Analysis
-
max time kernel
249s -
max time network
361s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 09:04
Behavioral task
behavioral1
Sample
75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe
Resource
win10v2004-20221111-en
General
-
Target
75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe
-
Size
414KB
-
MD5
2c8688371d1c42a94cd0b333b87b2793
-
SHA1
d829456288e7f51a4cd873b93d94ec8c7892bf08
-
SHA256
75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a
-
SHA512
df2e9bcd426408f0e8e2c674ab7fbe32ec10e51f9ffd16be5653f14cd1ae5e143a8f03abe16eecb822a394726ecf8e7daf433f028ce1c88d95c6de1338525017
-
SSDEEP
12288:HVgNzElYiFfJ45BFkg9wKQwxeysO1JngsiY5bN:1gV6rfC5BF3QTegGZN
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1000 adbreader.exe 704 adbreader.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1272 netsh.exe -
resource yara_rule behavioral1/memory/1324-54-0x0000000000400000-0x000000000051D000-memory.dmp upx behavioral1/memory/1324-67-0x0000000000400000-0x000000000051D000-memory.dmp upx behavioral1/files/0x000b000000012355-73.dat upx behavioral1/files/0x000b000000012355-74.dat upx behavioral1/files/0x000b000000012355-76.dat upx behavioral1/memory/1000-78-0x0000000000400000-0x000000000051D000-memory.dmp upx behavioral1/files/0x000b000000012355-82.dat upx behavioral1/files/0x000b000000012355-83.dat upx behavioral1/memory/1000-94-0x0000000000400000-0x000000000051D000-memory.dmp upx behavioral1/files/0x000b000000012355-92.dat upx -
Loads dropped DLL 3 IoCs
pid Process 1020 75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe 1020 75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe 1000 adbreader.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ 75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Adobe Driver Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\adbreader.exe" 75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ 75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe Driver Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\adbreader.exe" 75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1324 set thread context of 1020 1324 75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe 28 PID 1000 set thread context of 704 1000 adbreader.exe 31 -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1324 wrote to memory of 1020 1324 75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe 28 PID 1324 wrote to memory of 1020 1324 75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe 28 PID 1324 wrote to memory of 1020 1324 75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe 28 PID 1324 wrote to memory of 1020 1324 75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe 28 PID 1324 wrote to memory of 1020 1324 75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe 28 PID 1324 wrote to memory of 1020 1324 75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe 28 PID 1324 wrote to memory of 1020 1324 75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe 28 PID 1324 wrote to memory of 1020 1324 75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe 28 PID 1324 wrote to memory of 1020 1324 75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe 28 PID 1020 wrote to memory of 1272 1020 75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe 29 PID 1020 wrote to memory of 1272 1020 75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe 29 PID 1020 wrote to memory of 1272 1020 75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe 29 PID 1020 wrote to memory of 1272 1020 75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe 29 PID 1020 wrote to memory of 1000 1020 75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe 30 PID 1020 wrote to memory of 1000 1020 75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe 30 PID 1020 wrote to memory of 1000 1020 75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe 30 PID 1020 wrote to memory of 1000 1020 75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe 30 PID 1000 wrote to memory of 704 1000 adbreader.exe 31 PID 1000 wrote to memory of 704 1000 adbreader.exe 31 PID 1000 wrote to memory of 704 1000 adbreader.exe 31 PID 1000 wrote to memory of 704 1000 adbreader.exe 31 PID 1000 wrote to memory of 704 1000 adbreader.exe 31 PID 1000 wrote to memory of 704 1000 adbreader.exe 31 PID 1000 wrote to memory of 704 1000 adbreader.exe 31 PID 1000 wrote to memory of 704 1000 adbreader.exe 31 PID 1000 wrote to memory of 704 1000 adbreader.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe"C:\Users\Admin\AppData\Local\Temp\75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe"C:\Users\Admin\AppData\Local\Temp\75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\adbreader.exe" "Adobe Driver Update" ENABLE3⤵
- Modifies Windows Firewall
PID:1272
-
-
C:\Users\Admin\AppData\Local\Temp\adbreader.exe"C:\Users\Admin\AppData\Local\Temp\adbreader.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\adbreader.exe"C:\Users\Admin\AppData\Local\Temp\adbreader.exe"4⤵
- Executes dropped EXE
PID:704
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
414KB
MD52c8688371d1c42a94cd0b333b87b2793
SHA1d829456288e7f51a4cd873b93d94ec8c7892bf08
SHA25675113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a
SHA512df2e9bcd426408f0e8e2c674ab7fbe32ec10e51f9ffd16be5653f14cd1ae5e143a8f03abe16eecb822a394726ecf8e7daf433f028ce1c88d95c6de1338525017
-
Filesize
414KB
MD52c8688371d1c42a94cd0b333b87b2793
SHA1d829456288e7f51a4cd873b93d94ec8c7892bf08
SHA25675113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a
SHA512df2e9bcd426408f0e8e2c674ab7fbe32ec10e51f9ffd16be5653f14cd1ae5e143a8f03abe16eecb822a394726ecf8e7daf433f028ce1c88d95c6de1338525017
-
Filesize
414KB
MD52c8688371d1c42a94cd0b333b87b2793
SHA1d829456288e7f51a4cd873b93d94ec8c7892bf08
SHA25675113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a
SHA512df2e9bcd426408f0e8e2c674ab7fbe32ec10e51f9ffd16be5653f14cd1ae5e143a8f03abe16eecb822a394726ecf8e7daf433f028ce1c88d95c6de1338525017
-
Filesize
414KB
MD52c8688371d1c42a94cd0b333b87b2793
SHA1d829456288e7f51a4cd873b93d94ec8c7892bf08
SHA25675113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a
SHA512df2e9bcd426408f0e8e2c674ab7fbe32ec10e51f9ffd16be5653f14cd1ae5e143a8f03abe16eecb822a394726ecf8e7daf433f028ce1c88d95c6de1338525017
-
Filesize
414KB
MD52c8688371d1c42a94cd0b333b87b2793
SHA1d829456288e7f51a4cd873b93d94ec8c7892bf08
SHA25675113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a
SHA512df2e9bcd426408f0e8e2c674ab7fbe32ec10e51f9ffd16be5653f14cd1ae5e143a8f03abe16eecb822a394726ecf8e7daf433f028ce1c88d95c6de1338525017
-
Filesize
414KB
MD52c8688371d1c42a94cd0b333b87b2793
SHA1d829456288e7f51a4cd873b93d94ec8c7892bf08
SHA25675113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a
SHA512df2e9bcd426408f0e8e2c674ab7fbe32ec10e51f9ffd16be5653f14cd1ae5e143a8f03abe16eecb822a394726ecf8e7daf433f028ce1c88d95c6de1338525017