Analysis
-
max time kernel
70s -
max time network
83s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-10-2024 08:29
Static task
static1
Behavioral task
behavioral1
Sample
Adopt Me Script.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Adopt Me Script.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Adopt Me Script.exe
Resource
win11-20241007-en
General
-
Target
Adopt Me Script.exe
-
Size
1.6MB
-
MD5
30002176d8f6773689b5edde812a066f
-
SHA1
10b655f1c879f03fb797f1551f9860b94aa6188b
-
SHA256
bd2ee92415462e4ea8eb07e52fabb47098c2234f0f7f7ef440c31432144e581c
-
SHA512
2ae8676bfd507ee3a40fe27c241c8503b68a1e25e453a8e272e68ef18f5afc8e90430f2b3bc81f51b8e191eb0bb1a1f056eeb3f26ac291f14aa0568c96ff3e27
-
SSDEEP
24576:gawwKusHwEwS2DGqK+IzO6I6h6gEGe/NIsWvMyCShx+F:wwREDT8HShv2NuMs+F
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5360 Adopt Me Script.tmp -
Loads dropped DLL 1 IoCs
pid Process 5360 Adopt Me Script.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Setup\unins000.dat Adopt Me Script.tmp File created C:\Program Files (x86)\Setup\is-L9VES.tmp Adopt Me Script.tmp File opened for modification C:\Program Files (x86)\Setup\unins000.dat Adopt Me Script.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adopt Me Script.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adopt Me Script.tmp -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1532 msedge.exe 1532 msedge.exe 5636 msedge.exe 5636 msedge.exe 2076 msedge.exe 2076 msedge.exe 3572 identity_helper.exe 3572 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5636 msedge.exe 5636 msedge.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 5360 Adopt Me Script.tmp 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3480 wrote to memory of 5360 3480 Adopt Me Script.exe 77 PID 3480 wrote to memory of 5360 3480 Adopt Me Script.exe 77 PID 3480 wrote to memory of 5360 3480 Adopt Me Script.exe 77 PID 5360 wrote to memory of 5636 5360 Adopt Me Script.tmp 78 PID 5360 wrote to memory of 5636 5360 Adopt Me Script.tmp 78 PID 5636 wrote to memory of 5456 5636 msedge.exe 79 PID 5636 wrote to memory of 5456 5636 msedge.exe 79 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 5424 5636 msedge.exe 80 PID 5636 wrote to memory of 1532 5636 msedge.exe 81 PID 5636 wrote to memory of 1532 5636 msedge.exe 81 PID 5636 wrote to memory of 1536 5636 msedge.exe 82 PID 5636 wrote to memory of 1536 5636 msedge.exe 82 PID 5636 wrote to memory of 1536 5636 msedge.exe 82 PID 5636 wrote to memory of 1536 5636 msedge.exe 82 PID 5636 wrote to memory of 1536 5636 msedge.exe 82 PID 5636 wrote to memory of 1536 5636 msedge.exe 82 PID 5636 wrote to memory of 1536 5636 msedge.exe 82 PID 5636 wrote to memory of 1536 5636 msedge.exe 82 PID 5636 wrote to memory of 1536 5636 msedge.exe 82 PID 5636 wrote to memory of 1536 5636 msedge.exe 82 PID 5636 wrote to memory of 1536 5636 msedge.exe 82 PID 5636 wrote to memory of 1536 5636 msedge.exe 82 PID 5636 wrote to memory of 1536 5636 msedge.exe 82 PID 5636 wrote to memory of 1536 5636 msedge.exe 82 PID 5636 wrote to memory of 1536 5636 msedge.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Adopt Me Script.exe"C:\Users\Admin\AppData\Local\Temp\Adopt Me Script.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\is-QMCF2.tmp\Adopt Me Script.tmp"C:\Users\Admin\AppData\Local\Temp\is-QMCF2.tmp\Adopt Me Script.tmp" /SL5="$50084,865850,776192,C:\Users\Admin\AppData\Local\Temp\Adopt Me Script.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5360 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://brasspocket.sbs/tracker/thank_you.php?trk=28333⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5636 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x104,0x108,0x10c,0x100,0x110,0x7ffc4a6d3cb8,0x7ffc4a6d3cc8,0x7ffc4a6d3cd84⤵PID:5456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,13460227750312511788,7231918978828581757,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1956 /prefetch:24⤵PID:5424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1912,13460227750312511788,7231918978828581757,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1912,13460227750312511788,7231918978828581757,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:84⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,13460227750312511788,7231918978828581757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:14⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,13460227750312511788,7231918978828581757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:14⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1912,13460227750312511788,7231918978828581757,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4572 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1912,13460227750312511788,7231918978828581757,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:3572
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:392
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD567e486b2f148a3fca863728242b6273e
SHA1452a84c183d7ea5b7c015b597e94af8eef66d44a
SHA256facaf1c3a4bf232abce19a2d534e495b0d3adc7dbe3797d336249aa6f70adcfb
SHA512d3a37da3bb10a9736dc03e8b2b49baceef5d73c026e2077b8ebc1b786f2c9b2f807e0aa13a5866cf3b3cafd2bc506242ef139c423eaffb050bbb87773e53881e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD5bcd1947d374ced333a483ca018e8d464
SHA1019e29b996e20dd39017b6c2c1732de6d3b2af76
SHA256e5f57c4e2c3bcd603cdbda755908e4c11d4b17442dd5f2c10cf6750bcb984252
SHA512f13984ec9903ecbf9b554928b8bf7222dc0230b38f4074807c4e6d44b04883af3f3a766f8aebfbafbcfbf78d121dcc631ac65aac8ccd67e9842746ba542544b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD55f707aef7f0f6d2be748dc3de1cdbd60
SHA1b6700d25a5aecb848c375fc89dcb97e81d34a6b1
SHA25652a168cab9b1092d5c94decee2492166113686b172e7165f423d599375aac9fc
SHA512cf13ff7b8ff4d322eefe22419d9d5b5ebcf779c063b4496dc44cc193de5cd3c29fb038372dbba4343b4b5d2421cf2a4345150189349d23c615d593caf0eecab2
-
Filesize
152B
MD5051a939f60dced99602add88b5b71f58
SHA1a71acd61be911ff6ff7e5a9e5965597c8c7c0765
SHA2562cff121889a0a77f49cdc4564bdd1320cf588c9dcd36012dbc3669cf73015d10
SHA512a9c72ed43b895089a9e036aba6da96213fedd2f05f0a69ae8d1fa07851ac8263e58af86c7103ce4b4f9cfe92f9c9d0a46085c066a54ce825ef53505fdb988d1f
-
Filesize
152B
MD5003b92b33b2eb97e6c1a0929121829b8
SHA16f18e96c7a2e07fb5a80acb3c9916748fd48827a
SHA2568001f251d5932a62bfe17b0ba3686ce255ecf9adb95a06ecb954faa096be3e54
SHA51218005c6c07475e6dd1ec310fe511353381cf0f15d086cf20dc6ed8825c872944185c767f80306e56fec9380804933aa37a8f12c720398b4b3b42cb216b41cf77
-
Filesize
556B
MD5ff84ef15b027149141ec6039cc0cad17
SHA19352f23c384ca82d3a1eabefcd8fb354dd52203f
SHA2564f06c16f33b20427e7f9f20da4160e7d4404901ee0c28d1c8e585720c05e1bae
SHA512341a6305aa91a3963a6a57928e4117cdbd3d8981afdf44bc6daacba40e00632c9f76e5b317673939979bb8b99013e61f633e503247ba388770a22f856f2f45ca
-
Filesize
6KB
MD5a412d17b9cd6368006792bcb8e3a145d
SHA11221ab5a337317b6c9aad9c3fa2b0a68e62ac2b4
SHA256d345bc2ef0cf4975a96d560d85446649e0737fb590b2d79a9f8c45835dc3c182
SHA51253df96121fc2475a3d2a32b0d5f257b783e32b144f8e304e4afa3c9450d3d6f5faf0300b8794ab243b8ff3e48f30033589df05e7ea865457088f08c16c0c318c
-
Filesize
5KB
MD57a4d36ce386485e88d8950f68683021c
SHA1e63608626a9cae4f18ecc5d9f2f51fbbeed55ed7
SHA2569dd9a6617efc26bad703b64939b627249f83003e97fcfca795387be5013751d8
SHA512e7850034322545c67d6627e1841fc1ecd8c72eb9304618688a2caca48f75ef9fba065dcffb88e52cd20f7d8d3ac829fc5bd4208bd4dee32c274df1ecb432e379
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD59e308acd5729bce0229c136ec8b0b15d
SHA1b08e87da12ebbaccaf3f811dc93da48217815d5b
SHA25616a19ebadbd518aa217c91c149258f49237f2af25a85c5d961ac560e042cff95
SHA512ee8812e54598acd725a6e10571db09e43cb96ae4e3c722451b40d9f99e905d3dced7a4854495ad8d0b7f67113fbbf6c3c06d2f3c5e662ea9ca9897c894273126
-
Filesize
232KB
MD555c310c0319260d798757557ab3bf636
SHA10892eb7ed31d8bb20a56c6835990749011a2d8de
SHA25654e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed
SHA512e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57
-
Filesize
3.0MB
MD52a1c11173b4ccf107828943ef0576a98
SHA1e1f85aea047ef7a1e9686ca7de8e5a8daae0318d
SHA256208a7a2f6573dcc8c76bd04920939f1f59f90d6326eff331d46a4367d2571d1c
SHA5125ddc146846ee65379eef4f670cfeecc4ec7c4b274ea703e0cd30e11805ae45b0cbc9efbb519aadcde1ff7f90e1b409966ce7f9db45e4d9cbefcdd3ea41b2816b