Analysis

  • max time kernel
    43s
  • max time network
    37s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28-02-2024 14:24

General

  • Target

    adobe-acrobat-reader-dc-windows-2023.008.20555-33733.exe

  • Size

    1.2MB

  • MD5

    d182ad4757d763b78b3c2aaa4cf73a34

  • SHA1

    64c16c9e208479da264518a6d0ea9930de544f09

  • SHA256

    8267bc0f07e64a7552bd50c3722189a8b816d0b3f8600f2b5adf45d97fe65157

  • SHA512

    ebe62855755dff1efa98f12291c7ada2a3ec67c90e81a691e86628a1e4211e45a040d2ebddba8134f92e7b477412e8aaf5de8a04436c82b9cd61fe1f731baab7

  • SSDEEP

    24576:3AIjJ+e0bURnfR3v6TTF/BUIsBEBGjrxIoMuAIZJ2ndsyHdU+MXyt:3l4e06nZAjQBvhIIyndsy94G

Score
5/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\adobe-acrobat-reader-dc-windows-2023.008.20555-33733.exe
    "C:\Users\Admin\AppData\Local\Temp\adobe-acrobat-reader-dc-windows-2023.008.20555-33733.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://get.adobe.com/reader/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1800
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\system32\explorer.exe"
      2⤵
      • Deletes itself
      PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    43f95026eebe6ecaaeee1c10b0415773

    SHA1

    cfae33013cddfe765918c72a528884fcbf2e417d

    SHA256

    8940c97d45fc337e6bb5a8ff2886308144dbfe043e1b45cfd1985528bbdcf95c

    SHA512

    70e793e07fea028be3113ab98498f70157fb984af4081a7554c0be90ccf88341442f631da6d1c533744d4f1c8f2e50bd622cadb7e9ef957be5c97b5470b6b14e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    898a6b5ea6755e3a2895b704734fb331

    SHA1

    6b27ac8d893599ab147216c51516e0e446bfcac9

    SHA256

    f35cfc98eea164f874ae661cc87c428cab32e73c1495a40364af28b03c8dedd5

    SHA512

    dbc1c280d80ffe93fbf07ba228955b5dfa2a670eaab3baca53a73f7682849efa09a061da040dbd058b087211fb0217a3e2590d8c1ecccb15622f061a639fc26f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    88dee6b03d2292cdcc6a74e132e09d51

    SHA1

    55c1f8d173fafe93a1cb9ac671df1fb230a69e20

    SHA256

    cd0d3fa351654f643110445c9c142ddc9d9fce2e95e98a2bc6ba457354e7e0a0

    SHA512

    e5632ea0c01897f5b90fe409dba8c6951410bdc7ff15ada3ecd15064c72658dec8687c6d48257b725c64295c69901e2205415ce2923c25b641db85c524e76f07

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1872eba2b4f31811be3d2ae5bc4a2e45

    SHA1

    0cf01b8c10053e758f5bc4694ae616e90059c338

    SHA256

    d3de6badeab0e31e5c7c3de00b9fa3d86133f8dfcce62f5227b89bf6ab863698

    SHA512

    d4ae57c375ebda597002d389d5fae8d730fcc7562a2cf04d09d6608eef5755b7e05a5b13e76c9ac9d3f3d20803760a93b21740d6a2bcdd381eaaf5ed4cb4d689

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9cb0b50d8ce4cf1d62e5b523711bf0a5

    SHA1

    6e0534c9a7d425c22ee05194c272b57cae061282

    SHA256

    e8241549b5083dad4a5017f43d9da3b5722a4ab8a7e3942872927cea0e835f42

    SHA512

    c959e4bcf08865deeabce5e970cc69a2be2fbca7e07c122f4b6b68bb28f93e3b1c7ab119dbb930c1e653c0f712cdd6e56db194adf83d2aa611ec218d2edd1a44

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a0b29a7b31537c7a8f24eb36f6cd3427

