Analysis
-
max time kernel
156s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 22:15
Static task
static1
Behavioral task
behavioral1
Sample
61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe
Resource
win10v2004-20240412-en
General
-
Target
61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe
-
Size
1.7MB
-
MD5
09f5f8c4ae5d20e09bae630c50147d61
-
SHA1
5e578d4bebbbfd0225b4a46d1384c3791a29692a
-
SHA256
61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2
-
SHA512
68dee798aaefde9ee066ce687e4e90f982f8656386289991ddfe4546a042625e5853630e3536569d598792d2764a8585bb5ac1be4276b03c48a1d06cd19cebbb
-
SSDEEP
12288:qwKfOVRo9yRYUVeCoY7p4O8b8ITDnl6sNvne:qxWVeyRYUInY7p4O8b8ITDnlJne
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\OneDriveSetupOneDrive = "C:\\Users\\Admin\\AppData\\Local\\Temp\\61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe" 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\MicrosoftOneDriveSetup26962 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe" 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\ntdll.dll.dll 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe -
Drops file in Program Files directory 24 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\NPPDF32Acrobat.exe 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\NPPDF32Acrobat19.10.20064.310990.exe 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\RCXBFA0.tmp 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\AdobeHunspellPluginAdobeHunspellPlugin.exe 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\RCXA413.tmp 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\RCXB193.tmp 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\assets\Sample Files\RCXB1F2.tmp 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\DynamicUnicode.exe 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe File opened for modification C:\Program Files (x86)\Common Files\System\ja-JP\RCX99FE.tmp 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe File opened for modification C:\Program Files (x86)\Common Files\System\fr-FR\RCX9A4D.tmp 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\assets\Sample Files\AdobeAcrobat.exe 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\RCXB52F.tmp 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\AcrobatAdobe19.8.20071.303822.exe 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\RCXBFC0.tmp 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe File opened for modification C:\Program Files (x86)\Common Files\System\ja-JP\SystemWAB32res.exe 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe File created C:\Program Files (x86)\Common Files\System\fr-FR\Microsoftdexploitation10.0.19041.1.160101.0800.exe 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\RCX9AEA.tmp 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\AdobeAdobe.exe 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\RCXA55C.tmp 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\ink\es-ES\TabTip32mshwLatin10.0.19041.1.160101.0800.exe 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\es-ES\RCXA686.tmp 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\AiodAiod19.8.20071.303822.exe 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe File created C:\Program Files (x86)\Common Files\System\ja-JP\SystemWAB32res.exe 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\DynamicUnicode.exe 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe 4796 61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe"C:\Users\Admin\AppData\Local\Temp\61a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD52b7b08d5d52e5b7a67ac4b9dba81b41d
SHA1ed7493581b784a42a3dc8985f11ce3f5401f1310
SHA25613b8c4b687ed65732fe94008feb72119f863c4cd3340fd1464add615e8bfc6fb
SHA5124a7ebb70e9bab1290888c3ce385ecf499ab0f3ac6c0938ec0c5db12f19b862656cd295c86906aa510a9e7409bf4b55ac5e544d31c885c704f4e138cf7365a36a
-
Filesize
1.7MB
MD5a6c0a72d776cc1e5c1edcd93efe604a2
SHA191212b5d8c58f3a4c3bdaee158b4612bfe448200
SHA256296cdcd7f736b4984e185462b038c8cd48f249f17371bbdeb5826a6c61e55552
SHA512fca99928cf5066ccf20da4dc6fec962600a8a7fa64a7289929283ad8cdc01e4d8ffdc2a72d2e84cf9ee6d532c8fee71d1a0cd81bb27e4d38389f5cdc87b787db
-
Filesize
1.7MB
MD5686f8abdff476d6f79b10335de8d5dc7
SHA1a0dd3b6f451d7e5d548132bfc74f90bee9f6ab51
SHA25647352bd90ea135921801e53cee4acd412a3d5f815acd4b0189f011ac49d1a4ef
SHA5124129c853a7c1f693a2d8ae88c615b1b4ddb14fd67b999ee0d698b76dbf578f0f1385e10a1d49e9164b6480cf98fce29153d7ff63dbb36384acc7987ba9a596bd
-
Filesize
1.7MB
MD509f5f8c4ae5d20e09bae630c50147d61
SHA15e578d4bebbbfd0225b4a46d1384c3791a29692a
SHA25661a52e2dccc0ee05c26c5700f680ab1952f27c2af9b9de77ea4c80140f4097f2
SHA51268dee798aaefde9ee066ce687e4e90f982f8656386289991ddfe4546a042625e5853630e3536569d598792d2764a8585bb5ac1be4276b03c48a1d06cd19cebbb