Analysis

  • max time kernel
    23s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 10:38

General

  • Target

    adksetup.exe

  • Size

    1.8MB

  • MD5

    9b9fa5eadb9489ebba7d61af5b9f9cac

  • SHA1

    c14b24b21e18b8f804bd3c60fcf40b1f0b1fdfd4

  • SHA256

    64313bbb8d087328deeecec76f6b52648a42924e7ca64d16a2a0d75fa8442efa

  • SHA512

    08c088d8254291cf9dd1dd4d87e87a753b2039056c006215ab9b131bef871e2aa9aacbffa0041978735560e04cee029da2efcba91e2ac92d7cb651c5fccb8907

  • SSDEEP

    49152:FedMfQudSHJjCev4Yjrdjhw+StckcNKWlCNVh:FedmFgNA0rzw+ccR2/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 12 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\adksetup.exe
    "C:\Users\Admin\AppData\Local\Temp\adksetup.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Windows\Temp\{D84F58EC-D512-4345-9EAA-8095454DA700}\.cr\adksetup.exe
      "C:\Windows\Temp\{D84F58EC-D512-4345-9EAA-8095454DA700}\.cr\adksetup.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\adksetup.exe" -burn.filehandle.attached=180 -burn.filehandle.self=188
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2644
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef78e9758,0x7fef78e9768,0x7fef78e9778
      2⤵
        PID:2256
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1104 --field-trial-handle=1300,i,13862212068585670196,3898430534299657709,131072 /prefetch:2
        2⤵
          PID:532
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1492 --field-trial-handle=1300,i,13862212068585670196,3898430534299657709,131072 /prefetch:8
          2⤵
            PID:264
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1628 --field-trial-handle=1300,i,13862212068585670196,3898430534299657709,131072 /prefetch:8
            2⤵
              PID:2080
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2136 --field-trial-handle=1300,i,13862212068585670196,3898430534299657709,131072 /prefetch:1
              2⤵
                PID:3040
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2144 --field-trial-handle=1300,i,13862212068585670196,3898430534299657709,131072 /prefetch:1
                2⤵
                  PID:2100
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1424 --field-trial-handle=1300,i,13862212068585670196,3898430534299657709,131072 /prefetch:2
                  2⤵
                    PID:756
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1416 --field-trial-handle=1300,i,13862212068585670196,3898430534299657709,131072 /prefetch:1
                    2⤵
                      PID:2056
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3760 --field-trial-handle=1300,i,13862212068585670196,3898430534299657709,131072 /prefetch:8
                      2⤵
                        PID:2664
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3844 --field-trial-handle=1300,i,13862212068585670196,3898430534299657709,131072 /prefetch:1
                        2⤵
                          PID:2276
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3768 --field-trial-handle=1300,i,13862212068585670196,3898430534299657709,131072 /prefetch:1
                          2⤵
                            PID:3052
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2344 --field-trial-handle=1300,i,13862212068585670196,3898430534299657709,131072 /prefetch:1
                            2⤵
                              PID:2336
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2160 --field-trial-handle=1300,i,13862212068585670196,3898430534299657709,131072 /prefetch:1
                              2⤵
                                PID:1076
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2740 --field-trial-handle=1300,i,13862212068585670196,3898430534299657709,131072 /prefetch:1
                                2⤵
                                  PID:840
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3976 --field-trial-handle=1300,i,13862212068585670196,3898430534299657709,131072 /prefetch:1
                                  2⤵
                                    PID:2792
                                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                  1⤵
                                    PID:1908

                                  Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\5b57436c-2710-40b1-84db-db1fcfe3ed42.tmp

                                          Filesize

                                          5KB

                                          MD5

                                          3679c1442823a8fca47932dd9c74b46b

                                          SHA1

                                          4c0064e5c3bb4e6eba2a2c193c61d4814446d4ed

                                          SHA256

                                          56df2a578d5a01ba41bb159075cce1cd2dbe8c7baa52b45be472628e3b2a437b

                                          SHA512

                                          c846961ff07171a48eeba24cfdda0e86f34c90e376afe0904a106caef0fca57b753c1f4771fbd544ec71576df44c7e0cc687465e19e382dfcd568bb8dc436573

