Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
24-03-2023 20:26
Behavioral task
behavioral1
Sample
Lightroom_Set-Up.exe
Resource
win7-20230220-en
General
-
Target
Lightroom_Set-Up.exe
-
Size
2.8MB
-
MD5
6bb8c91c81fb2d72cf3df3cace1edb6d
-
SHA1
421d30308ad14ae4d2ce0b6fd513070d141610e6
-
SHA256
8202ac434e2ef9f4555556a7b73dd8b9f63c61b4ff1efe5817a627219a287e47
-
SHA512
dae3a245425770d93aa927e99acd9b277cf2205f443644af9ac1f8ab4a29ae914fa468b235b3260debeebcdf0facf406d2a6d641a5e5a1b026dc8f82b1cb3d33
-
SSDEEP
49152:S51Z7F25DNGy3g9lRC8mk62yFjqGAuf75pqjf8jJPfs/kfwMflf0hchZgtyQr:S515F2W+8ClgduD59fVfwM/aV
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/836-77-0x00000000012B0000-0x0000000001BF3000-memory.dmp upx behavioral1/memory/836-111-0x00000000012B0000-0x0000000001BF3000-memory.dmp upx behavioral1/memory/836-137-0x00000000012B0000-0x0000000001BF3000-memory.dmp upx behavioral1/memory/836-141-0x00000000012B0000-0x0000000001BF3000-memory.dmp upx behavioral1/memory/836-144-0x00000000012B0000-0x0000000001BF3000-memory.dmp upx behavioral1/memory/836-147-0x00000000012B0000-0x0000000001BF3000-memory.dmp upx behavioral1/memory/836-150-0x00000000012B0000-0x0000000001BF3000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Lightroom_Set-Up.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Lightroom_Set-Up.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Lightroom_Set-Up.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Lightroom_Set-Up.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
Lightroom_Set-Up.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Lightroom_Set-Up.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Lightroom_Set-Up.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Lightroom_Set-Up.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Lightroom_Set-Up.exe -
Processes:
Lightroom_Set-Up.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION Lightroom_Set-Up.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\Lightroom_Set-Up.exe = "11001" Lightroom_Set-Up.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION Lightroom_Set-Up.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main Lightroom_Set-Up.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl Lightroom_Set-Up.exe -
Processes:
Lightroom_Set-Up.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 Lightroom_Set-Up.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 Lightroom_Set-Up.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
Lightroom_Set-Up.exepid process 836 Lightroom_Set-Up.exe 836 Lightroom_Set-Up.exe 836 Lightroom_Set-Up.exe 836 Lightroom_Set-Up.exe 836 Lightroom_Set-Up.exe 836 Lightroom_Set-Up.exe 836 Lightroom_Set-Up.exe 836 Lightroom_Set-Up.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
Lightroom_Set-Up.exedescription pid process Token: SeIncreaseQuotaPrivilege 836 Lightroom_Set-Up.exe Token: SeIncreaseQuotaPrivilege 836 Lightroom_Set-Up.exe Token: SeIncreaseQuotaPrivilege 836 Lightroom_Set-Up.exe Token: SeIncreaseQuotaPrivilege 836 Lightroom_Set-Up.exe Token: SeIncreaseQuotaPrivilege 836 Lightroom_Set-Up.exe Token: SeIncreaseQuotaPrivilege 836 Lightroom_Set-Up.exe Token: SeIncreaseQuotaPrivilege 836 Lightroom_Set-Up.exe Token: SeIncreaseQuotaPrivilege 836 Lightroom_Set-Up.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Lightroom_Set-Up.exepid process 836 Lightroom_Set-Up.exe 836 Lightroom_Set-Up.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Lightroom_Set-Up.exe"C:\Users\Admin\AppData\Local\Temp\Lightroom_Set-Up.exe"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\{62278473-A68A-4246-B4C7-A10E58320594}\CCDInstaller.jsFilesize
1.2MB
MD518d4529e99a898e41b49178111edc235
SHA12d15cc2c4cae620db158024a29407351878526ab
SHA25613c952c9dab374ee2ef3de41f2ab5f9d1b488f94f5400498e69bb18bc68bc00b
SHA512e35a072f6aaae8ac111a1b9377d6f86fc47f6064860f07a73b3c8831b4ce4f3d159c5005ce72983a05e3607946a3e42c5803fd2ee5b4b42a7d13511c1abf1341
-
C:\Users\Admin\AppData\Local\Temp\{62278473-A68A-4246-B4C7-A10E58320594}\index.htmlFilesize
426B
MD5a28ab17b18ff254173dfeef03245efd0
SHA1c6ce20924565644601d4e0dd0fba9dde8dea5c77
SHA256886c0ab69e6e9d9d5b5909451640ea587accfcdf11b8369cad8542d1626ac375
SHA5129371a699921b028bd93c35f9f2896d9997b906c8aba90dd4279abba0ae1909a8808a43bf829584e552ccfe534b2c991a5a7e3e3de7618343f50b1c47cff269d6
-
memory/836-77-0x00000000012B0000-0x0000000001BF3000-memory.dmpFilesize
9.3MB
-
memory/836-79-0x0000000000B30000-0x0000000000B31000-memory.dmpFilesize
4KB
-
memory/836-111-0x00000000012B0000-0x0000000001BF3000-memory.dmpFilesize
9.3MB
-
memory/836-137-0x00000000012B0000-0x0000000001BF3000-memory.dmpFilesize
9.3MB
-
memory/836-141-0x00000000012B0000-0x0000000001BF3000-memory.dmpFilesize
9.3MB
-
memory/836-144-0x00000000012B0000-0x0000000001BF3000-memory.dmpFilesize
9.3MB
-
memory/836-147-0x00000000012B0000-0x0000000001BF3000-memory.dmpFilesize
9.3MB
-
memory/836-150-0x00000000012B0000-0x0000000001BF3000-memory.dmpFilesize
9.3MB