Create Interactive Tour

Analysis Report AdobeARM.exe

Overview

General Information

Sample Name:AdobeARM.exe
Analysis ID:352178
MD5:b8b96354dd88484208f17101f6704f7c
SHA1:68815c39f47a0b8f766d9191e7ac55d3199d1c96
SHA256:ad25d9f873a80f454ce2acbb75246463070e216c89b042ee87b9a6204dd146c0

Most interesting Screenshot:

Detection

Score:7
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • AdobeARM.exe (PID: 6840 cmdline: 'C:\Users\user\Desktop\AdobeARM.exe' MD5: B8B96354DD88484208F17101F6704F7C)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_0108E904 lstrcmpA,lstrcmpA,CryptQueryObject,CryptMsgGetParam,LocalAlloc,CryptMsgGetParam,CryptDecodeObject,LocalAlloc,CryptDecodeObject,CryptMsgClose,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_010A92BD __EH_prolog3_GS,CryptProtectData,LocalFree,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_010A943B __EH_prolog3_GS,CryptUnprotectData,LocalFree,LocalFree,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_0108E461 __EH_prolog3,lstrlenW,CryptQueryObject,CryptMsgGetParam,LocalAlloc,CryptMsgGetParam,CertFindCertificateInStore,CertGetNameStringW,LocalAlloc,CertGetNameStringW,lstrlenW,lstrlenW,lstrcmpW,lstrcmpW,LocalFree,CertFindCertificateInStore,CertGetNameStringW,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,CertFreeCertificateContext,CertCloseStore,CryptMsgClose,LocalFree,CertCloseStore,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_0108E7DB lstrcmpA,CryptDecodeObject,LocalAlloc,CryptDecodeObject,LocalFree,

Compliance:

