Analysis

  • max time kernel
    249s
  • max time network
    361s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 09:04

General

  • Target

    75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe

  • Size

    414KB

  • MD5

    2c8688371d1c42a94cd0b333b87b2793

  • SHA1

    d829456288e7f51a4cd873b93d94ec8c7892bf08

  • SHA256

    75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a

  • SHA512

    df2e9bcd426408f0e8e2c674ab7fbe32ec10e51f9ffd16be5653f14cd1ae5e143a8f03abe16eecb822a394726ecf8e7daf433f028ce1c88d95c6de1338525017

  • SSDEEP

    12288:HVgNzElYiFfJ45BFkg9wKQwxeysO1JngsiY5bN:1gV6rfC5BF3QTegGZN

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe
    "C:\Users\Admin\AppData\Local\Temp\75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\Users\Admin\AppData\Local\Temp\75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe
      "C:\Users\Admin\AppData\Local\Temp\75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1020
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\adbreader.exe" "Adobe Driver Update" ENABLE
        3⤵
        • Modifies Windows Firewall
        PID:1272
      • C:\Users\Admin\AppData\Local\Temp\adbreader.exe
        "C:\Users\Admin\AppData\Local\Temp\adbreader.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1000
        • C:\Users\Admin\AppData\Local\Temp\adbreader.exe
          "C:\Users\Admin\AppData\Local\Temp\adbreader.exe"
          4⤵
          • Executes dropped EXE
          PID:704

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\adbreader.exe

    Filesize

    414KB

    MD5

    2c8688371d1c42a94cd0b333b87b2793

    SHA1

    d829456288e7f51a4cd873b93d94ec8c7892bf08

    SHA256

    75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a

    SHA512

    df2e9bcd426408f0e8e2c674ab7fbe32ec10e51f9ffd16be5653f14cd1ae5e143a8f03abe16eecb822a394726ecf8e7daf433f028ce1c88d95c6de1338525017

  • C:\Users\Admin\AppData\Local\Temp\adbreader.exe

    Filesize

    414KB

    MD5

    2c8688371d1c42a94cd0b333b87b2793

    SHA1

    d829456288e7f51a4cd873b93d94ec8c7892bf08

    SHA256

    75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a

    SHA512

    df2e9bcd426408f0e8e2c674ab7fbe32ec10e51f9ffd16be5653f14cd1ae5e143a8f03abe16eecb822a394726ecf8e7daf433f028ce1c88d95c6de1338525017

  • C:\Users\Admin\AppData\Local\Temp\adbreader.exe

    Filesize

    414KB

    MD5

    2c8688371d1c42a94cd0b333b87b2793

    SHA1

    d829456288e7f51a4cd873b93d94ec8c7892bf08

    SHA256

    75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a

    SHA512

    df2e9bcd426408f0e8e2c674ab7fbe32ec10e51f9ffd16be5653f14cd1ae5e143a8f03abe16eecb822a394726ecf8e7daf433f028ce1c88d95c6de1338525017

  • \Users\Admin\AppData\Local\Temp\adbreader.exe

    Filesize

    414KB

    MD5

    2c8688371d1c42a94cd0b333b87b2793

    SHA1

    d829456288e7f51a4cd873b93d94ec8c7892bf08

    SHA256

    75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a

    SHA512

    df2e9bcd426408f0e8e2c674ab7fbe32ec10e51f9ffd16be5653f14cd1ae5e143a8f03abe16eecb822a394726ecf8e7daf433f028ce1c88d95c6de1338525017

  • \Users\Admin\AppData\Local\Temp\adbreader.exe

    Filesize

    414KB

    MD5

    2c8688371d1c42a94cd0b333b87b2793

    SHA1

    d829456288e7f51a4cd873b93d94ec8c7892bf08

    SHA256

    75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a

    SHA512

    df2e9bcd426408f0e8e2c674ab7fbe32ec10e51f9ffd16be5653f14cd1ae5e143a8f03abe16eecb822a394726ecf8e7daf433f028ce1c88d95c6de1338525017

  • \Users\Admin\AppData\Local\Temp\adbreader.exe

    Filesize

    414KB

    MD5

    2c8688371d1c42a94cd0b333b87b2793

    SHA1

    d829456288e7f51a4cd873b93d94ec8c7892bf08

    SHA256

    75113397c1ad61acb4a356aece3ece16afb7ddc73f71fd669b5dc0832aac5b8a

    SHA512

    df2e9bcd426408f0e8e2c674ab7fbe32ec10e51f9ffd16be5653f14cd1ae5e143a8f03abe16eecb822a394726ecf8e7daf433f028ce1c88d95c6de1338525017

  • memory/704-98-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/704-97-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1000-94-0x0000000000400000-0x000000000051D000-memory.dmp

    Filesize

    1.1MB

  • memory/1000-78-0x0000000000400000-0x000000000051D000-memory.dmp

    Filesize

    1.1MB

  • memory/1020-65-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1020-63-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1020-69-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1020-57-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1020-60-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1020-77-0x0000000002760000-0x000000000287D000-memory.dmp

    Filesize

    1.1MB

  • memory/1020-79-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1020-66-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1020-61-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1324-54-0x0000000000400000-0x000000000051D000-memory.dmp

    Filesize

    1.1MB

  • memory/1324-67-0x0000000000400000-0x000000000051D000-memory.dmp

    Filesize

    1.1MB

  • memory/1324-68-0x0000000002910000-0x0000000002A2D000-memory.dmp

    Filesize

    1.1MB

  • memory/1324-56-0x00000000757C1000-0x00000000757C3000-memory.dmp

    Filesize

    8KB