Analysis
-
max time kernel
90s -
max time network
99s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-05-2024 02:09
Behavioral task
behavioral1
Sample
Аdоbе Рrеmiеrе Рrо 2024.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
Аdоbе Рrеmiеrе Рrо 2024.exe
Resource
win11-20240426-en
General
-
Target
Аdоbе Рrеmiеrе Рrо 2024.exe
-
Size
105.0MB
-
MD5
9b18532674a9282289f8be8357460eb4
-
SHA1
3ab80df6fd12ee818b0efa62547a255689b56b89
-
SHA256
37e5d18fe89aa21253fc6b82f73ca1938b4f86f63a4c6686ff85471d6d88a082
-
SHA512
f0c99375a23c72573d8d74fa8acfc27b2dc690579fac4ee919c72a14e043bb0b7ab9295c937d36064c7a80a69c1a64d7af13dc750cf70af4fdba4ca60f527c0d
-
SSDEEP
1572864:gDJaiqXk6kYbEzJI7TWYiLWuPX9prFxCr8wkhXGeC37spBnwjWfm2Tivq:Ab9YbEVQqLWuPXD+r/khXGezBnaW+vq
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral2/memory/3148-1-0x00000000007A0000-0x00000000017A0000-memory.dmp agile_net -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 224 3148 WerFault.exe Аdоbе Рrеmiеrе Рrо 2024.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Аdоbе Рrеmiеrе Рrо 2024.exedescription pid process Token: SeDebugPrivilege 3148 Аdоbе Рrеmiеrе Рrо 2024.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Аdоbе Рrеmiеrе Рrо 2024.exe"C:\Users\Admin\AppData\Local\Temp\Аdоbе Рrеmiеrе Рrо 2024.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3148 -s 22242⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3148 -ip 31481⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3148-0-0x0000000074B4E000-0x0000000074B4F000-memory.dmpFilesize
4KB
-
memory/3148-1-0x00000000007A0000-0x00000000017A0000-memory.dmpFilesize
16.0MB
-
memory/3148-2-0x000000000BA20000-0x000000000BA86000-memory.dmpFilesize
408KB
-
memory/3148-3-0x0000000074B40000-0x00000000752F1000-memory.dmpFilesize
7.7MB
-
memory/3148-4-0x0000000031B00000-0x0000000032B00000-memory.dmpFilesize
16.0MB
-
memory/3148-5-0x0000000009390000-0x00000000093B6000-memory.dmpFilesize
152KB
-
memory/3148-6-0x0000000013150000-0x00000000131C6000-memory.dmpFilesize
472KB
-
memory/3148-7-0x00000000093F0000-0x00000000093FA000-memory.dmpFilesize
40KB
-
memory/3148-8-0x0000000013940000-0x000000001395E000-memory.dmpFilesize
120KB
-
memory/3148-18-0x0000000074B40000-0x00000000752F1000-memory.dmpFilesize
7.7MB