barindex
Uses 32bit PE files
Source: AdobeARM.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
PE / OLE file has a valid certificate
Source: AdobeARM.exeStatic PE information: certificate valid
Contains modern PE file flags such as dynamic base (ASLR) or NX
Source: AdobeARM.exeStatic PE information: GUARD_CF, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Binary contains paths to debug symbols
Source: Binary string: D:\DCB\CBT_Main\BuildResults\bin\Win32\Release\AdobeARM.pdb source: AdobeARM.exe
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_010AF88F __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_0108F13C GetFileAttributesW,FindFirstFileW,FindClose,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_010B1B88 GetModuleHandleW,GetProcAddress,FindFirstFileW,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_010B1A40 SetLastError,FindFirstFileW,GetLastError,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_01061ECD __EH_prolog3_GS,GetLastError,FindFirstFileW,CreateDirectoryW,GetLastError,FindClose,FindClose,GetLastError,GetLastError,GetLastError,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_010AC825 __EH_prolog3_GS,GetTempPathW,GetLastError,DeleteUrlCacheEntryW,URLDownloadToFileW,
Source: AdobeARM.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: AdobeARM.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
Source: AdobeARM.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
Source: AdobeARM.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: AdobeARM.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: AdobeARM.exeString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: AdobeARM.exeString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
Source: AdobeARM.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: AdobeARM.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: AdobeARM.exeString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: AdobeARM.exeString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
Source: AdobeARM.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: AdobeARM.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: AdobeARM.exeString found in binary or memory: http://ocsp.digicert.com0H
Source: AdobeARM.exeString found in binary or memory: http://ocsp.digicert.com0I
Source: AdobeARM.exeString found in binary or memory: http://ocsp.digicert.com0O
Source: AdobeARM.exeString found in binary or memory: http://www.digicert.com/CPS0
Source: AdobeARM.exeString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: AdobeARM.exeString found in binary or memory: https://www.digicert.com/CPS0
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_0109AF4A __EH_prolog3,CreateEnvironmentBlock,GetLastError,CreateProcessAsUserW,GetLastError,DestroyEnvironmentBlock,CloseHandle,CloseHandle,CloseHandle,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_0109AE63 __EH_prolog3_GS,GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,GetLastError,ExitWindowsEx,GetLastError,
Source: C:\Users\user\Desktop\AdobeARM.exeFile created: C:\Windows\Temp\17231.txtJump to behavior
Source: C:\Users\user\Desktop\AdobeARM.exeFile deleted: C:\Windows\Temp\17231.txtJump to behavior
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_010A032C
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_01079B38
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_010E635C
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_0108DD6F
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_0110659A
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_010E1DE8
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_010A1C32
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_0107BFD8
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_011066BA
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: String function: 01062829 appears 372 times
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: String function: 010C8C18 appears 109 times
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: String function: 010C8C4C appears 45 times
Source: AdobeARM.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: AdobeARM.exe, 00000000.00000002.605829217.0000000000FF0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameOLEACCRC.DLLj% vs AdobeARM.exe
Source: AdobeARM.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: classification engineClassification label: clean7.winEXE@1/3@0/0
