process 1744 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe 1744 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe 3036 AdobeARMS.exe 3036 AdobeARMS.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exebb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exeAdobeARMS.exedescription pid process target process PID 1744 wrote to memory of 4320 1744 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe PID 1744 wrote to memory of 4320 1744 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe PID 1744 wrote to memory of 4320 1744 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe PID 4320 wrote to memory of 4848 4320 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe netsh.exe PID 4320 wrote to memory of 4848 4320 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe netsh.exe PID 4320 wrote to memory of 4848 4320 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe netsh.exe PID 4320 wrote to memory of 3036 4320 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe AdobeARMS.exe PID 4320 wrote to memory of 3036 4320 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe AdobeARMS.exe PID 4320 wrote to memory of 3036 4320 bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe AdobeARMS.exe PID 3036 wrote to memory of 4600 3036 AdobeARMS.exe AdobeARMS.exe PID 3036 wrote to memory of 4600 3036 AdobeARMS.exe AdobeARMS.exe PID 3036 wrote to memory of 4600 3036 AdobeARMS.exe AdobeARMS.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe"C:\Users\Admin\AppData\Local\Temp\bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe"C:\Users\Admin\AppData\Local\Temp\bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\AdobeARMS.exe" "Adobe Reader and Acrobat Manager" ENABLE3⤵
- Modifies Windows Firewall
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\AdobeARMS.exe"C:\Users\Admin\AppData\Local\Temp\AdobeARMS.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\AdobeARMS.exe"C:\Users\Admin\AppData\Local\Temp\AdobeARMS.exe"4⤵
- Executes dropped EXE
PID:4600
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD52cbbb949196ecc932278deba7fb10742
SHA14ac0c2dd88af0d6756762555c8b9f79dcfdb6700
SHA256bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41
SHA512468e858cdecd7e647b660ce2bc45ec0fcc815bfbd455d55fe005bf13a65183b34b4c3560dcdc64164739f6ac18c041c72833144ecc1760bbe48da977f4cbc45d
-
Filesize
320KB
MD52cbbb949196ecc932278deba7fb10742
SHA14ac0c2dd88af0d6756762555c8b9f79dcfdb6700
SHA256bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41
SHA512468e858cdecd7e647b660ce2bc45ec0fcc815bfbd455d55fe005bf13a65183b34b4c3560dcdc64164739f6ac18c041c72833144ecc1760bbe48da977f4cbc45d
-
Filesize
320KB
MD52cbbb949196ecc932278deba7fb10742
SHA14ac0c2dd88af0d6756762555c8b9f79dcfdb6700
SHA256bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41
SHA512468e858cdecd7e647b660ce2bc45ec0fcc815bfbd455d55fe005bf13a65183b34b4c3560dcdc64164739f6ac18c041c72833144ecc1760bbe48da977f4cbc45d