Analysis

  • max time kernel
    144s
  • max time network
    112s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    26-04-2023 10:04

General

  • Target

    AdobePDFReader (10).msi

  • Size

    2.2MB

  • MD5

    fadc9824c68402143239f764c99bb82d

  • SHA1

    7eb72321c2c1e25b11c9d44229af22a179e27ce8

  • SHA256

    9890ae69f0a31a5656dbebce11384a70820ac49cabe9b244dfb8a5ed22617ff5

  • SHA512

    916b9b9836d5003193cf4f52c501a90ba16f18ca13a05325f9e11a6ee9d05b927013c09524757f33efd153c0e1d25648233e79f9a8eaa81fd69ed79282268ef6

  • SSDEEP

    49152:NMU9FgsN+TXYr+LrUcdEL9MklhGUWhe8u/g1PQNPEUI:6gFPgYrordG9t0lepg1P2XI

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\AdobePDFReader (10).msi"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1152
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass -file "C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\ad.ps1"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1648
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qatfdg00.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1656
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8104.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC80F3.tmp"
          4⤵
            PID:544
      • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\readerdc64.exe
        "C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\readerdc64.exe"
        2⤵
        • Executes dropped EXE
        • Modifies Internet Explorer settings
        • Modifies system certificate store
        • Suspicious use of SetWindowsHookEx
        PID:1480
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:964
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003AC" "00000000000005A0"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:764

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\6c6efb.rbs

      Filesize

      7KB

      MD5

      8b2171545c9819514be771049fb73d41

      SHA1

      40c86d97bc9a493b02bc04377906cb2681c6645d

      SHA256

      6b7b97f9f60100543544c4c0113b6a4fadf6bdc16f0728a4e14bca50e671c4e7

      SHA512

      38e59beb29ab47e42bc24d7ea80430fb67fcd3651e4279fe388ee9a6bd6229a5ec90ed5debb13a10a2054cda3b587ed656899b584d601e9af1e1129097479e95

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\ad.ps1

      Filesize

      2.2MB

      MD5

      4e0e85a590f4972732f1f0de81aa5507

      SHA1

      8e1bcab1ac25c59c1203d808f04b53b1db5fd7eb

      SHA256

      bde15453821fff0d2ed08a8c10885c9ab4ec1ccc6b4b23a41e9e324e4e80a195

      SHA512

      2b874cf59cdc7298b7fcf6712db3ec4013fcd87b7c7bb44400a789821b35bc57e3ff4e98ccfe93bc4cb420d25b2d3e6967eab2e98abf43bb16543f454cef8953

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\readerdc64.exe

      Filesize

      1.2MB

      MD5

      eb17c8572700a9b7bbfb6c1142ad443e

      SHA1

      74022bd63cf919ac44af0dcbe0e4c14756c34b2e

      SHA256

      302b598ae57ca91ba4b4b59e926f2e07a073ab9afcb98eccde02f5e84cdfef52

      SHA512

      e7660219d815bc40741fd6737c092c8f442ebbec4f18981fbf261a269c4e2e162dc0349f76eb7b03a78529021fdab9b84322de7683685ab5d512ac7b4a5a63b0

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\readerdc64.exe

      Filesize

      1.2MB

      MD5

      eb17c8572700a9b7bbfb6c1142ad443e

      SHA1

      74022bd63cf919ac44af0dcbe0e4c14756c34b2e

      SHA256

      302b598ae57ca91ba4b4b59e926f2e07a073ab9afcb98eccde02f5e84cdfef52

      SHA512

      e7660219d815bc40741fd6737c092c8f442ebbec4f18981fbf261a269c4e2e162dc0349f76eb7b03a78529021fdab9b84322de7683685ab5d512ac7b4a5a63b0

    • C:\Users\Admin\AppData\Local\Temp\RES8104.tmp

      Filesize

      1KB

      MD5

      336fa755ca3126db86030328e84cdfcd

      SHA1

      ce3df95d9e9dc60ed05c048e63bfb2a4badd15f7

      SHA256

      7a9dd7af00cf37f4925a4200e760ae34469ef75ac814cb2b12df3dda4d19a992

      SHA512

      084d409b59e395b1ffea76e1b9ca3cb61f70a3b66fd79c9e9f2353a5b4c190285395f591d96fb87325eb68cd5a44fd448c93d320f044e3cd077fbb3923ec32e1

    • C:\Users\Admin\AppData\Local\Temp\qatfdg00.dll

      Filesize

      3KB

      MD5

      4a94d3eaad4bab589ecc16ba47e9dd05

      SHA1

      4c48b204dcef54493155ffd297a65843b3da0214

      SHA256

      82101e961d01deb94e6648b4f23769cd326f873341fa5eff49eb35571120085f

      SHA512

      6e96efc949c04a4be33695bb4bcc3be38cfbebb543ab64d0de2cea7885cf190dd9d81e27058f248a72bf07a611ecd5c560169a1a7d18f53df42d05f2c865187e