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_010735AC __EH_prolog3,GetLastError,SetLastError,FormatMessageW,GetLastError,SetLastError,LocalFree,LocalFree,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_0109AE63 __EH_prolog3_GS,GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,GetLastError,ExitWindowsEx,GetLastError,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_0109B3B0 __EH_prolog3_GS,CreateToolhelp32Snapshot,GetLastError,Process32FirstW,GetLastError,OpenProcess,OpenProcessToken,CloseHandle,GetLastError,CloseHandle,Process32NextW,DuplicateTokenEx,GetLastError,CloseHandle,CloseHandle,GetLastError,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_010A53EE __EH_prolog3,CoInitialize,CoCreateInstance,CoTaskMemFree,CoUninitialize,GetFileAttributesW,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_010628D2 LoadResource,LockResource,SizeofResource,
Source: C:\Users\user\Desktop\AdobeARM.exeFile created: C:\Users\user\AppData\Local\Adobe\ARMJump to behavior
Source: C:\Users\user\Desktop\AdobeARM.exeFile created: C:\Windows\Temp\17231.txtJump to behavior
Source: AdobeARM.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\AdobeARM.exeFile read: C:\Windows\Temp\ArmReport.iniJump to behavior
Source: C:\Users\user\Desktop\AdobeARM.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: AdobeARM.exeString found in binary or memory: /InstallOnDemand:
Source: AdobeARM.exeString found in binary or memory: ?inStream->Look not SZ_OKLzmaDec_DecodeToDic not SZ_OKstate or status are not validinStream->Skip not SZ_OKExtract Files ERROR_DATAInFile_OpenW failed with archive path: can not open output filecan not write output file: can not close output fileExtract7zArchiveFromMsiContainer.. archive name: IDS_ACTION_EXTRACTINGMOD failed: SELECT * FROM `Binary` WHERE `Name`='%s'MDOV failed: MVE failed: MVF failed: File: archive file: Failed to delete existing archive: %s%dCreate file failed:ExtractFilesFrom7zArchive...Failed to get current working directory.CreateDirectory() failedFailed to change cwdExtractor.exe;64bit extractor succeededExecute 64bit extractor failed with exit code: Failed to change cwd.Failed to extract filesFiles extracted successfully at: AdobeARM.exeAdobe AcrobatAdobe ReaderAdobe Acrobat UpdaterAdobe Reader Updater1.8.0.0AdobeARMHelper.exeAdobeARM.msiAdobeARMArmManifest3.msithsnYaVieBodahttps://armmf.adobe.com/arm-manifests/win/http://www.adobe.com/support/downloads/product.jsp?product=1&platform=Windowshttp://www.adobe.com/support/downloads/product.jsp?product=10&platform=WindowsSOFTWARE\Adobe\Adobe ARM\1.0\ARMSOFTWARE\Adobe\Adobe ARM\1.0\ARM\CleanupSOFTWARE\Adobe\Adobe ARM\ProductsiLogLeveliDebugArmiCanExitSoftware\Microsoft\Windows\CurrentVersion\Policies\SystemtUpgradeCacheiStartTimeDaysRemainingForceErrorReaderAcrobat7AD7-/DL/ArmUpdate/ArmElevate/ProcessResult/ProcessOnDemandResult/ErrorMissingProduct/dUI/mUI/MODE:1/MODE:2/MODE:3/MODE:4/ArmPrefs/BackFromArmUpdate/FixPDF/FixRegistryOwnership/RegisterFileTypesOwnership/CollectFiles/UninstallARM/ShowInstallInProgressUI/InstallOnDemand/CloseApplications/ArmCleanup/RUM/IsUpdateAvailable/DownloadIDS_TITLE_NOT_UPDATEDAdobe Updater logging started.Adobe ARM skipping analytics and arm update - another instance is in usearm updatenew instanceInitSessionWithProduct failed.exit instanceexiting while UI thread is alive, will kill UIWaiting for Server to exitError exiting while in action! One of the threads may not be released properlyLaunched in the SYSTEM context, no UI will be availableCommand Line: Global\UpdateInstallInProcessEventinstall in progress UI already exists, exitingOnDemand success before restart, will not pingcannot continue - another instance is in useEmpty CloseAppsListRegisterFileTypesOwnership...IDS_REGISTER_FILETYPES_ERRORError InitReaderOrAcrobat" /FOLDER:" /LANG:ShellExecute failedIDS_ERROR_DIALOG_DETAIL[ERRORCODE]
Source: AdobeARM.exeString found in binary or memory: |/LANG:/VERSION:/PRODUCT:FOLDER:"ArmUpdateExe:"/MANIFEST:"7ZMSIEXE/USER:/InstallOnDemand:/ARGS:@@@@
Source: AdobeARM.exeString found in binary or memory: DAN=[X]-installation
Source: AdobeARM.exeString found in binary or memory: NOR=[X]-installasjon
Source: AdobeARM.exeString found in binary or memory: SVE=[X]-installation
Source: C:\Users\user\Desktop\AdobeARM.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
Source: C:\Users\user\Desktop\AdobeARM.exeFile written: C:\Windows\Temp\ArmReport.iniJump to behavior
Source: AdobeARM.exeStatic PE information: certificate valid
Source: AdobeARM.exeStatic file information: File size 1557200 > 1048576
Source: AdobeARM.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: AdobeARM.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: AdobeARM.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: AdobeARM.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: AdobeARM.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: AdobeARM.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: AdobeARM.exeStatic PE information: GUARD_CF, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: AdobeARM.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\DCB\CBT_Main\BuildResults\bin\Win32\Release\AdobeARM.pdb source: AdobeARM.exe
