Analysis
-
max time kernel
186s -
max time network
211s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 12:01
Static task
static1
Behavioral task
behavioral1
Sample
12bbd37a1d104d48dab231eb2ba24970ed7e04cb5cf7f8bf8dd86d0ee2fe94ab.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
12bbd37a1d104d48dab231eb2ba24970ed7e04cb5cf7f8bf8dd86d0ee2fe94ab.exe
Resource
win10v2004-20221111-en
General
-
Target
12bbd37a1d104d48dab231eb2ba24970ed7e04cb5cf7f8bf8dd86d0ee2fe94ab.exe
-
Size
764KB
-
MD5
ee387cfe47dae2dce528a50eff0ef099
-
SHA1
c763c190a8a01966764dbefa859573d4d8387374
-
SHA256
12bbd37a1d104d48dab231eb2ba24970ed7e04cb5cf7f8bf8dd86d0ee2fe94ab
-
SHA512
11c8ae1e270f82475d4f4fb4d82071669603c4259ffaf91d0642bfc158c21dc02c5ded66482bda61566ef3af1e2013924a331d92eae467768ea1c5efcb8e276e
-
SSDEEP
12288:ahkDgouVr2nxKkorvdRgQriDwOIxmxiZnYQE7PJc54arH7RwU2aPqfU:aRRJkcoQricOIQxiZY1barHFwU5PqM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 576 Adobe.Reader.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 924 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Adobe.Reader.exe Adobe.Reader.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Adobe.Reader.exe Adobe.Reader.exe -
Loads dropped DLL 4 IoCs
pid Process 1140 12bbd37a1d104d48dab231eb2ba24970ed7e04cb5cf7f8bf8dd86d0ee2fe94ab.exe 1140 12bbd37a1d104d48dab231eb2ba24970ed7e04cb5cf7f8bf8dd86d0ee2fe94ab.exe 1140 12bbd37a1d104d48dab231eb2ba24970ed7e04cb5cf7f8bf8dd86d0ee2fe94ab.exe 1140 12bbd37a1d104d48dab231eb2ba24970ed7e04cb5cf7f8bf8dd86d0ee2fe94ab.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Adobe.Reader.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Adobe.Reader.exe\"" Adobe.Reader.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run Adobe.Reader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe.Reader.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Adobe.Reader.exe\"" Adobe.Reader.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run Adobe.Reader.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\n: Adobe.Reader.exe File opened (read-only) \??\p: Adobe.Reader.exe File opened (read-only) \??\r: Adobe.Reader.exe File opened (read-only) \??\v: Adobe.Reader.exe File opened (read-only) \??\w: Adobe.Reader.exe File opened (read-only) \??\b: Adobe.Reader.exe File opened (read-only) \??\i: Adobe.Reader.exe File opened (read-only) \??\l: Adobe.Reader.exe File opened (read-only) \??\m: Adobe.Reader.exe File opened (read-only) \??\o: Adobe.Reader.exe File opened (read-only) \??\t: Adobe.Reader.exe File opened (read-only) \??\z: Adobe.Reader.exe File opened (read-only) \??\e: Adobe.Reader.exe File opened (read-only) \??\g: Adobe.Reader.exe File opened (read-only) \??\k: Adobe.Reader.exe File opened (read-only) \??\s: Adobe.Reader.exe File opened (read-only) \??\u: Adobe.Reader.exe File opened (read-only) \??\y: Adobe.Reader.exe File opened (read-only) \??\a: Adobe.Reader.exe File opened (read-only) \??\f: Adobe.Reader.exe File opened (read-only) \??\h: Adobe.Reader.exe File opened (read-only) \??\j: Adobe.Reader.exe File opened (read-only) \??\q: Adobe.Reader.exe File opened (read-only) \??\x: Adobe.Reader.