Resubmissions

09-10-2023 22:51

231009-2syt5sba42 10

26-04-2023 10:03

230426-l3jvzaae4s 10

Analysis

  • max time kernel
    142s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    09-10-2023 22:51

General

  • Target

    AdobePDFReader (9).msi

  • Size

    2.2MB

  • MD5

    fadc9824c68402143239f764c99bb82d

  • SHA1

    7eb72321c2c1e25b11c9d44229af22a179e27ce8

  • SHA256

    9890ae69f0a31a5656dbebce11384a70820ac49cabe9b244dfb8a5ed22617ff5

  • SHA512

    916b9b9836d5003193cf4f52c501a90ba16f18ca13a05325f9e11a6ee9d05b927013c09524757f33efd153c0e1d25648233e79f9a8eaa81fd69ed79282268ef6

  • SSDEEP

    49152:NMU9FgsN+TXYr+LrUcdEL9MklhGUWhe8u/g1PQNPEUI:6gFPgYrordG9t0lepg1P2XI

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\AdobePDFReader (9).msi"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2096
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass -file "C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\ad.ps1"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2532
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\jjnhv0vj.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2180
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6ECB.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC6EBA.tmp"
          4⤵
            PID:3064
      • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\readerdc64.exe
        "C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\readerdc64.exe"
        2⤵
        • Executes dropped EXE
        • Modifies Internet Explorer settings
        • Modifies system certificate store
        • Suspicious use of SetWindowsHookEx
        PID:3032
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2148
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005C4" "0000000000000318"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:2704

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\f77586f.rbs

      Filesize

      7KB

      MD5

      02d4dbf40ca2e168f87b608d4f991759

      SHA1

      bb8460f43ad661f390d7065297f885916d0ab5a2

      SHA256

      9242f2ddef24c9ac04bda79917c0781748dcb57709c05cef21e04944ee0d8e2e

      SHA512

      a3a7d591776dc77b6f8d1241d7afdea929cecf94daab30d42f9b39d75d021b8fa2752e7c667c5199b98cf6b87fbcd36f3b3883c530bab8f1e83180dd69aaecb9

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\ad.ps1

      Filesize

      2.2MB

      MD5

      4e0e85a590f4972732f1f0de81aa5507

      SHA1

      8e1bcab1ac25c59c1203d808f04b53b1db5fd7eb

      SHA256

      bde15453821fff0d2ed08a8c10885c9ab4ec1ccc6b4b23a41e9e324e4e80a195

      SHA512

      2b874cf59cdc7298b7fcf6712db3ec4013fcd87b7c7bb44400a789821b35bc57e3ff4e98ccfe93bc4cb420d25b2d3e6967eab2e98abf43bb16543f454cef8953

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\readerdc64.exe

      Filesize

      1.2MB

      MD5

      eb17c8572700a9b7bbfb6c1142ad443e

      SHA1

      74022bd63cf919ac44af0dcbe0e4c14756c34b2e

      SHA256

      302b598ae57ca91ba4b4b59e926f2e07a073ab9afcb98eccde02f5e84cdfef52

      SHA512

      e7660219d815bc40741fd6737c092c8f442ebbec4f18981fbf261a269c4e2e162dc0349f76eb7b03a78529021fdab9b84322de7683685ab5d512ac7b4a5a63b0

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\readerdc64.exe

      Filesize

      1.2MB

      MD5

      eb17c8572700a9b7bbfb6c1142ad443e

      SHA1

      74022bd63cf919ac44af0dcbe0e4c14756c34b2e

      SHA256

      302b598ae57ca91ba4b4b59e926f2e07a073ab9afcb98eccde02f5e84cdfef52

      SHA512

      e7660219d815bc40741fd6737c092c8f442ebbec4f18981fbf261a269c4e2e162dc0349f76eb7b03a78529021fdab9b84322de7683685ab5d512ac7b4a5a63b0

    • C:\Users\Admin\AppData\Local\Temp\RES6ECB.tmp

      Filesize

      1KB

      MD5

      249acb58577f1c7a2cf2ed1c562b8836

      SHA1

      9750bde522d85d77d4a85720e6e64cc5d6f3e8b1

      SHA256

      4c9e6fd1dbc7da00ae520a41de7a9a8c43a70dd1fece0fe08099eb05e2483fa1

      SHA512

      6a6a038328280e215a9b35079f472cd2e7cdb44c1477a54fbbe049410bffe40be6c52a391db19345f7912cfd15b5bc50bbddd2d1b1f685759c55a58278d0b444

    • C:\Users\Admin\AppData\Local\Temp\jjnhv0vj.dll

      Filesize

      3KB

      MD5

      d341af723034dd836f7c75de0c21b3d1

      SHA1

      d40284a01c2053b67d9cbf5f95a35cd8d03e4667

      SHA256

      56265678a0114d0a89d9c7d6beab3b00e17ea9e3abee31032f12be42cb1e5103

      SHA512

      124fe45527c688f5a1349b06cbc9397f3cb37336d782a350017e5afda1683201af35573502f29ec652387e0c928cbc1f7818ec319507b297592013bbbd172baa