Source: AdobeARM.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: AdobeARM.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: AdobeARM.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: AdobeARM.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: AdobeARM.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_01086846 __EH_prolog3_GS,_strlen,SHGetFolderPathW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,_strlen,GetACP,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_010C8BE1 push ecx; ret
Source: C:\Users\user\Desktop\AdobeARM.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\AdobeARM.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\AdobeARM.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\AdobeARM.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\AdobeARM.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\AdobeARM.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\AdobeARM.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\AdobeARM.exe TID: 6844Thread sleep count: 290 > 30
Source: C:\Users\user\Desktop\AdobeARM.exe TID: 6844Thread sleep count: 289 > 30
Source: C:\Users\user\Desktop\AdobeARM.exe TID: 6844Thread sleep count: 222 > 30
Source: C:\Users\user\Desktop\AdobeARM.exe TID: 6844Thread sleep time: -111000s >= -30000s
Source: C:\Users\user\Desktop\AdobeARM.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\AdobeARM.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_010AF88F __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_0108F13C GetFileAttributesW,FindFirstFileW,FindClose,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_010B1B88 GetModuleHandleW,GetProcAddress,FindFirstFileW,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_010B1A40 SetLastError,FindFirstFileW,GetLastError,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_01061ECD __EH_prolog3_GS,GetLastError,FindFirstFileW,CreateDirectoryW,GetLastError,FindClose,FindClose,GetLastError,GetLastError,GetLastError,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_010A3FCD __EH_prolog3,GetModuleHandleW,GetProcAddress,GetSystemInfo,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_010E433E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_010AE34F OutputDebugStringA,GetLastError,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_01086846 __EH_prolog3_GS,_strlen,SHGetFolderPathW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,_strlen,GetACP,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_010FB87B mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_010FB8BF mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_010F3437 mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_0108F7A9 GetProcessHeap,__Init_thread_footer,__Init_thread_footer,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_010E433E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_010C8DF0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: AdobeARM.exe, 00000000.00000000.229435734.0000000001116000.00000002.00020000.sdmpBinary or memory string: ExitMaximize&Click to activateShell_NotifyIcon failedShell_TrayWndTrayNotifyWndpW
Source: AdobeARM.exeBinary or memory string: Shell_TrayWnd
Source: AdobeARM.exe, 00000000.00000002.608451607.0000000003590000.00000002.00000001.sdmpBinary or memory string: Progman
Source: AdobeARM.exe, 00000000.00000002.608451607.0000000003590000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
Source: AdobeARM.exeBinary or memory string: BExitMaximize&Click to activateShell_NotifyIcon failedShell_TrayWndTrayNotifyWndpWEH
Source: AdobeARM.exe, 00000000.00000002.608451607.0000000003590000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
Source: AdobeARM.exe, 00000000.00000002.608451607.0000000003590000.00000002.00000001.sdmpBinary or memory string: Progmanlock
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_0107ACEC cpuid
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: EnumSystemLocalesW,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: GetLocaleInfoW,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: EnumSystemLocalesW,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: EnumSystemLocalesW,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: EnumSystemLocalesW,
Source: C:\Users\user\Desktop\AdobeARM.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_010C93AD GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
Source: C:\Users\user\Desktop\AdobeARM.exeCode function: 0_2_010FB359 _free,_free,_free,GetTimeZoneInformation,_free,

