Analysis

  • max time kernel
    46s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    13-12-2022 11:47

General

  • Target

    ConnectShellSetup11.exe

  • Size

    609KB

  • MD5

    00b6898bf01716f6fe6c1fc1e7256905

  • SHA1

    aedd9210f27091f9b8ad654b4558609c2688379d

  • SHA256

    919eca4e74525fe9a5caafcb0be729be64a9773d4607a2fb615f128f64b1faaf

  • SHA512

    48a0c45996f5165ccd86d2d6454f8738072f4911556e822a0ff6ba8f293802fca39290659c30a394796857bbe8734b6f9fa1bc74ef4dc66d16bb87643c9d18a5

  • SSDEEP

    12288:EA88Vmz5maLaNuGIoS30Dw6SVjgJfNJtPOu/u2/xLyRJWTLgRT06raYED/CyZeU/:EA3SeIvifNJxOuRTlN/CWuWO3A

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 9 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ConnectShellSetup11.exe
    "C:\Users\Admin\AppData\Local\Temp\ConnectShellSetup11.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Users\Admin\AppData\Roaming\Adobe\Connect\connectdetector.exe
      C:\Users\Admin\AppData\Roaming\Adobe\Connect\connectdetector.exe
      2⤵
      • Executes dropped EXE
      PID:1792

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Connect\ConnectDetector.exe

    Filesize

    644KB

    MD5

    77a4c18414964e80b8bbbadf52319578

    SHA1

    389a72b64274b2c171548a6c899d4bbb0ee17cdf

    SHA256

    1bb861dca97f170e7b454e136936a9838133ee7977887403f45362e019ba9f2f

    SHA512

    61acc7ab259975915d312e16f63781bb9c5b841da162e7f27e6174481eea2af31f64b44cb1d30269b5f36c42d1ecf49a91764754fb6e899b0582c8b5727709d9

  • \Users\Admin\AppData\Roaming\Adobe\Connect\Connect.exe

    Filesize

    35.3MB

    MD5

    6b2652f2f1395cc69f6059d5e8248d8b

    SHA1

    0510d81ee1eeaf0cee41a54a3eccb3c01314e635

    SHA256

    62fe0232955662e7f06351a8b7dadc7fdf0b603b1f42f2ca7953a2398e2664ae

    SHA512

    4227ca344d4f52eefb30e8afb09a487a6b68db104e1e41e443647c89e9a75075874d5c599d91c778d10ca857fff019a077ad1763b722303f1332cb83e1a04daa

  • \Users\Admin\AppData\Roaming\Adobe\Connect\Connect.exe

    Filesize

    35.3MB

    MD5

    6b2652f2f1395cc69f6059d5e8248d8b

    SHA1

    0510d81ee1eeaf0cee41a54a3eccb3c01314e635

    SHA256

    62fe0232955662e7f06351a8b7dadc7fdf0b603b1f42f2ca7953a2398e2664ae

    SHA512

    4227ca344d4f52eefb30e8afb09a487a6b68db104e1e41e443647c89e9a75075874d5c599d91c778d10ca857fff019a077ad1763b722303f1332cb83e1a04daa

  • \Users\Admin\AppData\Roaming\Adobe\Connect\ConnectDetector.exe

    Filesize

    644KB

    MD5

    77a4c18414964e80b8bbbadf52319578

    SHA1

    389a72b64274b2c171548a6c899d4bbb0ee17cdf

    SHA256

    1bb861dca97f170e7b454e136936a9838133ee7977887403f45362e019ba9f2f

    SHA512

    61acc7ab259975915d312e16f63781bb9c5b841da162e7f27e6174481eea2af31f64b44cb1d30269b5f36c42d1ecf49a91764754fb6e899b0582c8b5727709d9

  • memory/1696-54-0x00000000766D1000-0x00000000766D3000-memory.dmp

    Filesize

    8KB

  • memory/1792-58-0x0000000000000000-mapping.dmp