Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
7dd27f715f05414b8d1681ddc2cd7d79.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7dd27f715f05414b8d1681ddc2cd7d79.exe
Resource
win10v2004-20231222-en
General
-
Target
7dd27f715f05414b8d1681ddc2cd7d79.exe
-
Size
68KB
-
MD5
7dd27f715f05414b8d1681ddc2cd7d79
-
SHA1
5db9a9925d8c6406e4fccfc4d00499dbf936be3c
-
SHA256
56f3ac3db61aac1b99aed7a0720336d12a57cc65a879673b61e3dc0b35a06c1a
-
SHA512
8938ce39361794fffea7e4ad09282877572c1bbee4ee120b5f95e0d434eea8c2de61eb0ca41d535be24a7b4dcc6334710131e9c6d2ab06ef2f4bc8a845dd8283
-
SSDEEP
1536:YSCwFep1p/Rac0dEPH2d41e0+MCrvRr2oNBZ1jyCEO1r:YVwwUdEud41e0+M4vRzN9yCEO1r
Malware Config
Signatures
-
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools 7dd27f715f05414b8d1681ddc2cd7d79.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools Adobelmsvc.exe -
Deletes itself 1 IoCs
pid Process 116 Adobelmsvc.exe -
Executes dropped EXE 1 IoCs
pid Process 116 Adobelmsvc.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\microsoft\backup.ftp Adobelmsvc.exe File opened for modification C:\Windows\SysWOW64\microsoft\backup.tftp Adobelmsvc.exe File created C:\Windows\SysWOW64\microsoft\backup.ftp Adobelmsvc.exe File opened for modification C:\Windows\SysWOW64\ftp.exe Adobelmsvc.exe File opened for modification C:\Windows\SysWOW64\dllcache\ftp.exe Adobelmsvc.exe File opened for modification C:\Windows\SysWOW64\tftp.exe Adobelmsvc.exe File opened for modification C:\Windows\SysWOW64\dllcache\tftp.exe Adobelmsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system\Adobelmsvc.exe 7dd27f715f05414b8d1681ddc2cd7d79.exe File opened for modification C:\Windows\system\Adobelmsvc.exe 7dd27f715f05414b8d1681ddc2cd7d79.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 5648 5816 WerFault.exe 14 3468 116 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 116 Adobelmsvc.exe 116 Adobelmsvc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 116 Adobelmsvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dd27f715f05414b8d1681ddc2cd7d79.exe"C:\Users\Admin\AppData\Local\Temp\7dd27f715f05414b8d1681ddc2cd7d79.exe"1⤵
- Looks for VMWare Tools registry key
- Drops file in Windows directory
PID:5816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5816 -s 2522⤵
- Program crash
PID:5648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5816 -ip 58161⤵PID:3556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 116 -ip 1161⤵PID:4936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 2481⤵
- Program crash
PID:3468
-
C:\Windows\system\Adobelmsvc.exe"C:\Windows\system\Adobelmsvc.exe"1⤵
- Looks for VMWare Tools registry key
- Deletes itself
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD57dd27f715f05414b8d1681ddc2cd7d79
SHA15db9a9925d8c6406e4fccfc4d00499dbf936be3c
SHA25656f3ac3db61aac1b99aed7a0720336d12a57cc65a879673b61e3dc0b35a06c1a
SHA5128938ce39361794fffea7e4ad09282877572c1bbee4ee120b5f95e0d434eea8c2de61eb0ca41d535be24a7b4dcc6334710131e9c6d2ab06ef2f4bc8a845dd8283