    SHA1

    6e729dd3937672efb400ef1790ecaa9685064657

    SHA256

    2196c347bbe71115176771971001b9537d5587e1472bc5451b1cd6035ca549cf

    SHA512

    30a691091cc28f17ff1ea07a420b7636ae4c5d08bd4ebc6ddc5ee47716663e7948263cf08469ccffc153c0139a42aeaa588f9f7de0b4909c66d1dc3bc0d197e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    896acc2dd5a61be8b787f9a0e7cfb69d

    SHA1

    b65c8c74b7f566dd9122cfcdeaff66ac9d5b2299

    SHA256

    c1369cb41edb1d60a5af7bd88a562739a2b0a58269bc8386aee4828efa08e68f

    SHA512

    9aa45013770bc025ac674f7cf5d9fd989b6982ef07053ff2410cc2fefef7b94c5584222d55e002918db696606a5dff5192bd5b1e4bd9dae21c2f446f6e118d05

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    807de112c18e0cc92867dc73a69107ac

    SHA1

    63e9c5e6743127a861c479446a5766a6a81061f8

    SHA256

    533a94dc97d8c5278f3b77d008ba4c141ccda647790a5637e52e94d3c99d5dd3

    SHA512

    c790e2bc0d3f15636744846a596563ebef43f275c78e42a6a55899aa823e93a3ac4e4d09e5357db6a2f6a4e48f0c4bf7863aa8eea0461ccbdf8f203bdb77959f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    68c0c1db081dc48c0a94a82cc6c94b4b

    SHA1

    84907f231e559477910ccdce8d5ef7bc17fc8fec

    SHA256

    a1562d7c210bccce222b741b852f3346a6319614b650a874cb5b998daec4f00e

    SHA512

    195542d1d84dc136d38c20ace24ece554a551f40e3a54859c885e5f2a348a7fc6fbdd0de1901092d28cb6ffeb37beffb35eb51588a4723cb154dcbb519e4600e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4ff4c3ae39ceffd6a3a488d3439ec266

    SHA1

    1a05ef5f0cbebc0aff0ea9128f5c1d0df6147e6e

    SHA256

    35c99a7ced29347ec6f5db80ca081ce1a6c245386ef94bd2139b5e36cfcd1409

    SHA512

    b0ef446fbead17fa8e0246bcbda1c0e0f24a20b431b649e8c4eda88fbf06174547c9c452272f5b36c7d2a5e1ee58255cc23373d914c456aaa462de4bec3b3356

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f763f555a96161bdd3281635a3709ec1

    SHA1

    452c42f2ad064ef31c03b0efaf5285c183e56dd6

    SHA256

    745d4e46eb4146b34a56ea822470dc2e656a2bb6201f054f720c3f0902d1d9f9

    SHA512

    51291e7b465d6d1c8f4fabc59478dc330baf10adc4fd5dc38507d85a7bd25592eb1199d422376c72467a53ff85c4513b7196bb1f4b3310443ad37d9944774306

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a17707aa3dbd8ea2afdd25a382002524

    SHA1

    6152c2d8ba421fcb3c4d6dd99bb6a02e452cafa7

    SHA256

    f14056b192818e1312f471acb356bc3d54236823c66022097362bea349791d9e

    SHA512

    a0ce041f4573a691d5d5b535999ae87a5e619f9d41e7ef7696ffc39b542e3a62d83006ba317e37417bb8539b43ff3bbace0d73131b257f22b47f9f641f010591

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4df4132657bff9302e072a4569c71e06

    SHA1

    123d9d90482e894fd96b879febc1fcf4a7119d4a

    SHA256

    81dbd366e37d5d638d05c511cae823f28c353ffcc9fb8f3f1515319f40d13a66

    SHA512

    4802eaeadd95bd56edd85547a4be2f7c9711b6fea87277003146a95ab10d49650a32a132fc1a4dd2c6021a991e0d6399477b05abd56dc558526e989113da6612

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b02db811f18961adb89fb12db22e6de6