    • C:\Users\Admin\AppData\Local\Temp\jjnhv0vj.pdb

      Filesize

      7KB

      MD5

      bd8b4003795305c3aa61ad64b598aef7

      SHA1

      db20384b7363337041acc80d026af4e9166631c9

      SHA256

      a891317abd3eff8846d0fe35ead289fb5fcd7e7ee4d8cb315d703c71d5ff39e7

      SHA512

      471bf7a31100b540641b85ef21ee8ee44b537bb73833414ad16887470ba2c38710da1ba12b0fcfbb4a110f718f03e4b9584c3931b0bd1f8428d3d5240ed8d8a3

    • C:\Windows\Installer\f77586d.msi

      Filesize

      2.2MB

      MD5

      fadc9824c68402143239f764c99bb82d

      SHA1

      7eb72321c2c1e25b11c9d44229af22a179e27ce8

      SHA256

      9890ae69f0a31a5656dbebce11384a70820ac49cabe9b244dfb8a5ed22617ff5

      SHA512

      916b9b9836d5003193cf4f52c501a90ba16f18ca13a05325f9e11a6ee9d05b927013c09524757f33efd153c0e1d25648233e79f9a8eaa81fd69ed79282268ef6

    • \??\c:\Users\Admin\AppData\Local\Temp\CSC6EBA.tmp

      Filesize

      652B

      MD5

      2f49d17d0da1e879c4016f77962815b7

      SHA1

      4dee3d971ebf3fcee4f8962f07289ab1aeaa9f4a

      SHA256

      0ef38d47c7136ec6c53f1e2c0bd083f1873293d0b1174e47ed55d19f6b0bdd3d

      SHA512

      3b8fded803dfa7548a90247cc741ee393b97497672b61de48c2a9e941723274d17cb53d19489bdfa2401c3fad18b3a1935f7315336f1b8e4f9236c31ca7ea505

    • \??\c:\Users\Admin\AppData\Local\Temp\jjnhv0vj.0.cs

      Filesize

      203B

      MD5

      b611be9282deb44eed731f72bcbb2b82

      SHA1

      cc1d606d853bbabd5fef87255356a0d54381c289

      SHA256

      ee09fdd61a05266e4e09f418fc6a452f1205d9f29afba6b8a1579333dc3ff3b6

      SHA512

      63b5ad7b65fd4866fb8841e4eee567e4f1e7888bb9fda8dd5c8dca3461d084d3f80ce920ae321609e4ff32ba13a55b7320282ce7201bb74a793d4700240360a4

    • \??\c:\Users\Admin\AppData\Local\Temp\jjnhv0vj.cmdline

      Filesize

      309B

      MD5

      3395cdf6367e0e446f598aec5481d050

      SHA1

      13e4b372f77139b5c4fec9a97ee6eee52010c58c

      SHA256

      2c75017d64e70cb34c370f953ff0c05d49565eeba8a59ebe0ccdd7968cf41797

      SHA512

      b999d215fdc2184cea4fdc80fdc2f6056509c5e303073892b92c09850b2fdc9452cbee23286f77d60c51046f5d7862d631d9bead3c5d161a753fcac37c76e82b

    • memory/2180-52-0x0000000002090000-0x0000000002110000-memory.dmp

      Filesize

      512KB

    • memory/2532-43-0x0000000002400000-0x0000000002480000-memory.dmp

      Filesize

      512KB

    • memory/2532-39-0x000007FEF4EA0000-0x000007FEF583D000-memory.dmp

      Filesize

      9.6MB

    • memory/2532-37-0x000000001B250000-0x000000001B532000-memory.dmp

      Filesize

      2.9MB

    • memory/2532-38-0x0000000001E60000-0x0000000001E68000-memory.dmp

      Filesize

      32KB

    • memory/2532-42-0x000007FEF4EA0000-0x000007FEF583D000-memory.dmp

      Filesize

      9.6MB

    • memory/2532-41-0x0000000002400000-0x0000000002480000-memory.dmp

      Filesize

      512KB

    • memory/2532-40-0x0000000002400000-0x0000000002480000-memory.dmp

      Filesize

      512KB

    • memory/2532-44-0x0000000002400000-0x0000000002480000-memory.dmp

      Filesize

      512KB

    • memory/2532-114-0x0000000002400000-0x0000000002480000-memory.dmp

      Filesize

      512KB

    • memory/2532-113-0x000007FEF4EA0000-0x000007FEF583D000-memory.dmp

      Filesize

      9.6MB

    • memory/2532-105-0x0000000002480000-0x0000000002488000-memory.dmp

      Filesize

      32KB

    • memory/3032-18-0x0000000000E70000-0x00000000012A9000-memory.dmp

      Filesize

      4.2MB

    • memory/3032-25-0x00000000000F0000-0x00000000000F3000-memory.dmp

      Filesize

      12KB

    • memory/3032-115-0x00000000000F0000-0x00000000000F3000-memory.dmp

      Filesize

      12KB

    • memory/3032-116-0x0000000000E70000-0x00000000012A9000-memory.dmp

      Filesize

      4.2MB

    • memory/3032-123-0x0000000000E70000-0x00000000012A9000-memory.dmp

      Filesize

      4.2MB