Analysis Overview
SHA256
55e5131f01e0b4db477326c27139ab59c61f33cceb5de503e874197d23d37ad0
Threat Level: Likely malicious
The file setup.exe was found to be: Likely malicious.
Malicious Activity Summary
Modifies Windows Firewall
Blocklisted process makes network request
Checks computer location settings
Unexpected DNS network traffic destination
Unsigned PE
Enumerates physical storage devices
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2023-10-26 21:05
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2023-10-26 21:05
Reported
2023-10-26 21:07
Platform
win10v2004-20231023-en
Max time kernel
51s
Max time network
55s
Command Line
Signatures
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Modifies Windows Firewall
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\netsh.exe | N/A |
| N/A | N/A | C:\Windows\system32\netsh.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\setup.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\setup.exe | N/A |
Unexpected DNS network traffic destination
| Description | Indicator | Process | Target |
| Destination IP | 205.251.196.135 | N/A | N/A |
| Destination IP | 205.251.196.135 | N/A | N/A |
| Destination IP | 205.251.196.135 | N/A | N/A |
| Destination IP | 205.251.196.135 | N/A | N/A |
| Destination IP | 205.251.196.135 | N/A | N/A |
| Destination IP | 205.251.196.135 | N/A | N/A |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\setup.exe
"C:\Users\Admin\AppData\Local\Temp\setup.exe"
C:\Users\Admin\AppData\Local\Temp\setup.exe
"C:\Users\Admin\AppData\Local\Temp\setup.exe" -sfxwaitall:1 "powershell" -ExecutionPolicy ByPass -command ". 'C:\Users\Admin\AppData\Local\Temp\Adobe Temp\BlockIPs.ps1'"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy ByPass -command ". 'C:\Users\Admin\AppData\Local\Temp\Adobe Temp\BlockIPs.ps1'"
C:\Windows\system32\netsh.exe
"C:\Windows\system32\netsh.exe" advfirewall firewall delete rule "name=Adobe Unlicensed Pop-up" dir=out
C:\Windows\system32\netsh.exe
"C:\Windows\system32\netsh.exe" advfirewall firewall add rule "name=Adobe Unlicensed Pop-up" dir=out action=block remoteip=107.22.247.231,18.207.85.246,23.22.254.206,34.193.227.236,52.202.204.11,52.5.13.197,54.144.73.197,54.227.187.23 enable=yes
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c IF DEFINED InstChk ( START "" "C:\Users\Admin\AppData\Local\Temp\..\Set-up.exe" )
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 136.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 9.228.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.1.85.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | adobe.io | udp |
| US | 8.8.8.8:53 | ns-1159.awsdns-16.org | udp |
| US | 205.251.196.135:53 | ns-1159.awsdns-16.org | udp |
| US | 205.251.196.135:53 | ns-1159.awsdns-16.org | udp |
| US | 205.251.196.135:53 | ns-1159.awsdns-16.org | udp |
| US | 205.251.196.135:53 | ns-1159.awsdns-16.org | udp |
| US | 205.251.196.135:53 | ns-1159.awsdns-16.org | udp |
| US | 205.251.196.135:53 | ns-1159.awsdns-16.org | udp |
| US | 8.8.8.8:53 | 135.196.251.205.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 8.3.197.209.in-addr.arpa | udp |
Files
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_mre0uq0f.bdv.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/1724-11-0x000001F47F6B0000-0x000001F47F6D2000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\Adobe Temp\BlockIPs.ps1
| MD5 | 77a8d3ca91cdb8259c205891832d40af |
| SHA1 | 0635077ff4a866b672756b81a0835bf03d860775 |
| SHA256 | 4954c3748da152bf700dda3606cfe618dfa3c2e6747be47f486a89336c3c6773 |
| SHA512 | 5b9247422f563534baca73d967a461dff3292f17278020fdf94bea3bb683e16721d57784017aae09d0859816198c38ced5c0fe5e5b7c3db0c0ddf07ae26d1fb4 |
memory/1724-13-0x00007FF903180000-0x00007FF903C41000-memory.dmp
memory/1724-14-0x000001F418620000-0x000001F418630000-memory.dmp
memory/1724-15-0x000001F418620000-0x000001F418630000-memory.dmp
memory/1724-16-0x000001F418620000-0x000001F418630000-memory.dmp
memory/1724-17-0x000001F47F680000-0x000001F47F690000-memory.dmp
memory/1724-18-0x000001F47F6E0000-0x000001F47F6FA000-memory.dmp
memory/1724-21-0x00007FF903180000-0x00007FF903C41000-memory.dmp