Analysis

  • max time kernel
    46s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 02:39

General

  • Target

    2de677c2ed2fe1e2ae3410582198f74119f24a512fac7768156cb9dfdbeb3cab.exe

  • Size

    571KB

  • MD5

    ddc2bdd1851d6d064f63d17ee5b19e2c

  • SHA1

    c18f6b3b04bd8f4e721f6bc81ccf6d6a697cad14

  • SHA256

    2de677c2ed2fe1e2ae3410582198f74119f24a512fac7768156cb9dfdbeb3cab

  • SHA512

    08fb95e78b12441035a8aef283d220e41da8f78e7fde9c375ab32a18821915decfccb20a53757cc4840de083fdc70540a22bc1e2894090958cee6a0119dc2fd6

  • SSDEEP

    12288:8JYWSbl0beVWj/6//wL0d/lTNR1RDPm+iMrYYdJ16DPR+xUUbEr:8iObYW2//i0bNR1Q+iEXcZqUr

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2de677c2ed2fe1e2ae3410582198f74119f24a512fac7768156cb9dfdbeb3cab.exe
    "C:\Users\Admin\AppData\Local\Temp\2de677c2ed2fe1e2ae3410582198f74119f24a512fac7768156cb9dfdbeb3cab.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1248
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Roaming\temp\checkrun.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1096
      • C:\Users\Admin\AppData\Roaming\temp\makejob.exe
        makejob.exe -is ucheck -tn "Update checker" -ds "Adobe Update Validation Checker" -tr "C:\Users\Admin\AppData\Roaming\Adobe\Updates\Services.exe" -sc MINUTE -mo 30
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        PID:688
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Roaming\temp\end.bat" "C:\Users\Admin\AppData\Local\Temp\2de677c2ed2fe1e2ae3410582198f74119f24a512fac7768156cb9dfdbeb3cab.exe""
      2⤵
      • Deletes itself
      PID:1304

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\temp\adobe.exe

    Filesize

    396KB

    MD5

    c6ecf4889c11cdd0fbc1fba386bff47f

    SHA1

    6b5ca84806966db8a8fc4ab4f84974f140a516a7

    SHA256

    29ffe21a9ed2cffa3dc9a724346b1f113ce78fc3150bf2c0d047a7b89e57edcd

    SHA512

    1072aada0eb0b1b1f19e68797da379eea2f73a138931a9fb3597124e7f20dd381d98c7c4cce4bf9e60ee39df2d8fedce937c05357fb044b504171d29fa03a494

  • C:\Users\Admin\AppData\Roaming\temp\checkrun.bat

    Filesize

    354B

    MD5

    30297c668c73d482c5606a12fc1c85f1

    SHA1

    fe1e30c3389e75d211172b55bd25f528419e869d

    SHA256

    d7d7694657aa04fe463bebe843cdedcf26fd22f05add4bd65331deabfda25b88

    SHA512

    6a50b00c0bdc95d600dd4bc63f58bf020efebaf0f36290eb88de65eef54217054de0bee863905b58a88460ab019d851b116dcf4884390fac9250092ee4717431

  • C:\Users\Admin\AppData\Roaming\temp\end.bat

    Filesize

    68B

    MD5

    c55a47701a471702af217c16224964e0

    SHA1

    329fa22bb3f2d84f02b5f66b385e6ee678c959f8

    SHA256

    a9adfc8c078eece80223839ef3192ceb374ffc512d55cb39213909d81e5d988e

    SHA512

    39f38d2d2a3ced3d69c5e4d2545fb33da1ad56dc94c03b221d6ee6e4aee7614cedb2092fdf60a91137b534aa859976709f8c02b8c872339a7a2cfbea6d672b28

  • C:\Users\Admin\AppData\Roaming\temp\makejob.exe

    Filesize

    511KB

    MD5

    482b902b7b2e4c67162e79d1be20f914

    SHA1

    101f7f8c245abc32b9d333d5c01e065b2b1babbc

    SHA256

    c6e4e8b47ae3325ce37364116eaea18519b3d979b36a0dd4de38f6f62a9f6302

    SHA512

    fbe2daa8844a236da643d0038b36cc726d74881778cfcad4ffebffc9439c2d28ce3989d8f6dc87530c665bfd9661c57a986a6569236ae86dc5b770c7598e1a46

  • C:\Users\Admin\AppData\Roaming\temp\makejob.exe

    Filesize

    511KB

    MD5

    482b902b7b2e4c67162e79d1be20f914

    SHA1

    101f7f8c245abc32b9d333d5c01e065b2b1babbc

    SHA256

    c6e4e8b47ae3325ce37364116eaea18519b3d979b36a0dd4de38f6f62a9f6302

    SHA512

    fbe2daa8844a236da643d0038b36cc726d74881778cfcad4ffebffc9439c2d28ce3989d8f6dc87530c665bfd9661c57a986a6569236ae86dc5b770c7598e1a46

  • \Users\Admin\AppData\Roaming\temp\makejob.exe

    Filesize

    511KB

    MD5

    482b902b7b2e4c67162e79d1be20f914

    SHA1

    101f7f8c245abc32b9d333d5c01e065b2b1babbc

    SHA256

    c6e4e8b47ae3325ce37364116eaea18519b3d979b36a0dd4de38f6f62a9f6302

    SHA512

    fbe2daa8844a236da643d0038b36cc726d74881778cfcad4ffebffc9439c2d28ce3989d8f6dc87530c665bfd9661c57a986a6569236ae86dc5b770c7598e1a46

  • \Users\Admin\AppData\Roaming\temp\makejob.exe

    Filesize

    511KB

    MD5

    482b902b7b2e4c67162e79d1be20f914

    SHA1

    101f7f8c245abc32b9d333d5c01e065b2b1babbc

    SHA256

    c6e4e8b47ae3325ce37364116eaea18519b3d979b36a0dd4de38f6f62a9f6302

    SHA512

    fbe2daa8844a236da643d0038b36cc726d74881778cfcad4ffebffc9439c2d28ce3989d8f6dc87530c665bfd9661c57a986a6569236ae86dc5b770c7598e1a46

  • memory/1248-54-0x00000000760A1000-0x00000000760A3000-memory.dmp

    Filesize

    8KB