Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 18:18
Static task
static1
Behavioral task
behavioral1
Sample
fotoalbum.scr
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fotoalbum.scr
Resource
win10v2004-20220812-en
General
-
Target
fotoalbum.scr
-
Size
320KB
-
MD5
2cbbb949196ecc932278deba7fb10742
-
SHA1
4ac0c2dd88af0d6756762555c8b9f79dcfdb6700
-
SHA256
bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41
-
SHA512
468e858cdecd7e647b660ce2bc45ec0fcc815bfbd455d55fe005bf13a65183b34b4c3560dcdc64164739f6ac18c041c72833144ecc1760bbe48da977f4cbc45d
-
SSDEEP
6144:p/bILVvWfZc2yLENCXUhielTVtyjXP56OS+Is:p0xWfZc2JE8ieXtyjDP/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
AdobeARMS.exeAdobeARMS.exepid process 1316 AdobeARMS.exe 1656 AdobeARMS.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
fotoalbum.scrdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ fotoalbum.scr Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe Reader and Acrobat Manager = "C:\\Users\\Admin\\AppData\\Local\\Temp\\AdobeARMS.exe" fotoalbum.scr Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ fotoalbum.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe Reader and Acrobat Manager = "C:\\Users\\Admin\\AppData\\Local\\Temp\\AdobeARMS.exe" fotoalbum.scr -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
fotoalbum.scrAdobeARMS.exepid process 4532 fotoalbum.scr 1316 AdobeARMS.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
fotoalbum.scrAdobeARMS.exedescription pid process target process PID 4532 set thread context of 3408 4532 fotoalbum.scr fotoalbum.scr PID 1316 set thread context of 1656 1316 AdobeARMS.exe AdobeARMS.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
fotoalbum.scrAdobeARMS.exepid process 4532 fotoalbum.scr 1316 AdobeARMS.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
fotoalbum.scrAdobeARMS.exepid process 4532 fotoalbum.scr 4532 fotoalbum.scr 1316 AdobeARMS.exe 1316 AdobeARMS.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
fotoalbum.scrfotoalbum.scrAdobeARMS.exedescription pid process target process PID 4532 wrote to memory of 3408 4532 fotoalbum.scr fotoalbum.scr PID 4532 wrote to memory of 3408 4532 fotoalbum.scr fotoalbum.scr PID 4532 wrote to memory of 3408 4532 fotoalbum.scr fotoalbum.scr PID 3408 wrote to memory of 2260 3408 fotoalbum.scr netsh.exe PID 3408 wrote to memory of 2260 3408 fotoalbum.scr netsh.exe PID 3408 wrote to memory of 2260 3408 fotoalbum.scr netsh.exe PID 3408 wrote to memory of 1316 3408 fotoalbum.scr AdobeARMS.exe PID 3408 wrote to memory of 1316 3408 fotoalbum.scr AdobeARMS.exe PID 3408 wrote to memory of 1316 3408 fotoalbum.scr AdobeARMS.exe PID 1316 wrote to memory of 1656 1316 AdobeARMS.exe AdobeARMS.exe PID 1316 wrote to memory of 1656 1316 AdobeARMS.exe AdobeARMS.exe PID 1316 wrote to memory of 1656 1316 AdobeARMS.exe AdobeARMS.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fotoalbum.scr"C:\Users\Admin\AppData\Local\Temp\fotoalbum.scr" /S1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\fotoalbum.scr"C:\Users\Admin\AppData\Local\Temp\fotoalbum.scr" /S2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\AdobeARMS.exe" "Adobe Reader and Acrobat Manager" ENABLE3⤵
- Modifies Windows Firewall
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\AdobeARMS.exe"C:\Users\Admin\AppData\Local\Temp\AdobeARMS.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\AdobeARMS.exe"C:\Users\Admin\AppData\Local\Temp\AdobeARMS.exe"4⤵
- Executes dropped EXE
PID:1656
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD52cbbb949196ecc932278deba7fb10742
SHA14ac0c2dd88af0d6756762555c8b9f79dcfdb6700
SHA256bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41
SHA512468e858cdecd7e647b660ce2bc45ec0fcc815bfbd455d55fe005bf13a65183b34b4c3560dcdc64164739f6ac18c041c72833144ecc1760bbe48da977f4cbc45d
-
Filesize
320KB
MD52cbbb949196ecc932278deba7fb10742
SHA14ac0c2dd88af0d6756762555c8b9f79dcfdb6700
SHA256bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41
SHA512468e858cdecd7e647b660ce2bc45ec0fcc815bfbd455d55fe005bf13a65183b34b4c3560dcdc64164739f6ac18c041c72833144ecc1760bbe48da977f4cbc45d
-
Filesize
320KB
MD52cbbb949196ecc932278deba7fb10742
SHA14ac0c2dd88af0d6756762555c8b9f79dcfdb6700
SHA256bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41
SHA512468e858cdecd7e647b660ce2bc45ec0fcc815bfbd455d55fe005bf13a65183b34b4c3560dcdc64164739f6ac18c041c72833144ecc1760bbe48da977f4cbc45d