Analysis
-
max time kernel
291s -
max time network
183s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14/03/2023, 04:50
Static task
static1
Behavioral task
behavioral1
Sample
6213ba0f7c174d6009e248ec97de6c4bd18bfd5b51ea27a3d186092d23b64dbb.exe
Resource
win7-20230220-en
General
-
Target
6213ba0f7c174d6009e248ec97de6c4bd18bfd5b51ea27a3d186092d23b64dbb.exe
-
Size
3.4MB
-
MD5
ec236b147253c8c3cf42b7fc2ccfb7cf
-
SHA1
115655d5c4170d66a3fbf32b54eede5e25b95299
-
SHA256
6213ba0f7c174d6009e248ec97de6c4bd18bfd5b51ea27a3d186092d23b64dbb
-
SHA512
c9f731e80661bb95d0976c313964816297091f8612b64e3bd80630a0e2a2d311f18c0205d4a2e932c122fb12e53fc8c2fca89420fd0015e5128eaf356fc35fcd
-
SSDEEP
49152:VnPTOKMFrJmsf6/HAv4fVCnoYcNmCCyQaxfrLkWUhsZz2RNRenjqc4i3PHkVgXI/:ZaEU6/HWQ4noYOCtapQX9ejqcT3/SgY/
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ AdobeTemplates-type2.8.8.9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ AdobeTemplates-type2.8.8.9.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AdobeTemplates-type2.8.8.9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion AdobeTemplates-type2.8.8.9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AdobeTemplates-type2.8.8.9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion AdobeTemplates-type2.8.8.9.exe -
Executes dropped EXE 2 IoCs
pid Process 4748 AdobeTemplates-type2.8.8.9.exe 2212 AdobeTemplates-type2.8.8.9.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 3908 icacls.exe 3552 icacls.exe 3868 icacls.exe -
resource yara_rule behavioral2/files/0x000900000001aea3-148.dat upx behavioral2/files/0x000900000001aea3-149.dat upx behavioral2/memory/4748-150-0x00007FF6B3DE0000-0x00007FF6B42FF000-memory.dmp upx behavioral2/memory/4748-151-0x00007FF6B3DE0000-0x00007FF6B42FF000-memory.dmp upx behavioral2/memory/4748-154-0x00007FF6B3DE0000-0x00007FF6B42FF000-memory.dmp upx behavioral2/files/0x000900000001aea3-155.dat upx behavioral2/memory/2212-156-0x00007FF6B3DE0000-0x00007FF6B42FF000-memory.dmp upx behavioral2/memory/2212-157-0x00007FF6B3DE0000-0x00007FF6B42FF000-memory.dmp upx behavioral2/memory/2212-158-0x00007FF6B3DE0000-0x00007FF6B42FF000-memory.dmp upx behavioral2/memory/2212-159-0x00007FF6B3DE0000-0x00007FF6B42FF000-memory.dmp upx behavioral2/memory/2212-160-0x00007FF6B3DE0000-0x00007FF6B42FF000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AdobeTemplates-type2.8.8.9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AdobeTemplates-type2.8.8.9.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4104 set thread context of 4456 4104 6213ba0f7c174d6009e248ec97de6c4bd18bfd5b51ea27a3d186092d23b64dbb.exe 67 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3096 schtasks.