Analysis
-
max time kernel
1558s -
max time network
1561s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-12-2024 18:57
Static task
static1
Behavioral task
behavioral1
Sample
adobe-air-51-1-1-3.exe
Resource
win7-20240708-en
General
-
Target
adobe-air-51-1-1-3.exe
-
Size
5.9MB
-
MD5
34dba7939065022ad74458acbae28abd
-
SHA1
5f4e6e7cc0f2970068ff1c05189a8dc6881b8d33
-
SHA256
da506fa70f7953e840f3eba28faf557a2038e0b3d0a5105a0ebe3434ee5e9e61
-
SHA512
6271f67b486c7273fd391e4379f987fcce3042947909e97d05290d04469588a94bd501685f686037a400b788d6693e73f7d7799069c772b80da9556322c6cc79
-
SSDEEP
98304:FOB7drLD5C522D5K6O6DWT9dCrVodEdhIW5LkrNcBByeTTC3qdqH2pjin6uYRjUI:gB7drxU22DJVAbAeOIyBBNiKqMbZUI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 320 Adobe AIR Installer.exe -
Loads dropped DLL 5 IoCs
pid Process 3036 adobe-air-51-1-1-3.exe 3036 adobe-air-51-1-1-3.exe 3036 adobe-air-51-1-1-3.exe 3036 adobe-air-51-1-1-3.exe 320 Adobe AIR Installer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobe-air-51-1-1-3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adobe AIR Installer.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Adobe AIR Installer.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Adobe AIR Installer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 320 Adobe AIR Installer.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3036 wrote to memory of 320 3036 adobe-air-51-1-1-3.exe 30 PID 3036 wrote to memory of 320 3036 adobe-air-51-1-1-3.exe 30 PID 3036 wrote to memory of 320 3036 adobe-air-51-1-1-3.exe 30 PID 3036 wrote to memory of 320 3036 adobe-air-51-1-1-3.exe 30 PID 3036 wrote to memory of 320 3036 adobe-air-51-1-1-3.exe 30 PID 3036 wrote to memory of 320 3036 adobe-air-51-1-1-3.exe 30 PID 3036 wrote to memory of 320 3036 adobe-air-51-1-1-3.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\adobe-air-51-1-1-3.exe"C:\Users\Admin\AppData\Local\Temp\adobe-air-51-1-1-3.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\AIRAE68.tmp\Adobe AIR Installer.exe"C:\Users\Admin\AppData\Local\Temp\AIRAE68.tmp\Adobe AIR Installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.4MB
MD5b10e155460556fa4667536de7bb40e43
SHA1a17872d7ff29a307fac5b4ed98887a420f716964
SHA256371c442e9ce81a9514d25eccbe6e9c37a7b766bc5de1a7e03e50ac77cb8ce374
SHA5124a3d2b0ec3d3ae868c50530136da228d835234198a41aa47ef11c40843249bad29425d50967ce8205c948336d02107e69655900c071cb5b3cb0c63e57ea557d3
-
Filesize
512KB
MD5ad5f7d53caef368303bebde302582d92
SHA19efad61bf69e80d7468236695e0a108d360ae749
SHA2562b501bfdb378ba7130b8e4b4b2263adfb4f95887cf071ded134f4cffeee5f40d
SHA5128a31c0009c915dbb46c054388d793c1db8fc7b5ae1df419b3f284cad1d2f8db1f2ed759dcb126868d64af8a0a94c9e479776e6da86296af4e73a0850821c49e8
-
Filesize
383KB
MD56ba34f521e2de430fa5ba108e399d12e
SHA1830ee63d8db0020201b6d0cb8d5a2ed2dd523256
SHA2561a54ac75b4b671657c4368c6a73143e63462be076312921bc6d1e94a12426c58
SHA5121e3826aa000abaa15d93e516b8398f31a9517d8dbbaa2ee671cfb2619af3818efe8b810e6fde3411c8b05b8c51afbd58b561c6d76e4383ac300bb7a3ce8f6401