Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30/06/2024, 01:08
Behavioral task
behavioral1
Sample
adb.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
adb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
adczjq.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
adczjq.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
libeay32.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
libeay32.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
ssleay32.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
ssleay32.dll
Resource
win10v2004-20240226-en
General
-
Target
adb.exe
-
Size
892KB
-
MD5
a59a2d3e5dda7aca6ec879263aa42fd3
-
SHA1
312d496ec90eb30d5319307d47bfef602b6b8c6c
-
SHA256
897b0d0e64cf87ac7086241c86f757f3c94d6826f949a1f0fec9c40892c0cecb
-
SHA512
852972ca4d7f9141ea56d3498388c61610492d36ea7d7af1b36d192d7e04dd6d9bc5830e0dcb0a5f8f55350d4d8aaac2869477686b03f998affbac6321a22030
-
SSDEEP
24576:bGzl9+a4Ne1nEFI56xU+0IdY2Zv952uetfbFEzP4UFhOt:b+tOWnEFZR0El0JEzQAh
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3616-7-0x0000000010000000-0x0000000010149000-memory.dmp upx behavioral2/memory/3616-9-0x00000000050A0000-0x00000000050EC000-memory.dmp upx behavioral2/memory/3616-10-0x0000000010000000-0x0000000010149000-memory.dmp upx behavioral2/memory/3616-11-0x00000000050A0000-0x00000000050EC000-memory.dmp upx -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3616 adb.exe 3616 adb.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Use FormSuggest = "No" adb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FormSuggest Passwords = "No" adb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FormSuggest PW Ask = "No" adb.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3616 adb.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3616 adb.exe 3616 adb.exe 3616 adb.exe 3616 adb.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3616 adb.exe 3616 adb.exe 3616 adb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\adb.exe"C:\Users\Admin\AppData\Local\Temp\adb.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3616