Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2023, 15:09
Static task
static1
Behavioral task
behavioral1
Sample
06a8abd0c38135b790d7d5e15f239ba44ec34979725010dda3e7c7947ce03867.exe
Resource
win10v2004-20230220-en
General
-
Target
06a8abd0c38135b790d7d5e15f239ba44ec34979725010dda3e7c7947ce03867.exe
-
Size
6.9MB
-
MD5
17486e2934a6ee2519af6d60e3e9d01d
-
SHA1
ed152f63816c954f460ff0482816b809c2c8369a
-
SHA256
06a8abd0c38135b790d7d5e15f239ba44ec34979725010dda3e7c7947ce03867
-
SHA512
73d25b280fb3218e76d02bba546d7d8897b1af6a05928e153fc8ce9323da363549389d8fd3ffb8609240e10c546ba26459eeed616f994cd0faade795f18da633
-
SSDEEP
98304:slXQmxtqRSpc1q0Mxkd5C9BBIBdQxNl68JZuyZADlSDM0f:Stuv1hckq9si3zJdZv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1296 MicrosoftDesktop-ADP8.0.5.8.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Windows\CurrentVersion\Run 06a8abd0c38135b790d7d5e15f239ba44ec34979725010dda3e7c7947ce03867.exe Set value (str) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftDesktop-ADP8.0.5.8 = "C:\\ProgramData\\MicrosoftDesktop-ADP8.0.5.8\\MicrosoftDesktop-ADP8.0.5.8.exe" 06a8abd0c38135b790d7d5e15f239ba44ec34979725010dda3e7c7947ce03867.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1548 wrote to memory of 1296 1548 06a8abd0c38135b790d7d5e15f239ba44ec34979725010dda3e7c7947ce03867.exe 83 PID 1548 wrote to memory of 1296 1548 06a8abd0c38135b790d7d5e15f239ba44ec34979725010dda3e7c7947ce03867.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\06a8abd0c38135b790d7d5e15f239ba44ec34979725010dda3e7c7947ce03867.exe"C:\Users\Admin\AppData\Local\Temp\06a8abd0c38135b790d7d5e15f239ba44ec34979725010dda3e7c7947ce03867.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\ProgramData\MicrosoftDesktop-ADP8.0.5.8\MicrosoftDesktop-ADP8.0.5.8.exeC:\ProgramData\MicrosoftDesktop-ADP8.0.5.8\MicrosoftDesktop-ADP8.0.5.8.exe2⤵
- Executes dropped EXE
PID:1296
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
756.9MB
MD52c82696425c046104b815f64147cfc7c
SHA1527a08980d8a72de83c948bebc632b3f2455742d
SHA2566b123362c0319bc68561fa9e1da563e3f4390204f18c368829a95229b420d868
SHA51298895ca179e7f26104e07e38a05358b38a306ad5b91aaec8f6c51adbf9c44cec40095021cb4ab20cb16c6400551bc892b2bb20b53feb345be1b6f0d3a7fcbe02
-
Filesize
756.9MB
MD52c82696425c046104b815f64147cfc7c
SHA1527a08980d8a72de83c948bebc632b3f2455742d
SHA2566b123362c0319bc68561fa9e1da563e3f4390204f18c368829a95229b420d868
SHA51298895ca179e7f26104e07e38a05358b38a306ad5b91aaec8f6c51adbf9c44cec40095021cb4ab20cb16c6400551bc892b2bb20b53feb345be1b6f0d3a7fcbe02