Analysis

  • max time kernel
    40s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    31-03-2023 19:08

General

  • Target

    Adobe Flash 31 Windows/flashplayer31_0r0_153_winax.exe

  • Size

    19.8MB

  • MD5

    c2756e040a46dfb1218191bc48dc2c5a

  • SHA1

    02604fd09c7d75d48a49a62bbbe26eb154d93a4e

  • SHA256

    37a49b8bc84780578bb9b8399940fe3eb86f25d7795fdd74542a736c5e3f81cc

  • SHA512

    2a06caca117aac3862ad21c1cb941811c918e2b7fe0a3c3b0e5da522b99c93e8d6b32331bd4937c72250d7ba358c17fb98104d65c21154be1a924b141bcdcfa1

  • SSDEEP

    393216:S8KGIOMr+U+PdcvDIQiSYK+U8X+bXZ2I1+ntmXOO5T4:KR+U8dcvEQiSJ+oZN+n+dm

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Adobe Flash 31 Windows\flashplayer31_0r0_153_winax.exe
    "C:\Users\Admin\AppData\Local\Temp\Adobe Flash 31 Windows\flashplayer31_0r0_153_winax.exe"
    1⤵
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:748

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\Macromed\Temp\{37AC9685-A312-4AFF-80E3-AC4E79BC0A0E}\fpb.tmp
    Filesize

    577KB

    MD5

    3bf01b9c32e70a68be61273be8f5a40f

    SHA1

    057bc537346150fb3bd1f450517e75eedc4e877d

    SHA256

    0f7c40c68fcfaa728410c82c094324ae96f0c31286a2d3da6807327ff720a27b

    SHA512

    24019a2624a1457a98781a4fc85cd6058f42be115376caa78f1102f180ea2b54d13c51cfaf424c6bf4c6f49b84d6ec3156270a63cb964fbaa95d7098834148f3

  • \Windows\SysWOW64\Macromed\Temp\{AE875F57-EE61-4AFA-9409-51C7A816D0BB}\fpb.tmp
    Filesize

    1.4MB

    MD5

    9240b70bedb18f625f814149742ec7b1

    SHA1

    4ecc6db510da02b951e0749bd4ed1c1c1c998baf

    SHA256

    12b6c16d5cd351f1e120acbe47f14067ad377ae9af91b82ddbb973b8cc7a03a0

    SHA512

    c211763a88942da392abcba45e05a18564a0d654b36f3674c7d1b2530de60551592984fe2f6d6bb6b073d303e33927ed46dacc58c4916f43857442e19c963b1a