Analysis

  • max time kernel
    93s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 19:08

General

  • Target

    Adobe Flash 31 Windows/flashplayer31_0r0_153_win.exe

  • Size

    20.3MB

  • MD5

    2dd6a03469cf27db821ade02d3e7460b

  • SHA1

    204ea0483217bdee883d4bb73ac428f7439004a9

  • SHA256

    72a5df8903d8bddfb9a38f05d8a8ff9f9a9fe6cd6d6c6d4b08d9733a97e00016

  • SHA512

    4765d60376b44b1422e7891b7696573648b2b29b4af536f4c6bac80f15985dbd066b3cdaaeaa73f4cdac4344a36d0570098eb39f74594a2357fd3ba32f781e84

  • SSDEEP

    393216:TF0EAKW9nr5noMoQXijbqStE9x2BE/kk/S2LJHPVsichNksAj:5aKanlnoyO7va8k/SqXchNksE

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Adobe Flash 31 Windows\flashplayer31_0r0_153_win.exe
    "C:\Users\Admin\AppData\Local\Temp\Adobe Flash 31 Windows\flashplayer31_0r0_153_win.exe"
    1⤵
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:3624

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Macromed\Temp\{3DE194E0-46BC-4420-BC9F-AD4574034056}\fpb.tmp
    Filesize

    577KB

    MD5

    3bf01b9c32e70a68be61273be8f5a40f

    SHA1

    057bc537346150fb3bd1f450517e75eedc4e877d

    SHA256

    0f7c40c68fcfaa728410c82c094324ae96f0c31286a2d3da6807327ff720a27b

    SHA512

    24019a2624a1457a98781a4fc85cd6058f42be115376caa78f1102f180ea2b54d13c51cfaf424c6bf4c6f49b84d6ec3156270a63cb964fbaa95d7098834148f3

  • C:\Windows\SysWOW64\Macromed\Temp\{BA701328-4128-4E46-9A24-8E5DADFA85D6}\fpb.tmp
    Filesize

    1.4MB

    MD5

    9240b70bedb18f625f814149742ec7b1

    SHA1

    4ecc6db510da02b951e0749bd4ed1c1c1c998baf

    SHA256

    12b6c16d5cd351f1e120acbe47f14067ad377ae9af91b82ddbb973b8cc7a03a0

    SHA512

    c211763a88942da392abcba45e05a18564a0d654b36f3674c7d1b2530de60551592984fe2f6d6bb6b073d303e33927ed46dacc58c4916f43857442e19c963b1a

  • C:\Windows\SysWOW64\Macromed\Temp\{BA701328-4128-4E46-9A24-8E5DADFA85D6}\fpb.tmp
    Filesize

    1.4MB

    MD5

    9240b70bedb18f625f814149742ec7b1

    SHA1

    4ecc6db510da02b951e0749bd4ed1c1c1c998baf

    SHA256

    12b6c16d5cd351f1e120acbe47f14067ad377ae9af91b82ddbb973b8cc7a03a0

    SHA512

    c211763a88942da392abcba45e05a18564a0d654b36f3674c7d1b2530de60551592984fe2f6d6bb6b073d303e33927ed46dacc58c4916f43857442e19c963b1a