Analysis

  • max time kernel
    73s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 19:08

General

  • Target

    Adobe Flash 31 Windows/flashplayer31_0r0_153_winax.exe

  • Size

    19.8MB

  • MD5

    c2756e040a46dfb1218191bc48dc2c5a

  • SHA1

    02604fd09c7d75d48a49a62bbbe26eb154d93a4e

  • SHA256

    37a49b8bc84780578bb9b8399940fe3eb86f25d7795fdd74542a736c5e3f81cc

  • SHA512

    2a06caca117aac3862ad21c1cb941811c918e2b7fe0a3c3b0e5da522b99c93e8d6b32331bd4937c72250d7ba358c17fb98104d65c21154be1a924b141bcdcfa1

  • SSDEEP

    393216:S8KGIOMr+U+PdcvDIQiSYK+U8X+bXZ2I1+ntmXOO5T4:KR+U8dcvEQiSJ+oZN+n+dm

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Adobe Flash 31 Windows\flashplayer31_0r0_153_winax.exe
    "C:\Users\Admin\AppData\Local\Temp\Adobe Flash 31 Windows\flashplayer31_0r0_153_winax.exe"
    1⤵
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:112

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Macromed\Temp\{B383021C-7E39-4F23-AB3D-B0D4F5AB9392}\fpb.tmp
    Filesize

    1.4MB

    MD5

    9240b70bedb18f625f814149742ec7b1

    SHA1

    4ecc6db510da02b951e0749bd4ed1c1c1c998baf

    SHA256

    12b6c16d5cd351f1e120acbe47f14067ad377ae9af91b82ddbb973b8cc7a03a0

    SHA512

    c211763a88942da392abcba45e05a18564a0d654b36f3674c7d1b2530de60551592984fe2f6d6bb6b073d303e33927ed46dacc58c4916f43857442e19c963b1a

  • C:\Windows\SysWOW64\Macromed\Temp\{B383021C-7E39-4F23-AB3D-B0D4F5AB9392}\fpb.tmp
    Filesize

    1.4MB

    MD5

    9240b70bedb18f625f814149742ec7b1

    SHA1

    4ecc6db510da02b951e0749bd4ed1c1c1c998baf

    SHA256

    12b6c16d5cd351f1e120acbe47f14067ad377ae9af91b82ddbb973b8cc7a03a0

    SHA512

    c211763a88942da392abcba45e05a18564a0d654b36f3674c7d1b2530de60551592984fe2f6d6bb6b073d303e33927ed46dacc58c4916f43857442e19c963b1a

  • C:\Windows\SysWOW64\Macromed\Temp\{D67E4586-2554-4A27-B0BD-94C020EC8D55}\fpb.tmp
    Filesize

    577KB

    MD5

    3bf01b9c32e70a68be61273be8f5a40f

    SHA1

    057bc537346150fb3bd1f450517e75eedc4e877d

    SHA256

    0f7c40c68fcfaa728410c82c094324ae96f0c31286a2d3da6807327ff720a27b

    SHA512

    24019a2624a1457a98781a4fc85cd6058f42be115376caa78f1102f180ea2b54d13c51cfaf424c6bf4c6f49b84d6ec3156270a63cb964fbaa95d7098834148f3