Analysis

  • max time kernel
    305s
  • max time network
    203s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    12-04-2024 00:06

General

  • Target

    DOINGITRIGHTIEPgoalsandobjectivestoaddressbehavior.exe

  • Size

    312.7MB

  • MD5

    2ff0830e9343f26b8461deecad326a5b

  • SHA1

    032541368454139c35e2e23a1a57ed21388e8dfd

  • SHA256

    4788925332fc6128c895b0e0736a1d7d90e3891f2abb456523cbf0c1ced7d1e2

  • SHA512

    3eaf18e994cb0ee3c4b82aa8cf6468c0e176cd37d6d01dda153f2f9147c4c6e919a02587b5f706cce52038581791aaa573f0b11800095aa982d34127c4fa8350

  • SSDEEP

    49152:yYCAeB2lr71SuRLZlhfyqeuvUm/q1pstArpE12kqRgTHj+lVKgV:qV

Malware Config

Extracted

Family

jupyter

C2

146.70.40.235

Signatures

  • Jupyter, SolarMarker

    Jupyter is a backdoor and infostealer first seen in mid 2020.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DOINGITRIGHTIEPgoalsandobjectivestoaddressbehavior.exe
    "C:\Users\Admin\AppData\Local\Temp\DOINGITRIGHTIEPgoalsandobjectivestoaddressbehavior.exe"
    1⤵
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2276
    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\~DC41410991.pdf"
      2⤵
      • Checks processor information in registry
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:996
      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4352
        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
          "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=BF995DB42F447B045618B41E080F04FD --mojo-platform-channel-handle=1764 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
          4⤵
            PID:3484
          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=3817BDD1786E3D2F89270302D13E6731 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=3817BDD1786E3D2F89270302D13E6731 --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:1
            4⤵
              PID:4864
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=294A50C75B82E41F182B1A2130DCD3BA --mojo-platform-channel-handle=2312 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
              4⤵
                PID:4616
              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=87F43E4BA1150E44F350AF114C5796F3 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=87F43E4BA1150E44F350AF114C5796F3 --renderer-client-id=5 --mojo-platform-channel-handle=1880 --allow-no-sandbox-job /prefetch:1
                4⤵
                  PID:3552
                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=91248A1C1E0DE3602568AD981674C301 --mojo-platform-channel-handle=2712 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                  4⤵
                    PID:2876
                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=512DA553803BB70BAFECAE20D0E2C0D7 --mojo-platform-channel-handle=2696 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                    4⤵
                      PID:1684
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\vytc1hfc\vytc1hfc.cmdline"
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3816
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6C27.tmp" "c:\Users\Admin\AppData\Local\Temp\vytc1hfc\CSC1C549E1BB22841048D8366D3AAA3D90.TMP"
                    3⤵
                      PID:4928

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                  Filesize

                  64KB

                  MD5

                  9388e4b55bb27b8edde675e039ca09ca

                  SHA1

                  feb86066c3e200d2270e8e244642a66e87618692

                  SHA256

                  fa7c5637ae2718715d607a3af4ace73176616b5e9486866a0993ddc005ee6d5f

                  SHA512

                  26cb51f1c3ee4724830d6658da8926b59349f68f296cc9e655bb08458adb5a5eef9715d40b68df22b67d24249aa845f08946264a85a4977ef71170c5b2e5dca3

                • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                  Filesize

                  36KB

                  MD5

                  b30d3becc8731792523d599d949e63f5

                  SHA1

                  19350257e42d7aee17fb3bf139a9d3adb330fad4

                  SHA256

                  b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3

                  SHA512

                  523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e

                • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                  Filesize

                  56KB

                  MD5

                  752a1f26b18748311b691c7d8fc20633

                  SHA1

                  c1f8e83eebc1cc1e9b88c773338eb09ff82ab862

                  SHA256

                  111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131

                  SHA512

                  a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5

                • C:\Users\Admin\AppData\Local\Temp\RES6C27.tmp

                  Filesize

                  1KB

                  MD5

                  c412cd5f5072256486b562ceb2f9c358

                  SHA1

                  c47513fcb47f3430e23b9583e12c790a60219c8b

                  SHA256

                  acb207b891948a6acad64db46e6a6e62ea6d4d73a95f142e4524b6465f904e6c

                  SHA512

                  f29075e33876fa4ca698c54b1a2aa5cb268b0ae0833febb2d83de5c9e464e26d7c6fe8c8bab72546efb1f65808970f8d9c8f84170f710d677a2fa06a1f080f94

