Analysis
-
max time kernel
88s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/01/2023, 08:59
Static task
static1
Behavioral task
behavioral1
Sample
Account Statement.one
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Account Statement.one
Resource
win10v2004-20220812-en
General
-
Target
Account Statement.one
-
Size
787KB
-
MD5
dce558ebbb37691fe914fc59c538edc5
-
SHA1
83e30bba7be9fef0e411384b8862aa26c2e780a9
-
SHA256
f3aa175a1d0e8300f923b9a73bf250af99ce67b03a09558b449ea3b09dd59750
-
SHA512
0fce236780727482dc7c0657cfbeb5d6218682ee291cb2e98b3436e8d22a604c64fa0196c80f4571412ce17f508cdcf6de0f43c0de0d3e9497ac569d94523f6a
-
SSDEEP
6144:rdzoylI8tcZ1KmoND9JjD3R4XTmHtt6+2JwD:rds9gnKTct
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4536 AcroRd32.exe 4536 AcroRd32.exe 4536 AcroRd32.exe 4536 AcroRd32.exe 4536 AcroRd32.exe 4536 AcroRd32.exe 4536 AcroRd32.exe 4536 AcroRd32.exe 4536 AcroRd32.exe 4536 AcroRd32.exe 4536 AcroRd32.exe 4536 AcroRd32.exe 4536 AcroRd32.exe 4536 AcroRd32.exe 4536 AcroRd32.exe 4536 AcroRd32.exe 4536 AcroRd32.exe 4536 AcroRd32.exe 4536 AcroRd32.exe 4536 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4536 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 2268 OpenWith.exe 2268 OpenWith.exe 2268 OpenWith.exe 2268 OpenWith.exe 2268 OpenWith.exe 2268 OpenWith.exe 2268 OpenWith.exe 2268 OpenWith.exe 2268 OpenWith.exe 2268 OpenWith.exe 2268 OpenWith.exe 2268 OpenWith.exe 2268 OpenWith.exe 2268 OpenWith.exe 2268 OpenWith.exe 4536 AcroRd32.exe 4536 AcroRd32.exe 4536 AcroRd32.exe 4536 AcroRd32.exe 4536 AcroRd32.exe 4536 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2268 wrote to memory of 4536 2268 OpenWith.exe 92 PID 2268 wrote to memory of 4536 2268 OpenWith.exe 92 PID 2268 wrote to memory of 4536 2268 OpenWith.exe 92 PID 4536 wrote to memory of 524 4536 AcroRd32.exe 94 PID 4536 wrote to memory of 524 4536 AcroRd32.exe 94 PID 4536 wrote to memory of 524 4536 AcroRd32.exe 94 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4504 524 RdrCEF.exe 95 PID 524 wrote to memory of 4644 524 RdrCEF.exe 96 PID 524 wrote to memory of 4644 524 RdrCEF.exe 96 PID 524 wrote to memory of 4644 524 RdrCEF.exe 96 PID 524 wrote to memory of 4644 524 RdrCEF.exe 96 PID 524 wrote to memory of 4644 524 RdrCEF.exe 96 PID 524 wrote to memory of 4644 524 RdrCEF.exe 96 PID 524 wrote to memory of 4644 524 RdrCEF.exe 96 PID 524 wrote to memory of 4644 524 RdrCEF.exe 96 PID 524 wrote to memory of 4644 524 RdrCEF.exe 96 PID 524 wrote to memory of 4644 524 RdrCEF.exe 96 PID 524 wrote to memory of 4644 524 RdrCEF.exe 96 PID 524 wrote to memory of 4644 524 RdrCEF.exe 96 PID 524 wrote to memory of 4644 524 RdrCEF.exe 96 PID 524 wrote to memory of 4644 524 RdrCEF.exe 96 PID 524 wrote to memory of 4644 524 RdrCEF.exe 96 PID 524 wrote to memory of 4644 524 RdrCEF.exe 96 PID 524 wrote to memory of 4644 524 RdrCEF.exe 96
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Account Statement.one"1⤵
- Modifies registry class
PID:2220
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Account Statement.one"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A921FE25FB479626D2A3A71939184636 --mojo-platform-channel-handle=1712 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4504
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=E0E2ADB8960C543E813120F94A6B7707 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=E0E2ADB8960C543E813120F94A6B7707 --renderer-client-id=2 --mojo-platform-channel-handle=1720 --allow-no-sandbox-job /prefetch:14⤵PID:4644
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=DF9CE0FE951D609B0F85DB9B4772AB1E --mojo-platform-channel-handle=2276 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4864
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B3F499B5960DC3E018FD1638613EE51A --mojo-platform-channel-handle=2308 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4104
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D63E965A5AA87FC95313CA11D7B18A3D --mojo-platform-channel-handle=2304 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:3308
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=8A794FE8AA8DA90806D2167E127F71A4 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=8A794FE8AA8DA90806D2167E127F71A4 --renderer-client-id=8 --mojo-platform-channel-handle=2444 --allow-no-sandbox-job /prefetch:14⤵PID:4796
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3028