Analysis
-
max time kernel
2s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 21:46
Static task
static1
Behavioral task
behavioral1
Sample
Order details 20160616041125.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Order details 20160616041125.exe
Resource
win10v2004-20240508-en
General
-
Target
Order details 20160616041125.exe
-
Size
2.3MB
-
MD5
9e991c33f9efd867b825c2fe4549b5fb
-
SHA1
a7ba6b2e7ee9065078aa1966fe02e2c68be2776e
-
SHA256
76b60081e96d6aa0c53ad703aa15ce175b8d92a38984b345898c6a726b769cc3
-
SHA512
e4221c5ad82a0adc3db3a77cf2dcd27eb9a55c87862b8b952cf8f1510f08f5a34b357f3d5a31c27c6587befec87a784e76095d8c4a3585d7c951453a45a08e0b
-
SSDEEP
49152:Ic6OpPaFwGDGBO/EaoGgF6zOcpbv16h0VOWJ8KyJ7nUPW7OuQn4b:Ic6OpPaWG8Eoxmtt1IzzKCyng
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 5 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 1264 attrib.exe 2812 attrib.exe 2824 attrib.exe 2832 attrib.exe 1448 attrib.exe -
Executes dropped EXE 2 IoCs
Processes:
adbr01.exeadbr01.exepid process 1436 adbr01.exe 2360 adbr01.exe -
Loads dropped DLL 3 IoCs
Processes:
cmd.exeadbr01.exepid process 1080 cmd.exe 1080 cmd.exe 1436 adbr01.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\AdobeA = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Adobe Inc\\AdobeRead\\acro2.bat" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
xcopy.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 1628 ipconfig.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid process 2580 DllHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Order details 20160616041125.exeWScript.execmd.exeWScript.exedescription pid process target process PID 2028 wrote to memory of 2340 2028 Order details 20160616041125.exe WScript.exe PID 2028 wrote to memory of 2340 2028 Order details 20160616041125.exe WScript.exe PID 2028 wrote to memory of 2340 2028 Order details 20160616041125.exe WScript.exe PID 2028 wrote to memory of 2340 2028 Order details 20160616041125.exe WScript.exe PID 2028 wrote to memory of 2340 2028 Order details 20160616041125.exe WScript.exe PID 2028 wrote to memory of 2340 2028 Order details 20160616041125.exe WScript.exe PID 2028 wrote to memory of 2340 2028 Order details 20160616041125.exe WScript.exe PID 2340 wrote to memory of 2680 2340 WScript.exe cmd.exe PID 2340 wrote to memory of 2680 2340 WScript.exe cmd.exe PID 2340 wrote to memory of 2680 2340 WScript.exe cmd.exe PID 2340 wrote to memory of 2680 2340 WScript.exe cmd.exe PID 2340 wrote to memory of 2680 2340 WScript.exe cmd.exe PID 2340 wrote to memory of 2680 2340 WScript.exe cmd.exe PID 2340 wrote to memory of 2680 2340 WScript.exe cmd.exe PID 2680 wrote to memory of 3000 2680 cmd.exe xcopy.exe PID 2680 wrote to memory of 3000 2680 cmd.exe xcopy.exe PID 2680 wrote to memory of 3000 2680 cmd.exe xcopy.exe PID 2680 wrote to memory of 3000 2680 cmd.exe xcopy.exe PID 2680 wrote to memory of 3000 2680 cmd.exe xcopy.exe PID 2680 wrote to memory of 3000 2680 cmd.exe xcopy.exe PID 2680 wrote to memory of 3000 2680 cmd.exe xcopy.exe PID 2680 wrote to memory of 1448 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 1448 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 1448 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 1448 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 1448 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 1448 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 1448 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 1264 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 1264 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 1264 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 1264 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 1264 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 1264 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 1264 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 2812 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 2812 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 2812 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 2812 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 2812 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 2812 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 2812 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 2824 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 2824 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 2824 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 2824 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 2824 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 2824 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 2824 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 2832 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 2832 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 2832 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 2832 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 2832 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 2832 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 2832 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 2924 2680 cmd.exe WScript.exe PID 2680 wrote to memory of 2924 2680 cmd.exe WScript.exe PID 2680 wrote to memory of 2924 2680 cmd.exe WScript.exe PID 2680 wrote to memory of 2924 2680 cmd.exe WScript.exe PID 2680 wrote to memory of 2924 2680 cmd.exe WScript.exe PID 2680 wrote to memory of 2924 2680 cmd.exe WScript.exe PID 2680 wrote to memory of 2924 2680 cmd.exe WScript.exe PID 2924 wrote to memory of 1080 2924 WScript.exe cmd.exe -