    SHA1

    7e277a0fbc8356a20498ad7f38cbaf8b678bc80a

    SHA256

    f0ad73f600e518f995d2ed2353f828034253c826bf5fbd096a867f6361c2bd7a

    SHA512

    28a9e8407d7ba073ea8ea8cea3f86417805286d174ed6a415dbadee9ace97a4c77425819169a1daf3381a4f78410b11da3008cced1dc270e5cb6dc6e7f32076d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d5e93aec8e4770c9115c206d840e410e

    SHA1

    9293c732431b25e65a65899c07285f49bc56d725

    SHA256

    b5bf1c631059e3da627f77a8ec2f975753c699d0db9ced282d49e9c48d4af37f

    SHA512

    74a12d84cc161700c41d3180d9dd61d8486cbc6dfa770dabb293250c7268485afc7a8984a67cc57620a629ccab9b08b66cdd30c8ad64d8308edd8916b897175d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    50790b7f78572b2e7ebc4f78a349c7f2

    SHA1

    986f51ff9e796aff6eead715507f321c5410638c

    SHA256

    6c514c9ff91db743ffb667f2edfd1ece1c0de658393f24099b87d79c5395908a

    SHA512

    1dbf39b98cf01526056da0a94e953c8a1ca7174aae5ab2c33649c054a85de6d04728a4047c75c40eb6e2d42c0ab239e2f456645280b422d3a327f70c51c1d8e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    173ebd8341fe0a1b02415cd2b5383241

    SHA1

    a7cec39057539483b5ea455bba8f880d272f12c1

    SHA256

    ea4ae703ef1fbce217a2be9a1d943ab57c3df87a59ef2a0bd3e3b20fc828d284

    SHA512

    f812d379381ea525080c616cbaa18ed3cf77b5901e9570cab10502673dca4524c5717dcb97e6d5374f85f3a9cfde8f452c66616b3346797c5cc8524a858f4c26

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    17e036530ba6783fedf5a6f959f38ef8

    SHA1

    8af224a97539a82986cc17220d0064e165bbc041

    SHA256

    5f09a05a97d426a2b09a131715c648f195c38ac8b1ea73b6d555a69a255b61af

    SHA512

    f18bcf90834fc586f68a56e2c9d6a4184b41161c7db416927075913bd855eba12e0800378c7a75f87439c9f1cd9899e668ddfb9cc9f863ca3828a33f572bada0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    395be352a1bc66d2b894b32a4529b92d

    SHA1

    a0bf8c84cc3afb00ad55840d527b7fb1b97d165f

    SHA256

    72a8bbc557c1dbf33fba90001e3d8c078c7fe490e06d3474846a8bd2081156d5

    SHA512

    742187b2137b6b029924638ffc5c87e159dfd58ea116720d73cff38de2d976772685feb867c7a086da84bf55a81c5b9635b631b34b319e24ed5cabed1efcd0db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fb54fb9e669a8d9606d2e4e1f7509570

    SHA1

    60b114b52c4a01c90954503e53175c970506dfbc

    SHA256

    59cbe53fe7b6cd993df23276385f51a7357045e39f4452032e246ca7be8517c7

    SHA512

    00c0544a9b3a7c2115840932d166ccdabbbb3b4f39ff8d838858d0893eaaec26eba5ec85d1b53ef0b2bb8bf8d88fe2b2a9d5f2b91f1a406a0977595448eefa18

  • C:\Users\Admin\AppData\Local\Temp\Cab9D2B.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar9EA9.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • memory/2744-104-0x0000000000230000-0x0000000000270000-memory.dmp

    Filesize

    256KB

  • memory/2968-0-0x0000000000060000-0x000000000048F000-memory.dmp

    Filesize

    4.2MB

  • memory/2968-1-0x0000000000530000-0x0000000000533000-memory.dmp

    Filesize

    12KB

  • memory/2968-103-0x0000000000060000-0x000000000048F000-memory.dmp

    Filesize

    4.2MB