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000001

                                          Filesize

                                          212KB

                                          MD5

                                          08ec57068db9971e917b9046f90d0e49

                                          SHA1

                                          28b80d73a861f88735d89e301fa98f2ae502e94b

                                          SHA256

                                          7a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1

                                          SHA512

                                          b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                                          Filesize

                                          16B

                                          MD5

                                          aefd77f47fb84fae5ea194496b44c67a

                                          SHA1

                                          dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                          SHA256

                                          4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                          SHA512

                                          b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                          Filesize

                                          264KB

                                          MD5

                                          f50f89a0a91564d0b8a211f8921aa7de

                                          SHA1

                                          112403a17dd69d5b9018b8cede023cb3b54eab7d

                                          SHA256

                                          b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                          SHA512

                                          bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp

                                          Filesize

                                          16B

                                          MD5

                                          18e723571b00fb1694a3bad6c78e4054

                                          SHA1

                                          afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                          SHA256

                                          8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                          SHA512

                                          43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                          Filesize

                                          327KB

                                          MD5

                                          1e4f4a1b67be411914c9eba21d2b1a26

                                          SHA1

                                          5640a0d76e642757cb7168984653fa09867b841e

                                          SHA256

                                          0975b9fd12a16ea876910d2e8495d7c19a13a1b7def501ca226d33e4ef34cd75

                                          SHA512

                                          ade65825f3749754b7b5e005108f3a4a7abb245f269e6dd3946c3ad19c1a761aa6c5de3b1fef34b412e1107d24fc5109a6305d7728625e22c2dae892a96f58a2

                                        • C:\Windows\Temp\{E24953C2-C279-4D13-A7B1-CEA311C6F6FF}\.ba\BootstrapperCore.config

                                          Filesize

                                          877B

                                          MD5

                                          57aa0f7b5f6f076454f075a88bcc0cc9

                                          SHA1

                                          b99941380123d0a30a6ca0bfc9c782841a8bf449

                                          SHA256

                                          361079f9f118e11ea3f05d75fd3874664c94334f453177242c8e32f0881a3527

                                          SHA512

                                          2635b9eeb2cbca8392283928c2c886fa2ff5238bb634fcd07e19109e057315d9dcccdcf75c35b7d92077f46a049353f5b03c515dc03ecc4228227e0133b4eb05

                                        • \Windows\Temp\{D84F58EC-D512-4345-9EAA-8095454DA700}\.cr\adksetup.exe

                                          Filesize

                                          1.8MB

                                          MD5

                                          9b9fa5eadb9489ebba7d61af5b9f9cac

                                          SHA1

                                          c14b24b21e18b8f804bd3c60fcf40b1f0b1fdfd4

                                          SHA256

                                          64313bbb8d087328deeecec76f6b52648a42924e7ca64d16a2a0d75fa8442efa

                                          SHA512

                                          08c088d8254291cf9dd1dd4d87e87a753b2039056c006215ab9b131bef871e2aa9aacbffa0041978735560e04cee029da2efcba91e2ac92d7cb651c5fccb8907

                                        • \Windows\Temp\{E24953C2-C279-4D13-A7B1-CEA311C6F6FF}\.ba\BootstrapperCore.dll

                                          Filesize

                                          80KB

                                          MD5

                                          789476090439024462cf3694b8090b7d

                                          SHA1

                                          5868963e94d9df1cbd489730d22adc8588a8a4dc

                                          SHA256

                                          9c900b865aaab23622c23e6f2eb22dfc881109351fe06f07cd7cc69c80cb55d2

                                          SHA512

                                          b33419bcc96cb86f6944bb14f23bbf76c6a06b78e83e69b26e13176f9766077b8879f5962390bbac4047e176b9ed50f0a4ea7858a033803d734429ca8c31063d

                                        • \Windows\Temp\{E24953C2-C279-4D13-A7B1-CEA311C6F6FF}\.ba\Microsoft.Bootstrapper.Presentation.dll

                                          Filesize

                                          199KB

                                          MD5

                                          b5f42663cbbdcfb389658818627bc96d

                                          SHA1

                                          61f90d09a86031fd6f185cc23258402179ac8289

                                          SHA256

                                          affcab19f0f63900123bf7471a5ee004704a81b126b7bec4461a6a4f7b0d2d51

                                          SHA512

                                          e5a00f8ef2e75ac909d962c3c0d782943c577b4299d1f244cff231a3fc88afce012680af4e6bedf65eb1587ead84a883fb0d24cc8478520328b8845fc3536e9d

