Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2023 17:48
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230712-en
General
-
Target
file.exe
-
Size
1.2MB
-
MD5
36d4a7ec6a9ad04aa447dda96ed21611
-
SHA1
0b1e924be77688d3f2171bf36bd420f5c60d5805
-
SHA256
696808a3a7971c3af2b8a5e69803fd45c7480da8fa42711491c608d583ff4f56
-
SHA512
407e3ac77fac97cebb89aa2f99af807c9edd91aca1fbc3523aea63a60adf4d37056889dbfeae7a072a96066d11bd695f6e1001452376a9aa15fe4b9671ffe1b3
-
SSDEEP
24576:sDWv+KX/VnxU/wcXbtmRodFpVjv27dTtNcbORbRt648:8WRFxkwcp1VgdsbybR8F
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
file.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\Control Panel\International\Geo\Nation file.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
file.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\Local Settings file.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
file.exepid process 3384 file.exe 3384 file.exe 3384 file.exe 3384 file.exe 3384 file.exe 3384 file.exe 3384 file.exe 3384 file.exe 3384 file.exe 3384 file.exe 3384 file.exe 3384 file.exe 3384 file.exe 3384 file.exe 3384 file.exe 3384 file.exe 3384 file.exe 3384 file.exe 3384 file.exe 3384 file.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 3392 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
AcroRd32.exepid process 3392 AcroRd32.exe 3392 AcroRd32.exe 3392 AcroRd32.exe 3392 AcroRd32.exe 3392 AcroRd32.exe 3392 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
file.exeAcroRd32.exeRdrCEF.exedescription pid process target process PID 3384 wrote to memory of 3392 3384 file.exe AcroRd32.exe PID 3384 wrote to memory of 3392 3384 file.exe AcroRd32.exe PID 3384 wrote to memory of 3392 3384 file.exe AcroRd32.exe PID 3392 wrote to memory of 3872 3392 AcroRd32.exe RdrCEF.exe PID 3392 wrote to memory of 3872 3392 AcroRd32.exe RdrCEF.exe PID 3392 wrote to memory of 3872 3392 AcroRd32.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 1336 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 2256 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 2256 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 2256 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 2256 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 2256 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 2256 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 2256 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 2256 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 2256 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 2256 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 2256 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 2256 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 2256 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 2256 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 2256 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 2256 3872 RdrCEF.exe RdrCEF.exe PID 3872 wrote to memory of 2256 3872 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\file.pdf"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=65E92D5AD36330DF8EC902F08CAAA2B0 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:1336
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=52D2A36300AB856A3B481015984F0270 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=52D2A36300AB856A3B481015984F0270 --renderer-client-id=2 --mojo-platform-channel-handle=1732 --allow-no-sandbox-job /prefetch:14⤵PID:2256
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=8BC4284942B4B6839213EEF98740FF68 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=8BC4284942B4B6839213EEF98740FF68 --renderer-client-id=4 --mojo-platform-channel-handle=2172 --allow-no-sandbox-job /prefetch:14⤵PID:1928
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=794E5C6CEBF605474BF580C357B71330 --mojo-platform-channel-handle=2720 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:892
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A477A52E8D1CDAA8CC3595F79612259F --mojo-platform-channel-handle=1796 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:1872
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6E63C76956C833D9C6F594F0D254FE09 --mojo-platform-channel-handle=1980 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:3052
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD568f1ac5bd041427ce8680e4d09beb5e4
SHA1bc9c66964a0d65f80da6e9b176dbaf169d66c963
SHA256f53eb2d81fa55b31ea62d115ad57cb7a6c6198e24983868ff44bfcab81189262
SHA512bfa39b7a329b36eff156eb4e9d77ee10e918b9459ac9c65a4ff084a80d574e8672137de379ac5f8345cec00d4e84ce7ea7a3e2214883294a7a957ccbaa95abf5
-
Filesize
64KB
MD5ac61376418aa8cb9a36a0efa51604b6b
SHA11974fe2d00f50c43cf77741d3adb627ef954c665
SHA256bf8e33db8924442abc1624b7e7e550a65e485a38bcd3d9014609832c94064d5e
SHA512916b2607e6e97a53f30a2c2a083473a19d89be0a60fdc47a4c74359966c38ffdbbe0bbc0b11330565b5e269aaa3d574c2769a17374a02c904591f8ecaf273c92
-
Filesize
33KB
MD5f68806880a0cce14ff71af5e1d86431e
SHA1745509362afa950e7792fc18d7680aa8d4fc88ce
SHA256e062309059c40578567e37779f7650b32113cc9306cbf86cea00e33674fd9f10
SHA512dea0bad3941c2616d5ff4128f07465a8a6ca72470a66ea7306460d762f976ed4a6480ca3a280e1ffbd8ada575a1ba78e341ad1d96a50618f0df8151531ebf3e1