Analysis
-
max time kernel
37s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 11:26
Static task
static1
Behavioral task
behavioral1
Sample
ccc31d00ae69c9c65a20181e45988c523448c8d047954599ac4108ce970519.dirtree
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ccc31d00ae69c9c65a20181e45988c523448c8d047954599ac4108ce970519.dirtree
Resource
win10v2004-20240802-en
General
-
Target
ccc31d00ae69c9c65a20181e45988c523448c8d047954599ac4108ce970519.dirtree
-
Size
158KB
-
MD5
e610fecf26a73f34c800e94effd647b3
-
SHA1
2ad5400f3634d6172ac5acc6e63ca31dbf2186ab
-
SHA256
93ccc31d00ae69c9c65a20181e45988c523448c8d047954599ac4108ce970519
-
SHA512
c64fef9557cad88ae298ecd425cf8c4c1ba64583940d81a863474e33f2766959e03843067a338fb584b6c63532153526f3ca2705902b303f6dd0aa4409d157d9
-
SSDEEP
3072:jCut0L67msS3qPB0eAxtv+RFDl7B2ejc3Ez8VxD+cyPgQl:Ou/msS3wBoxtv+dFjeEz8VxDR0V
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4308 OpenWith.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4308 OpenWith.exe 4308 OpenWith.exe 4308 OpenWith.exe 2600 AcroRd32.exe 2600 AcroRd32.exe 2600 AcroRd32.exe 2600 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4308 wrote to memory of 2600 4308 OpenWith.exe 100 PID 4308 wrote to memory of 2600 4308 OpenWith.exe 100 PID 4308 wrote to memory of 2600 4308 OpenWith.exe 100 PID 2600 wrote to memory of 388 2600 AcroRd32.exe 102 PID 2600 wrote to memory of 388 2600 AcroRd32.exe 102 PID 2600 wrote to memory of 388 2600 AcroRd32.exe 102 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 4620 388 RdrCEF.exe 103 PID 388 wrote to memory of 3064 388 RdrCEF.exe 104 PID 388 wrote to memory of 3064 388 RdrCEF.exe 104 PID 388 wrote to memory of 3064 388 RdrCEF.exe 104 PID 388 wrote to memory of 3064 388 RdrCEF.exe 104 PID 388 wrote to memory of 3064 388 RdrCEF.exe 104 PID 388 wrote to memory of 3064 388 RdrCEF.exe 104 PID 388 wrote to memory of 3064 388 RdrCEF.exe 104 PID 388 wrote to memory of 3064 388 RdrCEF.exe 104 PID 388 wrote to memory of 3064 388 RdrCEF.exe 104 PID 388 wrote to memory of 3064 388 RdrCEF.exe 104 PID 388 wrote to memory of 3064 388 RdrCEF.exe 104 PID 388 wrote to memory of 3064 388 RdrCEF.exe 104 PID 388 wrote to memory of 3064 388 RdrCEF.exe 104 PID 388 wrote to memory of 3064 388 RdrCEF.exe 104 PID 388 wrote to memory of 3064 388 RdrCEF.exe 104 PID 388 wrote to memory of 3064 388 RdrCEF.exe 104 PID 388 wrote to memory of 3064 388 RdrCEF.exe 104
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ccc31d00ae69c9c65a20181e45988c523448c8d047954599ac4108ce970519.dirtree1⤵
- Modifies registry class
PID:1856
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ccc31d00ae69c9c65a20181e45988c523448c8d047954599ac4108ce970519.dirtree"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A22FBF9016BE8B4FB74596656DF25455 --mojo-platform-channel-handle=1760 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:4620
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=9CCBF885B3B99B4B1EF82155C34D0854 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=9CCBF885B3B99B4B1EF82155C34D0854 --renderer-client-id=2 --mojo-platform-channel-handle=1768 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:3064
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C4ABE989EB0B0A4815FD6BBAFF22E709 --mojo-platform-channel-handle=2308 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:3544
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C1D77488C49A53F28D33C413954321C1 --mojo-platform-channel-handle=1864 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:1012
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8F88C3DE6F3CAA230790617DF6382260 --mojo-platform-channel-handle=2344 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:2480
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4980