Analysis
-
max time kernel
111s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 14:56
Static task
static1
Behavioral task
behavioral1
Sample
f0f5ced297718c0397c4313e688dd950N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0f5ced297718c0397c4313e688dd950N.exe
Resource
win10v2004-20240802-en
General
-
Target
f0f5ced297718c0397c4313e688dd950N.exe
-
Size
5.4MB
-
MD5
f0f5ced297718c0397c4313e688dd950
-
SHA1
ce2e7618bbf6f11c2c7557d050ea2cbd182230e6
-
SHA256
4f41cfd1ac1f0ede24b11f57e064e0fafcd0924799151bfdf344b24a48e78d08
-
SHA512
f2982801a1dba83a7c7705b400a862845ae5a1bdb89e76567d4810223123b3bca9914f9d40e5d0d7cb127183f2e408f22872afd1423c67db13992c1ff1235f9b
-
SSDEEP
49152:t/GwolSbDBRf2T2RhwwfNMrBIVeZ2xSiLU4UVJUVudq9WTLAYFIVrtN:3f2Qa++kShfU1WRitN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation f0f5ced297718c0397c4313e688dd950N.exe -
Executes dropped EXE 1 IoCs
pid Process 2412 AdobeARM.exe -
Loads dropped DLL 2 IoCs
pid Process 2412 AdobeARM.exe 2412 AdobeARM.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeARN = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeARM\\AdobeARM.exe" AdobeARM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0f5ced297718c0397c4313e688dd950N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeARM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2412 AdobeARM.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2412 1860 f0f5ced297718c0397c4313e688dd950N.exe 87 PID 1860 wrote to memory of 2412 1860 f0f5ced297718c0397c4313e688dd950N.exe 87 PID 1860 wrote to memory of 2412 1860 f0f5ced297718c0397c4313e688dd950N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0f5ced297718c0397c4313e688dd950N.exe"C:\Users\Admin\AppData\Local\Temp\f0f5ced297718c0397c4313e688dd950N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Roaming\AdobeARM\AdobeARM.exe"C:\Users\Admin\AppData\Roaming\AdobeARM\AdobeARM.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.4MB
MD5f0f5ced297718c0397c4313e688dd950
SHA1ce2e7618bbf6f11c2c7557d050ea2cbd182230e6
SHA2564f41cfd1ac1f0ede24b11f57e064e0fafcd0924799151bfdf344b24a48e78d08
SHA512f2982801a1dba83a7c7705b400a862845ae5a1bdb89e76567d4810223123b3bca9914f9d40e5d0d7cb127183f2e408f22872afd1423c67db13992c1ff1235f9b
-
Filesize
737KB
MD58d7af71aea803a670eaeca189484f7d4
SHA1937a6b47ef4f10c945f44d95ffa0aa6bd1d61e6a
SHA256b9859926dc177aa3199e5629738ed849fdeb7f1d8ba2eeccaaa48357e865b45b
SHA5120eb5e5482ea3964fa00539bc0ac43cf789ce92ca8d0dd893caf2579e43858b9bbe998ab1401a0a7662fa3756a1105f01fb5b3fc0ede79272239ea11df1d7fb18