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1Command and Scripting Interpreter2Valid Accounts1Valid Accounts1Masquerading11OS Credential DumpingSystem Time Discovery2Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
Default AccountsNative API1Boot or Logon Initialization ScriptsAccess Token Manipulation11Valid Accounts1LSASS MemorySecurity Software Discovery3Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Process Injection1Virtualization/Sandbox Evasion1Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Access Token Manipulation11NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection1LSA SecretsFile and Directory Discovery3SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Information Discovery33VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information2DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobFile Deletion1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 352178 Sample: AdobeARM.exe Startdate: 11/02/2021 Architecture: WINDOWS Score: 7 4 AdobeARM.exe 27 2->4         started       

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
AdobeARM.exe0%VirustotalBrowse
AdobeARM.exe0%MetadefenderBrowse
AdobeARM.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos

General Information

Joe Sandbox Version:31.0.0 Emerald
Analysis ID:352178
Start date:11.02.2021
Start time:21:49:40
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 6m 33s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:AdobeARM.exe
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:23
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:CLEAN
Classification:clean7.winEXE@1/3@0/0
EGA Information:
  • Successful, ratio: 100%
HDC Information:
  • Successful, ratio: 100% (good quality ratio 95.8%)
  • Quality average: 75.6%
  • Quality standard deviation: 26.6%
HCA Information:Failed
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .exe
Warnings:
  • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
No simulations
No context
No context
No context
No context
No context
C:\Windows\Temp\AdobeARM.log
Process:C:\Users\user\Desktop\AdobeARM.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):298
Entropy (8bit):4.957021814808006
Encrypted:false
SSDEEP:6:o9UK6h3VPHp0AK6cK4tBKgXWGBBXRxYACgX2K6cK4tBsFAzTuyVRax:oY3Jp0rhXWWBXRDZl/fRO
MD5:48E5C748E7E293DFD2C3FCD5A9C6CDEF
SHA1:EA8E06C1EE5A0236573FD6D2F1CD2FA75E8E2380
SHA-256:1912947BF9181A6BEC48FB3B79224FE69C3B03D598C44602D1A3401A657B4675
SHA-512:FE4FD31A34A799A98F7C88D44C796171D1AA22677741B624EB77BBF17F919001C6CCD50D15DBF8B41E190D3ADAA52095474BB55D2FF6697F13197A171F50DD60