Views/modifies file attributes 1 TTPs 5 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 1264 attrib.exe 2812 attrib.exe 2824 attrib.exe 2832 attrib.exe 1448 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Order details 20160616041125.exe"C:\Users\Admin\AppData\Local\Temp\Order details 20160616041125.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\AdobeR\ADBR\READER\Adobedc.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\AdobeR\ADBR\READER\Adob02.bat" /quiet /passive /norestart"3⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\xcopy.exexcopy /y /h /e /r /k /c *.* "C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\"4⤵
- Enumerates system info in registry
PID:3000
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +a +s +h "C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead"4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1448
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +a +s +h "C:\Users\Admin\AppData\Roaming\Adobe Reader\AdobeR"4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1264
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +a +s +h "C:\Users\Admin\AppData\Roaming\Adobe Reader\ADBR\READER"4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2812
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +a +s +h "C:\Users\Admin\AppData\Roaming\AdobeR\ADBR\READER"4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2824
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +a +s +h "C:\Users\Admin\AppData\Roaming\AdobeR"4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2832
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\Adob8.vbs"4⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\adb04.bat" /quiet /passive /norestart"5⤵
- Loads dropped DLL
PID:1080 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "AdobeA" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\acro2.bat"6⤵
- Adds Run key to start application
PID:1680
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all6⤵
- Gathers network information
PID:1628
-
-
C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\adbr01.exeadbr01.exe -f "011.011"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1436 -
C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\adbr01.exeadbr01.exe -f "011.011"7⤵
- Executes dropped EXE
PID:2360
-
-
-
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121B
MD5ec564124a9dd31059b46164ddb84bffe
SHA15010c1c9b7da9bb0d8d6d23934fc4d46a7e81089
SHA256aeeb1814d28b517673afae42d08d1410748e94a49fac33b244e774007fa7228d
SHA512e38dcb337511befdf97eff59042bd5fd3a50e46a06bdb7427c4c3bcf579e74a96b7813729995ece06f317d93d04fd7005ca390be0a1d194012de9644260de439
-
Filesize
124KB
MD51a1075e5e307f3a4b8527110a51ce827
SHA1f453838ed21020b7ca059244feea8579e5aa74ef
SHA256ddd90e3546e95b0991df26a17cf26fa2f1c20d6a1fd4ffccf1e9b3ec3d3810d5
SHA512b6b70c6cb3cdb05a69c75b86c1fa0fadb38de0391e1fa17daff7d12dfae2a9f483546d9bf1001ff622694fdf8a28b85cd30fc541c25be62df022d22ca17decc1
-
Filesize
560B
MD57ca9907a39a5965340b7c22135dc0b4b
SHA1ffa547b05f34b60aa9fd92197d7740ef823595e8
SHA256fdf72a8ee2666c78ae8e8af7edbbba7ddd3024e5acf92e699240e92bf5c0351e
SHA5127aee197d2e53ed6efddf4f80c4bc8fd12339b26dba04cc5399ce0033dc08ee5455c0241d07b3f25d813850b1c141049039ef995ba39b8005d5c170c0348f806a
-
Filesize
186B
MD51eeddf7db78484775affcf7c4e50559c
SHA111019942b7df68db45de8cd4ed7cba472ad53e9c
SHA2561929cf1c929fddafb469d1ef76d7fd8bedcd60e98799baec7de7daaafc84fe5f
SHA51268a8172b23b02bf32df607b89e407d848a5d5e234f35e4cb49977d3b40510f7369b61dd6dc800a33cd4e7d04209a5a167e32f751c13cac36bc9a9e7d10b32efb
-
Filesize
189B
MD57194f66abfcf759611a217a29517d6ad
SHA18a728a65c45dadf870a55568b305be90f75c3fb9
SHA25690e01faf3bf9434e5e08aa7a53e2bc57b30ccdab9d380b52ae6b22d5dd59674d
SHA512e88b322bff61ed8cfde0d3039ced1bc2c913b5d6b27b6bfd6dd4b00eabfb93fb17fd87140eaab2b9c4e8493a7501f715a6c348a04f854bfd3adc50bdb036b648
-
Filesize
256KB
MD597b8dbcc7b3cc290aef4241df911ac2e
SHA1733ababbcd278821d4e3ee78580841981f26642e
SHA256c44ca1fe145c4f0dcea4efb95171cbf16dfec9fe66a603fbe29c94c21050a023
SHA5124adaa7621e2c858e6541792146260142e1d28683ec1515a743a56bc106ab425edfce856ef3b0d146d63704b34694c9e666a39e3845a097d41cbf465537ec9b25
-
Filesize
140B
MD57bb4eba6e18a150355471dcfc0e40c3a
SHA17969168d05aff11731b5e3bf9466e1127e24e511
SHA25643a0938d03500449e948ca253f238bc03614e7df9f4c2bb03d6f3ca5fbc85a69
SHA51251a2b7f272431019b9adc1076013d4e402b4b6b263c17cfa6252e1e75767b94b8f5da563c15c4e2dc0a8488067916d6df43061a1465adc439d43eb99028b05ed
-
Filesize
1KB
MD52a2f9ae17f5dda0a92450f673bb8197a
SHA117a1bd2f1ef704ab23988ba47f400834043a28b9
SHA2563f957b0a4032a622490ba18fc19d2f129b77ff35b33fbc8274e8cbe69adca19e
SHA5124a67d1c261e12472bd86a6a5042134d1e3173c7404b7227a112385782064eb3f4aa7896352eeeaf8c79257f02a5d6876f1ba6353697c7794b2205dbefe2ba2ee
-
Filesize
2.1MB
MD5cb8df8ed0105afca1e2ce2c76801138b
SHA17e53449562f1254f5937d2ab9262ebd79ccf4971
SHA256b4e4553b3b4df393d5912a0263eaacf1c0485d45e1acfb7da8324c0e578c68ac
SHA512b460390109f2ca81e4393c9d1a3f376a745db8cde78a384955ddf7de3b4efd6036f493d1ae7cea389ddeb9be2440dc5f5fd6159a65c177d957557bb1a0daa75e
-
Filesize
2.1MB
MD5286bcd871d32dfd3dc95a7d58472d60e
SHA101f2c1f3d4d1b7e372a6f33fb5f8cc16eba26f8d
SHA2566226ae0cf75b048429aad462016cbae45396628faf9763cad91805249e2ac6b1
SHA51225e7f6e1dde63547bcd3d471cf8f735cd15c07e4991853e42326f8737ad59ddc0c0d650932f3637d349653a07133fa282a08dda8600dc478431464de49280794