Analysis

  • max time kernel
    145s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/09/2024, 00:54

General

  • Target

    a2ed9e5c6fa9699ac57de1196d6562c89a8297fb8545dffab3b926b5115cd7b1.exe

  • Size

    1.1MB

  • MD5

    ba3549ae8cdc1fae00a3577c13f051a7

  • SHA1

    b7332a48c4d1b9c0070c505a2aab3b016e49d387

  • SHA256

    a2ed9e5c6fa9699ac57de1196d6562c89a8297fb8545dffab3b926b5115cd7b1

  • SHA512

    f6cd0e15110780c7d81837bda0883dc917a3817fcb9e3a4b4085a30d06e04f4fc01849ef008823c4404280a591cc907f0073e6cdecfece226f3084631c33fb5c

  • SSDEEP

    12288:dwKfOVRo9yRYsIHLUh7Wk/LmF4O8b8ITDnlydqY:dxWVeyRYsIH8BTg4O8b8ITDnlykY

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 31 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2ed9e5c6fa9699ac57de1196d6562c89a8297fb8545dffab3b926b5115cd7b1.exe
    "C:\Users\Admin\AppData\Local\Temp\a2ed9e5c6fa9699ac57de1196d6562c89a8297fb8545dffab3b926b5115cd7b1.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:3516

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\Operatingchromeelf.exe

          Filesize

          955KB

          MD5

          bb59f828442042df34a580dfd7224d47

          SHA1

          9f9782649e7741bb44d17b622a07b80a565b1c28

          SHA256

          ce429365d9b539544c6babde91b34499151e4ec41cbc43458d2f78a87d807816

          SHA512

          de8f8f98284829591d96023ae7664f3971d1450d3c7c5197b3756c3dc87573d7569905ef79ecf95358f79d1a229cc25e7f4250d751532bda3200a6d63c1fbd93

        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\filesDynamic.exe

          Filesize

          1.1MB

          MD5

          3e8d8755345ca0b95e23aca47335679c

          SHA1

          df0bf25cdf49d09081ac04ce5daf5db401d633a5

          SHA256

          90428af0e676b1385a8decb221cad925012001c1691c9d4ba1735f568dcf9584

          SHA512

          946b0b4912d27bdd696362ab7ebff2d62a770823d89410457955c2bc5edef1e8b55129db09755245f694fd2dd367d2a7143a7f43a491c8ee7dcbafd98ff99170

        • C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\Contracts\ContractVisual.exe

          Filesize

          1.1MB

          MD5

          ba3549ae8cdc1fae00a3577c13f051a7

          SHA1

          b7332a48c4d1b9c0070c505a2aab3b016e49d387

          SHA256

          a2ed9e5c6fa9699ac57de1196d6562c89a8297fb8545dffab3b926b5115cd7b1

          SHA512

          f6cd0e15110780c7d81837bda0883dc917a3817fcb9e3a4b4085a30d06e04f4fc01849ef008823c4404280a591cc907f0073e6cdecfece226f3084631c33fb5c

        • C:\Program Files (x86)\Windows NT\Accessories\en-US\RCXA654.tmp

          Filesize

          1.1MB

          MD5

          28756188c2297db851d188ef3da887c7

          SHA1

          346fba1a333e1a155b52284ef662f6da8875c9ac

          SHA256

          e4aa3502c5b360d80ec3693615aac72597f55fd21908d153341698a652a50da0

          SHA512

          4996ba5039b7370c5baa447c3751c9e4928a61ae0fc4eb5720b0f0f03a0f0b4b42cd17cc59eb70826cbbeddd901ffa32b40f4847ded08d06e8b1e2dbf9ae4837