Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    26/04/2023, 21:44

General

  • Target

    AdobePDFReader.msi

  • Size

    2.2MB

  • MD5

    fadc9824c68402143239f764c99bb82d

  • SHA1

    7eb72321c2c1e25b11c9d44229af22a179e27ce8

  • SHA256

    9890ae69f0a31a5656dbebce11384a70820ac49cabe9b244dfb8a5ed22617ff5

  • SHA512

    916b9b9836d5003193cf4f52c501a90ba16f18ca13a05325f9e11a6ee9d05b927013c09524757f33efd153c0e1d25648233e79f9a8eaa81fd69ed79282268ef6

  • SSDEEP

    49152:NMU9FgsN+TXYr+LrUcdEL9MklhGUWhe8u/g1PQNPEUI:6gFPgYrordG9t0lepg1P2XI

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\AdobePDFReader.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1212
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1052
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass -file "C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\ad.ps1"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\bozytvm5.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:560
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6DC2.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC6DB2.tmp"
          4⤵
            PID:1548
      • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\readerdc64.exe
        "C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\readerdc64.exe"
        2⤵
        • Executes dropped EXE
        • Modifies Internet Explorer settings
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        PID:1372
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:680
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000060" "000000000000005C"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:888

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Config.Msi\6c6220.rbs

            Filesize

            7KB

            MD5

            6445a70e2e7cac82217c6205665d1ebe

            SHA1

            72629ed4cb3c87f886cd1d52a657478148c25c6b

            SHA256

            beaf77d510e5c42870181874c8635599cbf45329a3866213fd8503e114d4b50e

            SHA512

            f44da5b7cd8bb7ad095811393e28eb782900f7923cc0393487bfb11c241f0b25cdc23777b4e21bc4c7eecf74ab36f5500777eaa763690b1b48f2247fe9341b16

          • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\ad.ps1

            Filesize

            2.2MB

            MD5

            4e0e85a590f4972732f1f0de81aa5507

            SHA1

            8e1bcab1ac25c59c1203d808f04b53b1db5fd7eb

            SHA256

            bde15453821fff0d2ed08a8c10885c9ab4ec1ccc6b4b23a41e9e324e4e80a195

            SHA512

            2b874cf59cdc7298b7fcf6712db3ec4013fcd87b7c7bb44400a789821b35bc57e3ff4e98ccfe93bc4cb420d25b2d3e6967eab2e98abf43bb16543f454cef8953

          • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\readerdc64.exe

            Filesize

            1.2MB

            MD5

            eb17c8572700a9b7bbfb6c1142ad443e

            SHA1

            74022bd63cf919ac44af0dcbe0e4c14756c34b2e

            SHA256

            302b598ae57ca91ba4b4b59e926f2e07a073ab9afcb98eccde02f5e84cdfef52

            SHA512

            e7660219d815bc40741fd6737c092c8f442ebbec4f18981fbf261a269c4e2e162dc0349f76eb7b03a78529021fdab9b84322de7683685ab5d512ac7b4a5a63b0

          • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\readerdc64.exe

            Filesize

            1.2MB

            MD5

            eb17c8572700a9b7bbfb6c1142ad443e

            SHA1

            74022bd63cf919ac44af0dcbe0e4c14756c34b2e

            SHA256

            302b598ae57ca91ba4b4b59e926f2e07a073ab9afcb98eccde02f5e84cdfef52

            SHA512

            e7660219d815bc40741fd6737c092c8f442ebbec4f18981fbf261a269c4e2e162dc0349f76eb7b03a78529021fdab9b84322de7683685ab5d512ac7b4a5a63b0

          • C:\Users\Admin\AppData\Local\Temp\RES6DC2.tmp

            Filesize

            1KB

            MD5

            68ee73755bf96797b6a46df2b210de37

            SHA1

            e9ed152d818abf3eab80639ea43040d331fcade5

            SHA256

            7ffe0e3282e08dfd92861ffb7313b4fdb0a25408fb0af74fba1b2935460a30d6

            SHA512

            7924b15888044e1716ec3b269ff1fc92c39f6a516b05275232342b24ef47276d9cf693b9fce39cd28cca433584f9f1d9d4df8002314ab5d7221b38faafab189d

          • C:\Users\Admin\AppData\Local\Temp\bozytvm5.dll

            Filesize

            3KB

            MD5

            7375a689d6140dfb7192de28f4f91611

            SHA1

            4bd7ed83668a7dadc673a6eac2f9d48d10a4fe2f

            SHA256

            22511afde4f5d2763b5a8013accfc886fb714e02d2ce7935e0fc1c21ef729324

            SHA512

            f43d03bd9627606fb9a72d67ddef0e731b789cf1b9d70edab05faf51e9014adc0928a8fc8c8a113cd5fd179ac51137481b1e539206869cdbffdf7d96448b07e4