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jo4htcdz.4y1.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Users\Admin\AppData\Local\Temp\vytc1hfc\vytc1hfc.dll

                  Filesize

                  3KB

                  MD5

                  a187e4451e07bc851cbed57a4b034c44

                  SHA1

                  117176a2d1eee9693a9c5cf302423cb59e1c3c84

                  SHA256

                  3ebbf3badc0fedb21c4fa4eb68b2280cee3036295c5640db4ddfbb0a052d9e33

                  SHA512

                  694f13bec2c178496009291577721b233c6326a83837446222d2ff490d06ea367793370be2a54f19ce3525edff64dbb894ddda331fa4d93acd715c453caa3927

                • C:\Users\Admin\AppData\Local\Temp\~DC41410991.pdf

                  Filesize

                  1.3MB

                  MD5

                  e856bc9089471921e5afe0f7c2045fa7

                  SHA1

                  c4dd83bf43ee9ac2d4fbda40e7369f1b17ac0b1a

                  SHA256

                  2c4c172fe276d6ee36c439cde26e79fb94c34bb46bcfb1fabe83d19106ee57b1

                  SHA512

                  b93b9fd08361ff98d52ac256bb291e90c948f042419bf2b1f36e99bdb2f8b2c029e1ebe826efbd744dc9bcbab786c102e806d5f48a08e6a73a356530bcb06584

                • \??\c:\Users\Admin\AppData\Local\Temp\vytc1hfc\CSC1C549E1BB22841048D8366D3AAA3D90.TMP

                  Filesize

                  652B

                  MD5

                  d48038405825440aa9aa134fb7db9ebd

                  SHA1

                  d0bf51ade5d754ce2150ab1c9196d52427a59255

                  SHA256

                  c596bf1c2118750592a905196c7e026ea04b18574009f672e9c11dde843dd3c9

                  SHA512

                  127a1b0b167403f25cf13cfcc14ab7a84e39029e0eea5a8e6459c3861ee6e45db092cfe57e7007e4e2d757102e36c6ef6862957598586b1535d7bb9c34146890

                • \??\c:\Users\Admin\AppData\Local\Temp\vytc1hfc\vytc1hfc.0.cs

                  Filesize

                  244B

                  MD5

                  b999975748af32dd007ff48814430b26

                  SHA1

                  46b54a3e3be2d3497127d67b96b3f6a55d26447d

                  SHA256

                  ed13935d6ac43e5ce0419aa7d162dbc70562c02dedacb81d5efdfc609a035c69

                  SHA512

                  f8e48caaac395db45ac4c8a899dbd64305dd6f57fcd22919a6d880b035455286d3504b097dca250d4ea283004cb64d47e376901b8fae65f4fa792234dee9f81e

                • \??\c:\Users\Admin\AppData\Local\Temp\vytc1hfc\vytc1hfc.cmdline

                  Filesize

                  369B

                  MD5

                  3024f1e2e7b372fd3944db7b9f70b409

                  SHA1

                  69e9c67bba66cd0cdd0167e11911aefb8a20c954

                  SHA256

                  3f53e336ada8c9db3323a520f5f45a8012ef35318b8066bbfc4a6dc9e3ed94ae

                  SHA512

                  cc760ca1cb3ddb15add5a9700665ef7cbb69d8f92557c5d721ece36d3ef6e676efe1fe50f1016c1a8c8a1de6c512292dcb17675f11b5ee00e47ce539ca8d3f8b

                • memory/2276-26-0x0000000017260000-0x0000000017268000-memory.dmp

                  Filesize

                  32KB

                • memory/2276-28-0x00000000334B0000-0x00000000335C4000-memory.dmp

                  Filesize

                  1.1MB

                • memory/2276-0-0x00007FFBC2830000-0x00007FFBC32F2000-memory.dmp

                  Filesize

                  10.8MB

                • memory/2276-10-0x00000000302F0000-0x0000000030300000-memory.dmp

                  Filesize

                  64KB

                • memory/2276-11-0x00000000170F0000-0x0000000017112000-memory.dmp

                  Filesize

                  136KB

                • memory/2276-1-0x0000000000C40000-0x0000000001C40000-memory.dmp

                  Filesize

                  16.0MB

                • memory/2276-162-0x00007FFBC2830000-0x00007FFBC32F2000-memory.dmp

                  Filesize

                  10.8MB

                • memory/2276-163-0x00000000302F0000-0x0000000030300000-memory.dmp

                  Filesize

                  64KB