Malicious:false
Reputation:low
Preview: [2021-02-11 21:50:31:0245] Adobe ARM 1.824.31.1644 logging started...[2021-02-11 21:50:49:0401] ARMDownloader::BITS Error: The server name or address could not be resolved..[2021-02-11 21:50:49:0401] ARMDownloader::BITS Error Context: The error occurred while the remote file was being processed...
C:\Windows\Temp\ArmReport.ini
Process:C:\Users\user\Desktop\AdobeARM.exe
File Type:data
Category:dropped
Size (bytes):50
Entropy (8bit):3.106830344844092
Encrypted:false
SSDEEP:3:Q+slgN5+lly1gw1RalBmUyv:Q+slgN5+aVclFyv
MD5:3D0C316599578927472E919DD6334C12
SHA1:C74579C94A08DD10E5E415AA759D5506A9C768BC
SHA-256:4F3CC7F90918FEEFF2DC4DEC8C0F0D60B42FBFFBB06D2ED84D394AAAB09818AF
SHA-512:C76C15A10CCDAA0FBE78ECE8C20E6E6031F4FE48EEE9EF1B877DF8292C57B541F8A78AD2AC8CD3663BCC573D569A6874F79B2DB6E4850CE2AD55ADE412377AB0
Malicious:false
Reputation:low
Preview: ..[.S.E.S.S.I.O.N.].......R.e.p.o.r.t.e.d.=.1.....
C:\Windows\Temp\ArmUI.ini
Process:C:\Users\user\Desktop\AdobeARM.exe
File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
Category:dropped
Size (bytes):257928
Entropy (8bit):4.254716042555522
Encrypted:false
SSDEEP:3072:wT4DJAvCXkQqSmSgojgTaDuK1+4xKtaU/QX5Pm9vR549QHmYPCjTMNro0Jnxu4Fn:xvUzH5
MD5:864C22FB9A1C0670EDF01C6ED3E4FBE4
SHA1:BF636F8BAED998A1EB4531AF9E833E6D3D8DF129
SHA-256:B4D4DCD9594D372D7C0C975D80EF5802C88502895ED4B8A26CA62E225F2F18B0
SHA-512:FF23616EE67D51DAA2640AE638F59A8D331930A29B98C2D1BD3B236D2F651F243F9BAE38D58515714886CFBB13B9BE721D490AAD4F2D10CBBA74D7701AB34E09
Malicious:false
Reputation:high, very likely benign file
Preview: ..[.I.D.S._.A.C.T.I.O.N._.C.O.N.N.E.C.T.I.N.G.].....B.G.R.=.!.2.J.@.7.2.0.=.5. .A.J.A. .A.J.@.2.J.@.0...........C.A.T.=.S.'.e.s.t... .c.o.n.n.e.c.t.a.n.t. .a.m.b. .e.l. .s.e.r.v.i.d.o.r...........C.H.S.=.ck(W..c.g.RhV..........C.H.T.=.ck(W#..}.:O.ghV..........C.Z.E.=.P.Y.i.p.o.j.o.v...n... .k...s.e.r.v.e.r.u.& ....D.A.N.=.O.p.r.e.t.t.e.r. .f.o.r.b.i.n.d.e.l.s.e. .t.i.l. .s.e.r.v.e.r...........D.E.U.=.S.e.r.v.e.r.v.e.r.b.i.n.d.u.n.g. .w.i.r.d. .h.e.r.g.e.s.t.e.l.l.t...........E.N.U.=.C.o.n.n.e.c.t.i.n.g. .t.o. .s.e.r.v.e.r...........E.S.P.=.C.o.n.e.c.t.a.n.d.o. .a.l. .s.e.r.v.i.d.o.r...........E.T.I.=.S.e.r.v.e.r.i.g.a. ...h.e.n.d.a.m.i.n.e...........E.U.Q.=.Z.e.r.b.i.t.z.a.r.i.r.a. .k.o.n.e.k.t.a.t.z.e.n...........F.R.A.=.C.o.n.n.e.x.i.o.n. .a.u. .s.e.r.v.e.u.r...........H.R.V.=.P.o.v.e.z.i.v.a.n.j.e. .s. .p.o.s.l.u.~.i.t.e.l.j.e.m...........H.U.N.=.K.a.p.c.s.o.l...d...s. .a. .k.i.s.z.o.l.g...l...h.o.z...........I.T.A.=.C.o.n.n.e.s.s.i.o.n.e. .a.l. .s.e.r.v.e.r. .i.n. .c.o.r.s.o.....

