Analysis
-
max time kernel
133s -
max time network
177s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 18:18
Static task
static1
Behavioral task
behavioral1
Sample
fotoalbum.scr
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fotoalbum.scr
Resource
win10v2004-20220812-en
General
-
Target
fotoalbum.scr
-
Size
320KB
-
MD5
2cbbb949196ecc932278deba7fb10742
-
SHA1
4ac0c2dd88af0d6756762555c8b9f79dcfdb6700
-
SHA256
bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41
-
SHA512
468e858cdecd7e647b660ce2bc45ec0fcc815bfbd455d55fe005bf13a65183b34b4c3560dcdc64164739f6ac18c041c72833144ecc1760bbe48da977f4cbc45d
-
SSDEEP
6144:p/bILVvWfZc2yLENCXUhielTVtyjXP56OS+Is:p0xWfZc2JE8ieXtyjDP/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
AdobeARMS.exeAdobeARMS.exepid process 1500 AdobeARMS.exe 1096 AdobeARMS.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Loads dropped DLL 3 IoCs
Processes:
fotoalbum.scrAdobeARMS.exepid process 1192 fotoalbum.scr 1192 fotoalbum.scr 1500 AdobeARMS.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
fotoalbum.scrdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ fotoalbum.scr Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Adobe Reader and Acrobat Manager = "C:\\Users\\Admin\\AppData\\Local\\Temp\\AdobeARMS.exe" fotoalbum.scr Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ fotoalbum.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe Reader and Acrobat Manager = "C:\\Users\\Admin\\AppData\\Local\\Temp\\AdobeARMS.exe" fotoalbum.scr -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
fotoalbum.scrAdobeARMS.exepid process 2028 fotoalbum.scr 1500 AdobeARMS.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
fotoalbum.scrAdobeARMS.exedescription pid process target process PID 2028 set thread context of 1192 2028 fotoalbum.scr fotoalbum.scr PID 1500 set thread context of 1096 1500 AdobeARMS.exe AdobeARMS.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
fotoalbum.scrAdobeARMS.exepid process 2028 fotoalbum.scr 1500 AdobeARMS.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
fotoalbum.scrAdobeARMS.exepid process 2028 fotoalbum.scr 2028 fotoalbum.scr 1500 AdobeARMS.exe 1500 AdobeARMS.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
fotoalbum.scrfotoalbum.scrAdobeARMS.exedescription pid process target process PID 2028 wrote to memory of 1192 2028 fotoalbum.scr fotoalbum.scr PID 2028 wrote to memory of 1192 2028 fotoalbum.scr fotoalbum.scr PID 2028 wrote to memory of 1192 2028 fotoalbum.scr fotoalbum.scr PID 2028 wrote to memory of 1192 2028 fotoalbum.scr fotoalbum.scr PID 1192 wrote to memory of 1336 1192 fotoalbum.scr netsh.exe PID 1192 wrote to memory of 1336 1192 fotoalbum.scr netsh.exe PID 1192 wrote to memory of 1336 1192 fotoalbum.scr netsh.exe PID 1192 wrote to memory of 1336 1192 fotoalbum.scr netsh.exe PID 1192 wrote to memory of 1500 1192 fotoalbum.scr AdobeARMS.exe PID 1192 wrote to memory of 1500 1192 fotoalbum.scr AdobeARMS.exe PID 1192 wrote to memory of 1500 1192 fotoalbum.scr AdobeARMS.exe PID 1192 wrote to memory of 1500 1192 fotoalbum.scr AdobeARMS.exe PID 1500 wrote to memory of 1096 1500 AdobeARMS.exe AdobeARMS.exe PID 1500 wrote to memory of 1096 1500 AdobeARMS.exe AdobeARMS.exe PID 1500 wrote to memory of 1096 1500 AdobeARMS.exe AdobeARMS.exe PID 1500 wrote to memory of 1096 1500 AdobeARMS.exe AdobeARMS.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fotoalbum.scr"C:\Users\Admin\AppData\Local\Temp\fotoalbum.scr" /S1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\fotoalbum.scr"C:\Users\Admin\AppData\Local\Temp\fotoalbum.scr" /S2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\AdobeARMS.exe" "Adobe Reader and Acrobat Manager" ENABLE3⤵
- Modifies Windows Firewall
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\AdobeARMS.exe"C:\Users\Admin\AppData\Local\Temp\AdobeARMS.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\AdobeARMS.exe"C:\Users\Admin\AppData\Local\Temp\AdobeARMS.exe"4⤵
- Executes dropped EXE
PID:1096
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD52cbbb949196ecc932278deba7fb10742
SHA14ac0c2dd88af0d6756762555c8b9f79dcfdb6700
SHA256bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41
SHA512468e858cdecd7e647b660ce2bc45ec0fcc815bfbd455d55fe005bf13a65183b34b4c3560dcdc64164739f6ac18c041c72833144ecc1760bbe48da977f4cbc45d
-
Filesize
320KB
MD52cbbb949196ecc932278deba7fb10742
SHA14ac0c2dd88af0d6756762555c8b9f79dcfdb6700
SHA256bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41
SHA512468e858cdecd7e647b660ce2bc45ec0fcc815bfbd455d55fe005bf13a65183b34b4c3560dcdc64164739f6ac18c041c72833144ecc1760bbe48da977f4cbc45d
-
Filesize
320KB
MD52cbbb949196ecc932278deba7fb10742
SHA14ac0c2dd88af0d6756762555c8b9f79dcfdb6700
SHA256bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41
SHA512468e858cdecd7e647b660ce2bc45ec0fcc815bfbd455d55fe005bf13a65183b34b4c3560dcdc64164739f6ac18c041c72833144ecc1760bbe48da977f4cbc45d
-
Filesize
320KB
MD52cbbb949196ecc932278deba7fb10742
SHA14ac0c2dd88af0d6756762555c8b9f79dcfdb6700
SHA256bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41
SHA512468e858cdecd7e647b660ce2bc45ec0fcc815bfbd455d55fe005bf13a65183b34b4c3560dcdc64164739f6ac18c041c72833144ecc1760bbe48da977f4cbc45d
-
Filesize
320KB
MD52cbbb949196ecc932278deba7fb10742
SHA14ac0c2dd88af0d6756762555c8b9f79dcfdb6700
SHA256bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41
SHA512468e858cdecd7e647b660ce2bc45ec0fcc815bfbd455d55fe005bf13a65183b34b4c3560dcdc64164739f6ac18c041c72833144ecc1760bbe48da977f4cbc45d
-
Filesize
320KB
MD52cbbb949196ecc932278deba7fb10742
SHA14ac0c2dd88af0d6756762555c8b9f79dcfdb6700
SHA256bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41
SHA512468e858cdecd7e647b660ce2bc45ec0fcc815bfbd455d55fe005bf13a65183b34b4c3560dcdc64164739f6ac18c041c72833144ecc1760bbe48da977f4cbc45d