Analysis
-
max time kernel
59s -
max time network
179s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02/03/2023, 04:03
Static task
static1
Behavioral task
behavioral1
Sample
0ad254619ae06384afb019ea6d078a3676f84eb46d3d31902ef67888cdb9ee21.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0ad254619ae06384afb019ea6d078a3676f84eb46d3d31902ef67888cdb9ee21.exe
Resource
win10-20230220-en
General
-
Target
0ad254619ae06384afb019ea6d078a3676f84eb46d3d31902ef67888cdb9ee21.exe
-
Size
4.4MB
-
MD5
50b7adeb56e7caf701dfd20921ea8774
-
SHA1
fd28ea525f09f9a9de9c172ed8f81fbec5f06b57
-
SHA256
0ad254619ae06384afb019ea6d078a3676f84eb46d3d31902ef67888cdb9ee21
-
SHA512
2aa67e364c56287574c80917cd424b6766e1216a0cffda30e2e49e35d8d36fe9d214a7dc1cb276f260eb148a6b6e72837f210f87ad7bf0a7b745df39f3855399
-
SSDEEP
98304:LPc31RBC96etJeZ3G9LWme1lZW03xLiSJOIQMEy8PyEpzVQa/H1YMlJ:Y/+64JeBILWmeLw03dRJpP8PHb/HNJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1516 AdobeDocuments-Type0.2.5.7.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Windows\CurrentVersion\Run\AdobeDocuments-Type0.2.5.7 = "C:\\ProgramData\\AdobeDocuments-Type0.2.5.7\\AdobeDocuments-Type0.2.5.7.exe" AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4104 set thread context of 2272 4104 0ad254619ae06384afb019ea6d078a3676f84eb46d3d31902ef67888cdb9ee21.exe 67 -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4104 wrote to memory of 2272 4104 0ad254619ae06384afb019ea6d078a3676f84eb46d3d31902ef67888cdb9ee21.exe 67 PID 4104 wrote to memory of 2272 4104 0ad254619ae06384afb019ea6d078a3676f84eb46d3d31902ef67888cdb9ee21.exe 67 PID 4104 wrote to memory of 2272 4104 0ad254619ae06384afb019ea6d078a3676f84eb46d3d31902ef67888cdb9ee21.exe 67 PID 4104 wrote to memory of 2272 4104 0ad254619ae06384afb019ea6d078a3676f84eb46d3d31902ef67888cdb9ee21.exe 67 PID 4104 wrote to memory of 2272 4104 0ad254619ae06384afb019ea6d078a3676f84eb46d3d31902ef67888cdb9ee21.exe 67 PID 2272 wrote to memory of 1516 2272 AppLaunch.exe 68 PID 2272 wrote to memory of 1516 2272 AppLaunch.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ad254619ae06384afb019ea6d078a3676f84eb46d3d31902ef67888cdb9ee21.exe"C:\Users\Admin\AppData\Local\Temp\0ad254619ae06384afb019ea6d078a3676f84eb46d3d31902ef67888cdb9ee21.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\ProgramData\AdobeDocuments-Type0.2.5.7\AdobeDocuments-Type0.2.5.7.exe"C:\ProgramData\AdobeDocuments-Type0.2.5.7\AdobeDocuments-Type0.2.5.7.exe"3⤵
- Executes dropped EXE
PID:1516
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
822.9MB
MD5c2f34712084356d25a5d830d88371c5c
SHA1efe5ab22c0881cabc70f76732279af6d2c355836
SHA25685f103e7001a92a556f535ede650c9a6c2dcb02bf0d3fa8189707dd1a13991cf
SHA5126b454259b26afab5d7f0ed33eec10d16d1f90d7f5cc05c9b734098b6cece28d37dc9d65e1f582f2b38f1a9e5ae9bce76422b8f81f03a485cc503f9aab65e84a4
-
Filesize
822.9MB
MD5c2f34712084356d25a5d830d88371c5c
SHA1efe5ab22c0881cabc70f76732279af6d2c355836
SHA25685f103e7001a92a556f535ede650c9a6c2dcb02bf0d3fa8189707dd1a13991cf
SHA5126b454259b26afab5d7f0ed33eec10d16d1f90d7f5cc05c9b734098b6cece28d37dc9d65e1f582f2b38f1a9e5ae9bce76422b8f81f03a485cc503f9aab65e84a4