          • C:\Users\Admin\AppData\Local\Temp\bozytvm5.pdb

            Filesize

            7KB

            MD5

            7dcf50bc977f8f6965981bad82732b7b

            SHA1

            73ac4cb5d3de9dadf2d9e03222aa4e2c9668902c

            SHA256

            6e552208ba7c341da3dab3159f343497b350f6acd3d0936323d825506a32d56d

            SHA512

            0aa57ffe509aa629d7030ecad7e96e251bbff4828474498f650958a41cb6e60439d8fac623cc2583da4599d0b2675a4552499bfa30b4d4a1ef4d7917b819c6bc

          • C:\Windows\Installer\6c621e.msi

            Filesize

            2.2MB

            MD5

            fadc9824c68402143239f764c99bb82d

            SHA1

            7eb72321c2c1e25b11c9d44229af22a179e27ce8

            SHA256

            9890ae69f0a31a5656dbebce11384a70820ac49cabe9b244dfb8a5ed22617ff5

            SHA512

            916b9b9836d5003193cf4f52c501a90ba16f18ca13a05325f9e11a6ee9d05b927013c09524757f33efd153c0e1d25648233e79f9a8eaa81fd69ed79282268ef6

          • \??\c:\Users\Admin\AppData\Local\Temp\CSC6DB2.tmp

            Filesize

            652B

            MD5

            1df693b6e3f3d9ae21676e1937a7624a

            SHA1

            49005af41836518d5d8aab7f348a57724933bfd5

            SHA256

            92523a330d416800f2013d2ee6d1c0540be52bc5acbf1fc0966fad5b2223b80b

            SHA512

            070889ac73913df54563a1d4fab35d234b467b90b82dd718500c979d985f2c8b5f647a41f35dd6d3b008abd676a3d6817df17765c94ec6636c007ee9c1918a63

          • \??\c:\Users\Admin\AppData\Local\Temp\bozytvm5.0.cs

            Filesize

            203B

            MD5

            b611be9282deb44eed731f72bcbb2b82

            SHA1

            cc1d606d853bbabd5fef87255356a0d54381c289

            SHA256

            ee09fdd61a05266e4e09f418fc6a452f1205d9f29afba6b8a1579333dc3ff3b6

            SHA512

            63b5ad7b65fd4866fb8841e4eee567e4f1e7888bb9fda8dd5c8dca3461d084d3f80ce920ae321609e4ff32ba13a55b7320282ce7201bb74a793d4700240360a4

          • \??\c:\Users\Admin\AppData\Local\Temp\bozytvm5.cmdline

            Filesize

            309B

            MD5

            8491045716440d782c03ffb3addc23c5

            SHA1

            65e347986e25efb1b2a8c642a0277595a54b82cd

            SHA256

            cdfbf993fccb77190d855654126f1a4397acbc7210f638f4f8ef10d989569046

            SHA512

            ba37df45357bfad1a7f0797e46676f65f14844c1856a973bbecea8d9b8fcd24eb841f006ab828a0eca0af5e69521f78d2cffaa934b9b0744a7ccd6de84a5a6ef

          • memory/1372-169-0x00000000012D0000-0x0000000001709000-memory.dmp

            Filesize

            4.2MB

          • memory/1372-198-0x00000000012D0000-0x0000000001709000-memory.dmp

            Filesize

            4.2MB

          • memory/1372-204-0x00000000012D0000-0x0000000001709000-memory.dmp

            Filesize

            4.2MB

          • memory/1372-201-0x00000000012D0000-0x0000000001709000-memory.dmp

            Filesize

            4.2MB

          • memory/1372-80-0x0000000000080000-0x0000000000083000-memory.dmp

            Filesize

            12KB

          • memory/1372-200-0x00000000012D0000-0x0000000001709000-memory.dmp

            Filesize

            4.2MB

          • memory/1372-199-0x00000000012D0000-0x0000000001709000-memory.dmp

            Filesize

            4.2MB

          • memory/1372-194-0x00000000012D0000-0x0000000001709000-memory.dmp

            Filesize

            4.2MB

          • memory/1372-163-0x00000000012D0000-0x0000000001709000-memory.dmp

            Filesize

            4.2MB

          • memory/1372-164-0x0000000000080000-0x0000000000083000-memory.dmp

            Filesize

            12KB

          • memory/1372-79-0x00000000012D0000-0x0000000001709000-memory.dmp

            Filesize

            4.2MB

          • memory/1372-172-0x00000000012D0000-0x0000000001709000-memory.dmp

            Filesize

            4.2MB

          • memory/2000-110-0x0000000002480000-0x0000000002500000-memory.dmp

            Filesize

            512KB

          • memory/2000-86-0x0000000002290000-0x0000000002298000-memory.dmp

            Filesize

            32KB

          • memory/2000-109-0x0000000002480000-0x0000000002500000-memory.dmp

            Filesize

            512KB

          • memory/2000-108-0x0000000002480000-0x0000000002500000-memory.dmp

            Filesize

            512KB

          • memory/2000-105-0x00000000025F0000-0x00000000025F8000-memory.dmp

            Filesize

            32KB

          • memory/2000-85-0x000000001B2E0000-0x000000001B5C2000-memory.dmp

            Filesize

            2.9MB