Analysis
-
max time kernel
31s -
max time network
20s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
20-09-2023 09:55
Static task
static1
Behavioral task
behavioral1
Sample
bbcc5acbb5ce82dfd37631d460fe1d729d62521520657a848c78110c5262ed.gz
Resource
win10-20230915-en
Behavioral task
behavioral2
Sample
sample.tar
Resource
win10-20230915-en
Behavioral task
behavioral3
Sample
.pkginfo
Resource
win10-20230831-en
Behavioral task
behavioral4
Sample
.post-install
Resource
win10-20230915-en
Behavioral task
behavioral5
Sample
etc/kong/kong.conf.default
Resource
win10-20230915-en
Behavioral task
behavioral6
Sample
etc/kong/kong.logrotate
Resource
win10-20230915-en
General
-
Target
bbcc5acbb5ce82dfd37631d460fe1d729d62521520657a848c78110c5262ed.gz
-
Size
55.4MB
-
MD5
09a7fe6e842a54f9661d2d59afc7819f
-
SHA1
2b25012a0d69ea95a5fff1e7c86f5854894e4701
-
SHA256
52bbcc5acbb5ce82dfd37631d460fe1d729d62521520657a848c78110c5262ed
-
SHA512
4c7b622f992aa185eeb35de5e3054646fa0033959b7f84f8533614c742ae3ddd7ea9324795b503077fd8a81afbcbfd747e4d6ddd2cd25645c202482a41bd4460
-
SSDEEP
1572864:Q04nKVch0RRaOskFStq23L2tsHPJtJFI/DpufbRROYoKXMnruHWLB:Q5nechqP84+6tgJUp4rO16HWF
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000_Classes\gz_auto_file OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000_Classes\gz_auto_file\shell OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000_Classes\gz_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe\" \"%1\"" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000_Classes\.gz OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000_Classes\.gz\ = "gz_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000_Classes\gz_auto_file\shell\Read OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000_Classes\gz_auto_file\shell\Read\command OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2260 OpenWith.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 2260 OpenWith.exe 2260 OpenWith.exe 2260 OpenWith.exe 2260 OpenWith.exe 2260 OpenWith.exe 2260 OpenWith.exe 2260 OpenWith.exe 2260 OpenWith.exe 2260 OpenWith.exe 2260 OpenWith.exe 2260 OpenWith.exe 2260 OpenWith.exe 2260 OpenWith.exe 2260 OpenWith.exe 2260 OpenWith.exe 4296 AcroRd32.exe 4296 AcroRd32.exe 4296 AcroRd32.exe 4296 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2260 wrote to memory of 4296 2260 OpenWith.exe 71 PID 2260 wrote to memory of 4296 2260 OpenWith.exe 71 PID 2260 wrote to memory of 4296 2260 OpenWith.exe 71 PID 4296 wrote to memory of 4216 4296 AcroRd32.exe 74 PID 4296 wrote to memory of 4216 4296 AcroRd32.exe 74 PID 4296 wrote to memory of 4216 4296 AcroRd32.exe 74 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4924 4216 RdrCEF.exe 75 PID 4216 wrote to memory of 4268 4216 RdrCEF.exe 76 PID 4216 wrote to memory of 4268 4216 RdrCEF.exe 76 PID 4216 wrote to memory of 4268 4216 RdrCEF.exe 76 PID 4216 wrote to memory of 4268 4216 RdrCEF.exe 76 PID 4216 wrote to memory of 4268 4216 RdrCEF.exe 76 PID 4216 wrote to memory of 4268 4216 RdrCEF.exe 76 PID 4216 wrote to memory of 4268 4216 RdrCEF.exe 76 PID 4216 wrote to memory of 4268 4216 RdrCEF.exe 76 PID 4216 wrote to memory of 4268 4216 RdrCEF.exe 76 PID 4216 wrote to memory of 4268 4216 RdrCEF.exe 76 PID 4216 wrote to memory of 4268 4216 RdrCEF.exe 76 PID 4216 wrote to memory of 4268 4216 RdrCEF.exe 76 PID 4216 wrote to memory of 4268 4216 RdrCEF.exe 76 PID 4216 wrote to memory of 4268 4216 RdrCEF.exe 76 PID 4216 wrote to memory of 4268 4216 RdrCEF.exe 76 PID 4216 wrote to memory of 4268 4216 RdrCEF.exe 76 PID 4216 wrote to memory of 4268 4216 RdrCEF.exe 76
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\bbcc5acbb5ce82dfd37631d460fe1d729d62521520657a848c78110c5262ed.gz1⤵
- Modifies registry class
PID:5096
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\bbcc5acbb5ce82dfd37631d460fe1d729d62521520657a848c78110c5262ed.gz"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=21746D84089F1C3F38B49CAE6F2B111C --mojo-platform-channel-handle=1608 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4924
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=F27591F24366FD289B4E2CC86DF2A7A4 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=F27591F24366FD289B4E2CC86DF2A7A4 --renderer-client-id=2 --mojo-platform-channel-handle=1636 --allow-no-sandbox-job /prefetch:14⤵PID:4268
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F98CAEDEF967C3BFDC568019BB72F98A --mojo-platform-channel-handle=2200 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4748
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=AE0F90FF01D44883F0A7C41A098911C6 --mojo-platform-channel-handle=1800 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:5068
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=976FCEE92E152D493AC8B28D22170E57 --mojo-platform-channel-handle=2412 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4316
-
-
-