Analysis
-
max time kernel
90s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2024 14:37
Static task
static1
Behavioral task
behavioral1
Sample
Cab5E96.tmp_pw_infected.zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Cab5E96.tmp_pw_infected.zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
0x00050000000193b6-13.cab
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
0x00050000000193b6-13.cab
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
authroot.stl
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
authroot.stl
Resource
win10v2004-20231222-en
General
-
Target
authroot.stl
-
Size
171KB
-
MD5
9c0c641c06238516f27941aa1166d427
-
SHA1
64cd549fb8cf014fcd9312aa7a5b023847b6c977
-
SHA256
4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
-
SHA512
936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
SSDEEP
1536:+AuJ+lCUs0RvWqgCyPW5BXNWdm1wpyru2/3EwjYoz0VDTrubmt6mJp:+9J+q0RuXCyfdmAyru2/RAKtgp
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3252 OpenWith.exe 3252 OpenWith.exe 3252 OpenWith.exe 3796 AcroRd32.exe 3796 AcroRd32.exe 3796 AcroRd32.exe 3796 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3252 wrote to memory of 3796 3252 OpenWith.exe 95 PID 3252 wrote to memory of 3796 3252 OpenWith.exe 95 PID 3252 wrote to memory of 3796 3252 OpenWith.exe 95 PID 3796 wrote to memory of 4788 3796 AcroRd32.exe 98 PID 3796 wrote to memory of 4788 3796 AcroRd32.exe 98 PID 3796 wrote to memory of 4788 3796 AcroRd32.exe 98 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 2236 4788 RdrCEF.exe 99 PID 4788 wrote to memory of 860 4788 RdrCEF.exe 100 PID 4788 wrote to memory of 860 4788 RdrCEF.exe 100 PID 4788 wrote to memory of 860 4788 RdrCEF.exe 100 PID 4788 wrote to memory of 860 4788 RdrCEF.exe 100 PID 4788 wrote to memory of 860 4788 RdrCEF.exe 100 PID 4788 wrote to memory of 860 4788 RdrCEF.exe 100 PID 4788 wrote to memory of 860 4788 RdrCEF.exe 100 PID 4788 wrote to memory of 860 4788 RdrCEF.exe 100 PID 4788 wrote to memory of 860 4788 RdrCEF.exe 100 PID 4788 wrote to memory of 860 4788 RdrCEF.exe 100 PID 4788 wrote to memory of 860 4788 RdrCEF.exe 100 PID 4788 wrote to memory of 860 4788 RdrCEF.exe 100 PID 4788 wrote to memory of 860 4788 RdrCEF.exe 100 PID 4788 wrote to memory of 860 4788 RdrCEF.exe 100 PID 4788 wrote to memory of 860 4788 RdrCEF.exe 100 PID 4788 wrote to memory of 860 4788 RdrCEF.exe 100 PID 4788 wrote to memory of 860 4788 RdrCEF.exe 100
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\authroot.stl1⤵
- Modifies registry class
PID:1440
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\authroot.stl"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8AD092F19396142FCB775FAB24E4B6AC --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:2236
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=5F733D252A800815794AB73860CDAEDA --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=5F733D252A800815794AB73860CDAEDA --renderer-client-id=2 --mojo-platform-channel-handle=1776 --allow-no-sandbox-job /prefetch:14⤵PID:860
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C0615D7203AE627CC7A72BEAB39C8CB9 --mojo-platform-channel-handle=2160 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:1084
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=77CBB64DD3DB112777BAA58991C2D498 --mojo-platform-channel-handle=1952 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4512
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D085BA54E54B50EC0742833FAC98007C --mojo-platform-channel-handle=2300 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:2188
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3736