Analysis

  • max time kernel
    247s
  • max time network
    252s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 15:35

General

  • Target

    AdobeReader.pdf.exe

  • Size

    176KB

  • MD5

    8942bfeee9b6307a5e2e5cc7b3c24d9d

  • SHA1

    ae57b351dc9beb723156851e4354ab7a01c3e219

  • SHA256

    e1314f6cf405c1c286322d02efffa9b218206edd71f71f1fb5666053b121ac05

  • SHA512

    fe47db31905578028a88329657d0b4fd7d9a9f0ea8a77db2fb8571bade69b34aaf93dc29a560a092c14de13289ac1d74123aa588200228f839b39802082fc87f

  • SSDEEP

    3072:g4stNvqEH8K4WGBAXwMzhSvcP00BPE9fdtKGxA808/s7o+7qKWeLscMlMbh:gZfCnWtXwMzhSvHfdtRmqKAI

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 58 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 48 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of FindShellTrayWindow 55 IoCs
  • Suspicious use of SendNotifyMessage 29 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AdobeReader.pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\AdobeReader.pdf.exe"
    1⤵
      PID:4600
    • C:\Windows\system32\werfault.exe
      werfault.exe /h /shared Global\45846147c0104f7fa4959045ee2c1c56 /t 2552 /p 376
      1⤵
        PID:1616
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:3680
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Enumerates system info in registry
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2492
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:400

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2492-141-0x0000018BD96D0000-0x0000018BD96D8000-memory.dmp
        Filesize

        32KB

      • memory/2492-144-0x00000193DBC30000-0x00000193DBC50000-memory.dmp
        Filesize

        128KB

      • memory/2492-147-0x00000193EBCD0000-0x00000193EBDD0000-memory.dmp
        Filesize

        1024KB

      • memory/2492-150-0x00000193DA810000-0x00000193DA830000-memory.dmp
        Filesize

        128KB

      • memory/2492-162-0x00000193DA7D0000-0x00000193DA7F0000-memory.dmp
        Filesize

        128KB

      • memory/2492-221-0x00000193DAFC0000-0x00000193DAFE0000-memory.dmp
        Filesize

        128KB

      • memory/2492-223-0x00000193DBCD9000-0x00000193DBCDD000-memory.dmp
        Filesize

        16KB

      • memory/2492-220-0x00000193DBCD9000-0x00000193DBCDD000-memory.dmp
        Filesize

        16KB

      • memory/2492-222-0x00000193DBCD9000-0x00000193DBCDD000-memory.dmp
        Filesize

        16KB

      • memory/2492-225-0x00000193DBCD9000-0x00000193DBCDD000-memory.dmp
        Filesize

        16KB

      • memory/2492-224-0x00000193DBCD9000-0x00000193DBCDD000-memory.dmp
        Filesize

        16KB

      • memory/2492-228-0x00000193DBCEA000-0x00000193DBCED000-memory.dmp
        Filesize

        12KB

      • memory/2492-229-0x00000193DBCEA000-0x00000193DBCED000-memory.dmp
        Filesize

        12KB

      • memory/2492-227-0x00000193DBCEA000-0x00000193DBCED000-memory.dmp
        Filesize

        12KB

      • memory/2492-230-0x00000193DBCEA000-0x00000193DBCED000-memory.dmp
        Filesize

        12KB

      • memory/2492-233-0x00000193DBCF0000-0x00000193DBCF4000-memory.dmp
        Filesize

        16KB

      • memory/2492-234-0x00000193DBCF0000-0x00000193DBCF4000-memory.dmp
        Filesize

        16KB

      • memory/2492-236-0x00000193DBCF0000-0x00000193DBCF4000-memory.dmp
        Filesize

        16KB

      • memory/2492-235-0x00000193DBCF0000-0x00000193DBCF4000-memory.dmp
        Filesize

        16KB