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0009000000012696-55.dat autoit_exe behavioral1/files/0x0009000000012696-56.dat autoit_exe behavioral1/files/0x0009000000012696-57.dat autoit_exe behavioral1/files/0x0009000000012696-58.dat autoit_exe behavioral1/files/0x0009000000012696-60.dat autoit_exe behavioral1/files/0x0009000000012696-62.dat autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1140 wrote to memory of 576 1140 12bbd37a1d104d48dab231eb2ba24970ed7e04cb5cf7f8bf8dd86d0ee2fe94ab.exe 28 PID 1140 wrote to memory of 576 1140 12bbd37a1d104d48dab231eb2ba24970ed7e04cb5cf7f8bf8dd86d0ee2fe94ab.exe 28 PID 1140 wrote to memory of 576 1140 12bbd37a1d104d48dab231eb2ba24970ed7e04cb5cf7f8bf8dd86d0ee2fe94ab.exe 28 PID 1140 wrote to memory of 576 1140 12bbd37a1d104d48dab231eb2ba24970ed7e04cb5cf7f8bf8dd86d0ee2fe94ab.exe 28 PID 576 wrote to memory of 924 576 Adobe.Reader.exe 29 PID 576 wrote to memory of 924 576 Adobe.Reader.exe 29 PID 576 wrote to memory of 924 576 Adobe.Reader.exe 29 PID 576 wrote to memory of 924 576 Adobe.Reader.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\12bbd37a1d104d48dab231eb2ba24970ed7e04cb5cf7f8bf8dd86d0ee2fe94ab.exe"C:\Users\Admin\AppData\Local\Temp\12bbd37a1d104d48dab231eb2ba24970ed7e04cb5cf7f8bf8dd86d0ee2fe94ab.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Roaming\Adobe.Reader.exe"C:\Users\Admin\AppData\Roaming\Adobe.Reader.exe" "del" C:\Users\Admin\AppData\Local\Temp\12bbd37a1d104d48dab231eb2ba24970ed7e04cb5cf7f8bf8dd86d0ee2fe94ab.exe2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Adobe.Reader.exe" "Adobe.Reader.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:924
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
764KB
MD5ee387cfe47dae2dce528a50eff0ef099
SHA1c763c190a8a01966764dbefa859573d4d8387374
SHA25612bbd37a1d104d48dab231eb2ba24970ed7e04cb5cf7f8bf8dd86d0ee2fe94ab
SHA51211c8ae1e270f82475d4f4fb4d82071669603c4259ffaf91d0642bfc158c21dc02c5ded66482bda61566ef3af1e2013924a331d92eae467768ea1c5efcb8e276e
-
Filesize
764KB
MD5ee387cfe47dae2dce528a50eff0ef099
SHA1c763c190a8a01966764dbefa859573d4d8387374
SHA25612bbd37a1d104d48dab231eb2ba24970ed7e04cb5cf7f8bf8dd86d0ee2fe94ab
SHA51211c8ae1e270f82475d4f4fb4d82071669603c4259ffaf91d0642bfc158c21dc02c5ded66482bda61566ef3af1e2013924a331d92eae467768ea1c5efcb8e276e
-
Filesize
11B
MD5301a3e5a5c08c60b2952122a97e1a838
SHA1c85da2ebd9e1098eed686b8c74016bee728bb942
SHA25689886e624db56b7f7e7a0a857fc7e63ebfffe9eb69b329489b79dd0a3e24f7fa
SHA512ce1dcdad347d6c8e6a798b915f8a8d8ac1be4851c0064ab62e80aa85103a472f402b688e94950099a812db1134917fe9d51a7dfa0504e0174e94acdad8ee34d9
-
Filesize
764KB
MD5ee387cfe47dae2dce528a50eff0ef099
SHA1c763c190a8a01966764dbefa859573d4d8387374
SHA25612bbd37a1d104d48dab231eb2ba24970ed7e04cb5cf7f8bf8dd86d0ee2fe94ab
SHA51211c8ae1e270f82475d4f4fb4d82071669603c4259ffaf91d0642bfc158c21dc02c5ded66482bda61566ef3af1e2013924a331d92eae467768ea1c5efcb8e276e
-
Filesize
764KB
MD5ee387cfe47dae2dce528a50eff0ef099
SHA1c763c190a8a01966764dbefa859573d4d8387374
SHA25612bbd37a1d104d48dab231eb2ba24970ed7e04cb5cf7f8bf8dd86d0ee2fe94ab
SHA51211c8ae1e270f82475d4f4fb4d82071669603c4259ffaf91d0642bfc158c21dc02c5ded66482bda61566ef3af1e2013924a331d92eae467768ea1c5efcb8e276e
-
Filesize
764KB
MD5ee387cfe47dae2dce528a50eff0ef099
SHA1c763c190a8a01966764dbefa859573d4d8387374
SHA25612bbd37a1d104d48dab231eb2ba24970ed7e04cb5cf7f8bf8dd86d0ee2fe94ab
SHA51211c8ae1e270f82475d4f4fb4d82071669603c4259ffaf91d0642bfc158c21dc02c5ded66482bda61566ef3af1e2013924a331d92eae467768ea1c5efcb8e276e
-
Filesize
764KB
MD5ee387cfe47dae2dce528a50eff0ef099
SHA1c763c190a8a01966764dbefa859573d4d8387374
SHA25612bbd37a1d104d48dab231eb2ba24970ed7e04cb5cf7f8bf8dd86d0ee2fe94ab
SHA51211c8ae1e270f82475d4f4fb4d82071669603c4259ffaf91d0642bfc158c21dc02c5ded66482bda61566ef3af1e2013924a331d92eae467768ea1c5efcb8e276e