Static File Info

General

File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.088829702783494
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:AdobeARM.exe
File size:1557200
MD5:b8b96354dd88484208f17101f6704f7c
SHA1:68815c39f47a0b8f766d9191e7ac55d3199d1c96
SHA256:ad25d9f873a80f454ce2acbb75246463070e216c89b042ee87b9a6204dd146c0
SHA512:6ef740dea56bd0724e7f8a999ce46a2f2356aeb876bc47d127d96eb156d636c755a9f610fee7109ad4d044042c1e571bcfb88ca9402c6789edfde23073cdad32
SSDEEP:24576:o8K1tzizZMWgHWA1r+4tluCgG0XD8aMCFugvVDYb:tK19i7gHWA1r+6luCgtD8aPugvVDYb
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............}...}...}...|...}...|...}...|o..}...|...}y..|...}y..|...}y..|...}...|...}.k.}...}...}...}0..|...}0.)}...}..A}...}0..|...

File Icon

Icon Hash:cec2d252784cb46c

General

Entrypoint:0x468630
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
DLL Characteristics:GUARD_CF, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x600FADC2 [Tue Jan 26 05:50:58 2021 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:3764d71236dd3faa2a09f6dd43bff76f
Signature Valid:true
Signature Issuer:CN=DigiCert EV Code Signing CA (SHA2), OU=www.digicert.com, O=DigiCert Inc, C=US
Signature Validation Error:The operation completed successfully
Error Number:0
Not Before, Not After
  • 12/18/2020 4:00:00 PM 12/21/2022 3:59:59 PM
Subject Chain
  • CN=Adobe Inc., OU=Acrobat DC, O=Adobe Inc., L=San Jose, S=ca, C=US, SERIALNUMBER=2748129, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.2=Delaware, OID.1.3.6.1.4.1.311.60.2.1.3=US
Version:3
Thumbprint MD5:1ED822CC08BA08413C4A60023E0D590C
Thumbprint SHA-1:5DA6AD39FC524D0D2BEC6741DFDBF67DF5AF3ECA
Thumbprint SHA-256:B184F0677143FFA39C7DABF083FB0B613015CEA696DFDEBA11D5CAFD4CF8B8D8
Serial:011F39A2261A993DD15176DA6FE4FBEA
Instruction
call 00007F9BD8E096CAh
jmp 00007F9BD8E0877Dh
cmp ecx, dword ptr [0050E554h]
jne 00007F9BD8E08905h
ret
jmp 00007F9BD8E090D3h
int3
int3
int3
int3
int3
push ebp
mov ebp, esp
test byte ptr [ebp+08h], 00000001h
push esi
mov esi, ecx
mov dword ptr [esi], 004BDDA0h
je 00007F9BD8E0890Ch
push 0000000Ch
push esi
call 00007F9BD8E0890Eh
pop ecx
pop ecx
mov eax, esi
pop esi
pop ebp
retn 0004h
push ebp
mov ebp, esp
push dword ptr [ebp+08h]
call 00007F9BD8DEE914h
pop ecx
pop ebp
ret
push ebp
mov ebp, esp
mov eax, dword ptr [ebp+08h]
push esi
mov ecx, dword ptr [eax+3Ch]
add ecx, eax
movzx eax, word ptr [ecx+14h]
lea edx, dword ptr [ecx+18h]
add edx, eax
movzx eax, word ptr [ecx+06h]
imul esi, eax, 28h
add esi, edx
cmp edx, esi
je 00007F9BD8E0891Bh
mov ecx, dword ptr [ebp+0Ch]
cmp ecx, dword ptr [edx+0Ch]
jc 00007F9BD8E0890Ch
mov eax, dword ptr [edx+08h]
add eax, dword ptr [edx+0Ch]
cmp ecx, eax
jc 00007F9BD8E0890Eh
add edx, 28h
cmp edx, esi
jne 00007F9BD8E088ECh
xor eax, eax
pop esi
pop ebp
ret
mov eax, edx
jmp 00007F9BD8E088FBh
push esi
call 00007F9BD8E09B26h
test eax, eax
je 00007F9BD8E08922h
mov eax, dword ptr fs:[00000018h]
mov esi, 00512D2Ch
mov edx, dword ptr [eax+04h]
jmp 00007F9BD8E08906h
cmp edx, eax
je 00007F9BD8E08912h
xor eax, eax
mov ecx, edx
lock cmpxchg dword ptr [esi], ecx
test eax, eax
jne 00007F9BD8E088F2h
xor al, al
pop esi
ret
mov al, 01h
pop esi
ret
Programming Language:
  • [IMP] VS2005 build 50727
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x10aee80x1b8.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x1170000x5f1e0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x17a6000x1cd0.reloc
IMAGE_DIRECTORY_ENTRY_BASERELOC0x1770000xc01c.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0xfa1300x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0xfa2440x18.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xfa1a00x40.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0xb60000x7e4.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xb45ba0xb4600False0.52699454262data6.61990899628IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.rdata0xb60000x579a40x57a00False0.250275833631data3.85077153908IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x10e0000x85000x2e00False0.207710597826data4.17471211638IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.rsrc0x1170000x5f1e00x5f200False0.261379968791data5.21496935275IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x1770000xc01c0xc200False0.608106475515data6.63446459506IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountry
AFX_DIALOG_LAYOUT0x172bc80x2dataEnglishUnited States
AFX_DIALOG_LAYOUT0x172bb80x2dataEnglishUnited States
