Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 14:51
Static task
static1
Behavioral task
behavioral1
Sample
Crack/WIN/disable_activation.cmd
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Crack/WIN/disable_activation.cmd
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
adobemasterkeygen55-multi.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
adobemasterkeygen55-multi.exe
Resource
win10v2004-20240709-en
General
-
Target
Crack/WIN/disable_activation.cmd
-
Size
405B
-
MD5
11bd75442aca7d7cd8b2f84ff3427b95
-
SHA1
3c4342f4435f40c9c16f63cefa9366157c5a396a
-
SHA256
4f53f4d3de10c4bbd3faccd6e2709ce1406b14d0fad6f53149343008983aa8f8
-
SHA512
4b3a5c0c797e189771d9bb0b619ab161283a176900e9a3679b846ba915db48359e7e2dc55bee118ca70f2a5a41520d7e67ffcec9cffc0265b3ac98bd126352d2
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2480 wrote to memory of 3028 2480 cmd.exe 31 PID 2480 wrote to memory of 3028 2480 cmd.exe 31 PID 2480 wrote to memory of 3028 2480 cmd.exe 31 PID 2480 wrote to memory of 1188 2480 cmd.exe 32 PID 2480 wrote to memory of 1188 2480 cmd.exe 32 PID 2480 wrote to memory of 1188 2480 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Crack\WIN\disable_activation.cmd"1⤵
- Drops file in Drivers directory
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\system32\find.exeFIND /C /I "activate.adobe.com" C:\Windows\system32\drivers\etc\hosts2⤵PID:3028
-
-
C:\Windows\system32\find.exeFIND /C /I "practivate.adobe.com" C:\Windows\system32\drivers\etc\hosts2⤵PID:1188
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5dc2ceacd32dfaff78cecfe4301fb8cb5
SHA147696347250da8f7b6b5288071eaf0d9c54f69c4
SHA2562552162fc4f15f21d31a44f3d92cbd951d469d9d790d45da90792e674aabb530
SHA512f2819d1450a59c697857ecaaf3a3b4276f8149832825bbf07d4e36c05e8763c50fd818221ccc1150937373fc11f5d1f57521e3ca6a72ea48423ef19e53ed633b