Analysis

  • max time kernel
    89s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    13/06/2023, 21:34

General

  • Target

    Adobe Premiere Pro Crack/Adobe Premiere Pro Crack/Set-up.exe

  • Size

    1021.2MB

  • MD5

    8a770217cde0fd2d05a08d33aefba9a7

  • SHA1

    c447d9548b54690f37c913744370c859fbd719be

  • SHA256

    ae2975696c0b6f6f1009a0cfe612f5ecd974f13967283b3b2ab87706e325ec7a

  • SHA512

    f6324528463d4af968416fed82c16f15ae27f18ab78c32844472eac78bb5fb4de13f3ef576cd84433d549186956c23923a4b8690d8de0e6fe433a04ac834bc99

  • SSDEEP

    24576:9uSFnrkjIe3pOFlScySTf0kvGTdsCww2d+aSFC1qhBnEsT+ddem5nzU0l:r9kx3CPyEfdvGTfwwZhFRBTpOzU0

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Adobe Premiere Pro Crack\Adobe Premiere Pro Crack\Set-up.exe
    "C:\Users\Admin\AppData\Local\Temp\Adobe Premiere Pro Crack\Adobe Premiere Pro Crack\Set-up.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2892
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
        PID:2908
    • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" /s "C:\Users\Admin\Desktop\WaitClear.pps" /ou ""
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:5032

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2892-133-0x00000000001D0000-0x000000000043C000-memory.dmp

      Filesize

      2.4MB

    • memory/2892-134-0x000000001B410000-0x000000001B512000-memory.dmp

      Filesize

      1.0MB

    • memory/5032-136-0x00007FFDD7250000-0x00007FFDD7260000-memory.dmp

      Filesize

      64KB

    • memory/5032-137-0x00007FFDD7250000-0x00007FFDD7260000-memory.dmp

      Filesize

      64KB

    • memory/5032-138-0x00007FFDD7250000-0x00007FFDD7260000-memory.dmp

      Filesize

      64KB

    • memory/5032-139-0x00007FFDD7250000-0x00007FFDD7260000-memory.dmp

      Filesize

      64KB

    • memory/5032-140-0x00007FFDD7250000-0x00007FFDD7260000-memory.dmp

      Filesize

      64KB

    • memory/5032-141-0x00007FFDD50E0000-0x00007FFDD50F0000-memory.dmp

      Filesize

      64KB

    • memory/5032-142-0x00007FFDD50E0000-0x00007FFDD50F0000-memory.dmp

      Filesize

      64KB

    • memory/5032-158-0x00007FFDD7250000-0x00007FFDD7260000-memory.dmp

      Filesize

      64KB

    • memory/5032-159-0x00007FFDD7250000-0x00007FFDD7260000-memory.dmp

      Filesize

      64KB

    • memory/5032-160-0x00007FFDD7250000-0x00007FFDD7260000-memory.dmp

      Filesize

      64KB

    • memory/5032-161-0x00007FFDD7250000-0x00007FFDD7260000-memory.dmp

      Filesize

      64KB