    • C:\Users\Admin\AppData\Local\Temp\qatfdg00.pdb

      Filesize

      7KB

      MD5

      c05a4768069359906c3700079f538cfe

      SHA1

      394cfa6ff4a58ccc420afbde69058d5dae9da56c

      SHA256

      df31b7f261f2b0d11f66be3d67546a4fe3d8ccb33bfe146355764d058a5c3231

      SHA512

      fb637e6985a64b18862e8898c821f67612b48d6ebd669b6e9a7562e256610c557660717762a4fdb2d560e07a2c57678f98cca36da021d1d8e493c58f9877b619

    • C:\Windows\Installer\6c6ef9.msi

      Filesize

      2.2MB

      MD5

      fadc9824c68402143239f764c99bb82d

      SHA1

      7eb72321c2c1e25b11c9d44229af22a179e27ce8

      SHA256

      9890ae69f0a31a5656dbebce11384a70820ac49cabe9b244dfb8a5ed22617ff5

      SHA512

      916b9b9836d5003193cf4f52c501a90ba16f18ca13a05325f9e11a6ee9d05b927013c09524757f33efd153c0e1d25648233e79f9a8eaa81fd69ed79282268ef6

    • \??\c:\Users\Admin\AppData\Local\Temp\CSC80F3.tmp

      Filesize

      652B

      MD5

      1b9b01cb43418800c1ea32498b0937e8

      SHA1

      8d409fb4295497f81674500b5f598a135a33bb13

      SHA256

      368227f3ea4265bd421bc6245f2dfa234147653798a997d79577bf2aea96398f

      SHA512

      3f987dcefbc06cf3aed5b8faa8de08b5f502a7af61856b6e649d11997c20767738be617c7322611493211b1757e0f267efd7352a3eebba5e6cf439eaccf5d581

    • \??\c:\Users\Admin\AppData\Local\Temp\qatfdg00.0.cs

      Filesize

      203B

      MD5

      b611be9282deb44eed731f72bcbb2b82

      SHA1

      cc1d606d853bbabd5fef87255356a0d54381c289

      SHA256

      ee09fdd61a05266e4e09f418fc6a452f1205d9f29afba6b8a1579333dc3ff3b6

      SHA512

      63b5ad7b65fd4866fb8841e4eee567e4f1e7888bb9fda8dd5c8dca3461d084d3f80ce920ae321609e4ff32ba13a55b7320282ce7201bb74a793d4700240360a4

    • \??\c:\Users\Admin\AppData\Local\Temp\qatfdg00.cmdline

      Filesize

      309B

      MD5

      d2c8bb1dfaa0b971d9e03b3d0c462380

      SHA1

      690d94e4e83633c316eefb7f3000529e5a9e269f

      SHA256

      2b6322f82a3dfc3fe5ab7d3f84048bd95beefe78ab5a5d8864539f7bb5fbade6

      SHA512

      042446ea01e8f3993fdecc60f7e6e95c4d164ed88c8cdd88b45786900e811fc6daa24b9e39ff9aeb0533287fbff16bbb91aa650686d651244850d8db3afd4d70

    • memory/1480-85-0x00000000000F0000-0x00000000000F3000-memory.dmp

      Filesize

      12KB

    • memory/1480-164-0x00000000009D0000-0x0000000000E09000-memory.dmp

      Filesize

      4.2MB

    • memory/1480-169-0x00000000009D0000-0x0000000000E09000-memory.dmp

      Filesize

      4.2MB

    • memory/1480-172-0x00000000009D0000-0x0000000000E09000-memory.dmp

      Filesize

      4.2MB

    • memory/1480-182-0x00000000009D0000-0x0000000000E09000-memory.dmp

      Filesize

      4.2MB

    • memory/1480-187-0x00000000009D0000-0x0000000000E09000-memory.dmp

      Filesize

      4.2MB

    • memory/1480-83-0x00000000009D0000-0x0000000000E09000-memory.dmp

      Filesize

      4.2MB

    • memory/1648-98-0x0000000002590000-0x0000000002610000-memory.dmp

      Filesize

      512KB

    • memory/1648-110-0x0000000002580000-0x0000000002588000-memory.dmp

      Filesize

      32KB

    • memory/1648-97-0x0000000002590000-0x0000000002610000-memory.dmp

      Filesize

      512KB

    • memory/1648-84-0x000000001B180000-0x000000001B462000-memory.dmp

      Filesize

      2.9MB

    • memory/1648-88-0x0000000002590000-0x0000000002610000-memory.dmp

      Filesize

      512KB

    • memory/1648-87-0x0000000002310000-0x0000000002318000-memory.dmp

      Filesize

      32KB

    • memory/1648-86-0x0000000002590000-0x0000000002610000-memory.dmp

      Filesize

      512KB