                                        • \Windows\Temp\{E24953C2-C279-4D13-A7B1-CEA311C6F6FF}\.ba\Microsoft.Bootstrapper.dll

                                          Filesize

                                          157KB

                                          MD5

                                          fd54921876d7ca9d89556885d27c3299

                                          SHA1

                                          62eb70e4f8ee72841f838a75e0069a27ccf715e0

                                          SHA256

                                          3d724841baa2b3904bc2f306efa928b8e0254563797e9a7c48500c04100537df

                                          SHA512

                                          33984149689aa21f1ae149b457b354370c96e1c2f2c3ec579a078414dcf51fc3db8519590688dc01d3c47595072cc70d4a4f9d9081c8d4570cf9bbedced4e7e2

                                        • \Windows\Temp\{E24953C2-C279-4D13-A7B1-CEA311C6F6FF}\.ba\Microsoft.Diagnostics.Tracing.EventSource.dll

                                          Filesize

                                          166KB

                                          MD5

                                          ad9250c9725e55e11729256336accd56

                                          SHA1

                                          793fe7f04a7b39aa88ebf77deb9cf896d5136f68

                                          SHA256

                                          f9836c19b55583433141cbc1ae4542e65919abb0753e806b29740a732526b685

                                          SHA512

                                          37f85341324343fc1d783d0c8b850c143985d3e39516154979c9cc4ee1bd3440d0fd6f5c457f5de2653288edf24443f7f63b2447728a1323b31267f1697fa300

                                        • \Windows\Temp\{E24953C2-C279-4D13-A7B1-CEA311C6F6FF}\.ba\mbahost.dll

                                          Filesize

                                          112KB

                                          MD5

                                          2ba10d77a0dd711803d905ea64444369

                                          SHA1

                                          fe2224f4ecd0f0d470675c6613f40e0e417b55ae

                                          SHA256

                                          36547e04b852794c0db49ec3c64d7dee428e3ac933b965a85d52785481e01a07

                                          SHA512

                                          db6d4aa85b3fd501a2c4665d959bf5f0fe4fcaf4d17b002605dde479da110ff4013ccf46583c703fcf05c938666d9174889c991cab58cce037325cbcafc43ddd

                                        • memory/2644-97-0x00000000023A0000-0x00000000023CE000-memory.dmp

                                          Filesize

                                          184KB

                                        • memory/2644-91-0x0000000073D10000-0x00000000743FE000-memory.dmp

                                          Filesize

                                          6.9MB

                                        • memory/2644-116-0x0000000002610000-0x000000000261A000-memory.dmp

                                          Filesize

                                          40KB

                                        • memory/2644-115-0x0000000073D10000-0x00000000743FE000-memory.dmp

                                          Filesize

                                          6.9MB

                                        • memory/2644-117-0x0000000073D10000-0x00000000743FE000-memory.dmp

                                          Filesize

                                          6.9MB

                                        • memory/2644-98-0x0000000073D10000-0x00000000743FE000-memory.dmp

                                          Filesize

                                          6.9MB

                                        • memory/2644-90-0x0000000073D10000-0x00000000743FE000-memory.dmp

                                          Filesize

                                          6.9MB

                                        • memory/2644-113-0x0000000002790000-0x00000000027C8000-memory.dmp

                                          Filesize

                                          224KB

                                        • memory/2644-168-0x0000000073D10000-0x00000000743FE000-memory.dmp

                                          Filesize

                                          6.9MB

                                        • memory/2644-167-0x0000000073D1E000-0x0000000073D1F000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2644-89-0x0000000073D10000-0x00000000743FE000-memory.dmp

                                          Filesize

                                          6.9MB

                                        • memory/2644-178-0x0000000002610000-0x000000000261A000-memory.dmp

                                          Filesize

                                          40KB

                                        • memory/2644-179-0x0000000002610000-0x000000000261A000-memory.dmp

                                          Filesize

                                          40KB

                                        • memory/2644-87-0x00000000021F0000-0x0000000002208000-memory.dmp

                                          Filesize

                                          96KB

                                        • memory/2644-82-0x0000000073D1E000-0x0000000073D1F000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2644-102-0x0000000002410000-0x000000000243C000-memory.dmp

                                          Filesize

                                          176KB