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4104 wrote to memory of 4456 4104 6213ba0f7c174d6009e248ec97de6c4bd18bfd5b51ea27a3d186092d23b64dbb.exe 67 PID 4104 wrote to memory of 4456 4104 6213ba0f7c174d6009e248ec97de6c4bd18bfd5b51ea27a3d186092d23b64dbb.exe 67 PID 4104 wrote to memory of 4456 4104 6213ba0f7c174d6009e248ec97de6c4bd18bfd5b51ea27a3d186092d23b64dbb.exe 67 PID 4104 wrote to memory of 4456 4104 6213ba0f7c174d6009e248ec97de6c4bd18bfd5b51ea27a3d186092d23b64dbb.exe 67 PID 4104 wrote to memory of 4456 4104 6213ba0f7c174d6009e248ec97de6c4bd18bfd5b51ea27a3d186092d23b64dbb.exe 67 PID 4456 wrote to memory of 3908 4456 AppLaunch.exe 73 PID 4456 wrote to memory of 3908 4456 AppLaunch.exe 73 PID 4456 wrote to memory of 3908 4456 AppLaunch.exe 73 PID 4456 wrote to memory of 3868 4456 AppLaunch.exe 72 PID 4456 wrote to memory of 3868 4456 AppLaunch.exe 72 PID 4456 wrote to memory of 3868 4456 AppLaunch.exe 72 PID 4456 wrote to memory of 3552 4456 AppLaunch.exe 68 PID 4456 wrote to memory of 3552 4456 AppLaunch.exe 68 PID 4456 wrote to memory of 3552 4456 AppLaunch.exe 68 PID 4456 wrote to memory of 3096 4456 AppLaunch.exe 75 PID 4456 wrote to memory of 3096 4456 AppLaunch.exe 75 PID 4456 wrote to memory of 3096 4456 AppLaunch.exe 75 PID 4456 wrote to memory of 4748 4456 AppLaunch.exe 76 PID 4456 wrote to memory of 4748 4456 AppLaunch.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\6213ba0f7c174d6009e248ec97de6c4bd18bfd5b51ea27a3d186092d23b64dbb.exe"C:\Users\Admin\AppData\Local\Temp\6213ba0f7c174d6009e248ec97de6c4bd18bfd5b51ea27a3d186092d23b64dbb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\AdobeTemplates-type2.8.8.9" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:3552
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\AdobeTemplates-type2.8.8.9" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:3868
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\AdobeTemplates-type2.8.8.9" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:3908
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "AdobeTemplates-type2.8.8.9\AdobeTemplates-type2.8.8.9" /TR "C:\ProgramData\AdobeTemplates-type2.8.8.9\AdobeTemplates-type2.8.8.9.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
PID:3096
-
-
C:\ProgramData\AdobeTemplates-type2.8.8.9\AdobeTemplates-type2.8.8.9.exe"C:\ProgramData\AdobeTemplates-type2.8.8.9\AdobeTemplates-type2.8.8.9.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4748
-
-
-
C:\ProgramData\AdobeTemplates-type2.8.8.9\AdobeTemplates-type2.8.8.9.exeC:\ProgramData\AdobeTemplates-type2.8.8.9\AdobeTemplates-type2.8.8.9.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2212
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
756.4MB
MD525105030b3fad544f31884dc61a11b9f
SHA1ac073d3f3c5af5e129bfc4dbad05705fb57c6661
SHA25672e2ec3f7d9946726f18a15a8b1f17aecfc41f8077c0ae3e80b2dd10259cc5c9
SHA51280f071b85d6b1f5aab4d2b43b33ffb0d31a29e382ab9c2c40fac3b8cfaf63a0d97f2f03266ed6df14a9cee3a08b04d595c7c16e688f599f2a3200d4f6e928007
-
Filesize
756.4MB
MD525105030b3fad544f31884dc61a11b9f
SHA1ac073d3f3c5af5e129bfc4dbad05705fb57c6661
SHA25672e2ec3f7d9946726f18a15a8b1f17aecfc41f8077c0ae3e80b2dd10259cc5c9
SHA51280f071b85d6b1f5aab4d2b43b33ffb0d31a29e382ab9c2c40fac3b8cfaf63a0d97f2f03266ed6df14a9cee3a08b04d595c7c16e688f599f2a3200d4f6e928007
-
Filesize
756.4MB
MD525105030b3fad544f31884dc61a11b9f
SHA1ac073d3f3c5af5e129bfc4dbad05705fb57c6661
SHA25672e2ec3f7d9946726f18a15a8b1f17aecfc41f8077c0ae3e80b2dd10259cc5c9
SHA51280f071b85d6b1f5aab4d2b43b33ffb0d31a29e382ab9c2c40fac3b8cfaf63a0d97f2f03266ed6df14a9cee3a08b04d595c7c16e688f599f2a3200d4f6e928007