Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 14:35
Static task
static1
Behavioral task
behavioral1
Sample
prueba_romano.xmls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
prueba_romano.xmls
Resource
win10v2004-20240226-en
General
-
Target
prueba_romano.xmls
-
Size
152KB
-
MD5
61393cc2ed5c3e69c914089e2d1eafc2
-
SHA1
a02fde6b411b6ba15322eb8c596be9d5d87a51c3
-
SHA256
b1df072eba923c472e461200b35823fde7f8e640bfb468ff5ac707369a2fa35e
-
SHA512
adbeadbad7b8acba3b10034033634147ac1cf72fa92876e32fb17b89fc903db1332ec35cb99b42b21d721da46f1f0c56f656943e65137573ddbc8e50e7007b1e
-
SSDEEP
3072:rcN8LpF0iVAqcaR6bvxHFn7bP9be5w+v4rS4hDSf:rm8Fa2pObJHJbPI5w64rS4NSf
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\xmls_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe\" \"%1\"" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\xmls_auto_file OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\砑呤였谀 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\xmls_auto_file\shell\Read OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\xmls_auto_file\shell\Read\command OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.xmls OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.xmls\ = "xmls_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ƥ眛 OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\\ = "xmls_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\xmls_auto_file\shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings cmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ƥ眛\ = "xmls_auto_file" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\砑呤였谀\ = "xmls_auto_file" OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5804 AcroRd32.exe 5804 AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4984 OpenWith.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 5804 AcroRd32.exe 5804 AcroRd32.exe 5804 AcroRd32.exe 5804 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4984 wrote to memory of 5804 4984 OpenWith.exe 103 PID 4984 wrote to memory of 5804 4984 OpenWith.exe 103 PID 4984 wrote to memory of 5804 4984 OpenWith.exe 103 PID 5804 wrote to memory of 3792 5804 AcroRd32.exe 106 PID 5804 wrote to memory of 3792 5804 AcroRd32.exe 106 PID 5804 wrote to memory of 3792 5804 AcroRd32.exe 106 PID 5804 wrote to memory of 1164 5804 AcroRd32.exe 107 PID 5804 wrote to memory of 1164 5804 AcroRd32.exe 107 PID 5804 wrote to memory of 1164 5804 AcroRd32.exe 107 PID 5804 wrote to memory of 5008 5804 AcroRd32.exe 108 PID 5804 wrote to memory of 5008 5804 AcroRd32.exe 108 PID 5804 wrote to memory of 5008 5804 AcroRd32.exe 108 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2912 5008 RdrCEF.exe 109 PID 5008 wrote to memory of 2692 5008 RdrCEF.exe 110 PID 5008 wrote to memory of 2692 5008 RdrCEF.exe 110 PID 5008 wrote to memory of 2692 5008 RdrCEF.exe 110 PID 5008 wrote to memory of 2692 5008 RdrCEF.exe 110 PID 5008 wrote to memory of 2692 5008 RdrCEF.exe 110 PID 5008 wrote to memory of 2692 5008 RdrCEF.exe 110 PID 5008 wrote to memory of 2692 5008 RdrCEF.exe 110 PID 5008 wrote to memory of 2692 5008 RdrCEF.exe 110 PID 5008 wrote to memory of 2692 5008 RdrCEF.exe 110 PID 5008 wrote to memory of 2692 5008 RdrCEF.exe 110 PID 5008 wrote to memory of 2692 5008 RdrCEF.exe 110
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\prueba_romano.xmls1⤵
- Modifies registry class
PID:4620
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\prueba_romano.xmls"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5804 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵PID:3792
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵PID:1164
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=902B05A29C46B7983AA55A54B3C16F51 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:2912
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=8C976EB72300AEAF5EFD84CC773FCC46 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=8C976EB72300AEAF5EFD84CC773FCC46 --renderer-client-id=2 --mojo-platform-channel-handle=1784 --allow-no-sandbox-job /prefetch:14⤵PID:2692
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4468 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:81⤵PID:4200
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4304