AFX_DIALOG_LAYOUT0x172bc00x2dataEnglishUnited States
ARM_UI_INI0x125e780x3ef88Little-endian UTF-16 Unicode text, with CRLF line terminatorsEnglishUnited States
RT_CURSOR0x172bd00x134dataEnglishUnited States
RT_CURSOR0x172d080xb4dataEnglishUnited States
RT_CURSOR0x172de80x134AmigaOS bitmap fontEnglishUnited States
RT_CURSOR0x172f380x134dataEnglishUnited States
RT_CURSOR0x1730880x134dataEnglishUnited States
RT_CURSOR0x1731d80x134dataEnglishUnited States
RT_CURSOR0x1733280x134dataEnglishUnited States
RT_CURSOR0x1734780x134dataEnglishUnited States
RT_CURSOR0x1735c80x134dataEnglishUnited States
RT_CURSOR0x1737180x134dataEnglishUnited States
RT_CURSOR0x1738680x134dataEnglishUnited States
RT_CURSOR0x1739b80x134dataEnglishUnited States
RT_CURSOR0x173b080x134AmigaOS bitmap fontEnglishUnited States
RT_CURSOR0x173c580x134dataEnglishUnited States
RT_CURSOR0x173da80x134dataEnglishUnited States
RT_CURSOR0x173ef80x134dataEnglishUnited States
RT_BITMAP0x164e000xdd68dataEnglishUnited States
RT_BITMAP0x1741680xb8dataEnglishUnited States
RT_BITMAP0x1742200x144dataEnglishUnited States
RT_ICON0x117ec00x24baPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
RT_ICON0x11a3800x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 16777215, next used block 16777215EnglishUnited States
RT_ICON0x11e5a80x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 16777215, next used block 16777215EnglishUnited States
RT_ICON0x120b500x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 16777215, next used block 16777215EnglishUnited States
RT_ICON0x121bf80x988dataEnglishUnited States
RT_ICON0x1225800x468GLS_BINARY_LSB_FIRSTEnglishUnited States
RT_ICON0x122a480x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 16777215, next used block 16777215EnglishUnited States
RT_MENU0x172b680x4cdataEnglishUnited States
RT_DIALOG0x1250080x11edataEnglishUnited States
RT_DIALOG0x1251280x304dataEnglishUnited States
RT_DIALOG0x1254300x264dataEnglishUnited States
RT_DIALOG0x1256980x21adataEnglishUnited States
RT_DIALOG0x1258b80x258dataEnglishUnited States
RT_DIALOG0x1740480xe8dataEnglishUnited States
RT_DIALOG0x1741300x34dataEnglishUnited States
RT_STRING0x1743680x7edataEnglishUnited States
RT_STRING0x1743e80x82dataEnglishUnited States
RT_STRING0x1744700x2adataEnglishUnited States
RT_STRING0x1744a00x184dataEnglishUnited States
RT_STRING0x1746280x4eedataEnglishUnited States
RT_STRING0x174ea80x264dataEnglishUnited States
RT_STRING0x174bc80x2dadataEnglishUnited States
RT_STRING0x1758f00x8adataEnglishUnited States
RT_STRING0x174b180xacdataEnglishUnited States
RT_STRING0x1757e00xdedataEnglishUnited States
RT_STRING0x1751100x4a8dataEnglishUnited States
RT_STRING0x1755b80x228dataEnglishUnited States
RT_STRING0x1758c00x2cdataEnglishUnited States
RT_STRING0x1759800x53edataEnglishUnited States
RT_GROUP_CURSOR0x172dc00x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States
RT_GROUP_CURSOR0x1735b00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
RT_GROUP_CURSOR0x172f200x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
RT_GROUP_CURSOR0x1734600x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
RT_GROUP_CURSOR0x1733100x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
RT_GROUP_CURSOR0x173c400x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
RT_GROUP_CURSOR0x1731c00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
RT_GROUP_CURSOR0x1738500x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
RT_GROUP_CURSOR0x1730700x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
RT_GROUP_CURSOR0x1737000x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
RT_GROUP_CURSOR0x1739a00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
RT_GROUP_CURSOR0x173af00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
RT_GROUP_CURSOR0x173d900x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
RT_GROUP_CURSOR0x173ee00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
RT_GROUP_CURSOR0x1740300x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
RT_GROUP_ICON0x1229e80x5adataEnglishUnited States
RT_GROUP_ICON0x124ff00x14dataEnglishUnited States
RT_VERSION0x125b100x368dataEnglishUnited States
RT_MANIFEST0x175ec00x31cXML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminatorsEnglishUnited States
DLLImport
msi.dll
PSAPI.DLLGetModuleBaseNameW, EnumProcessModules, EnumProcesses, GetModuleFileNameExW
VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
WININET.dllDeleteUrlCacheEntryW, HttpQueryInfoW, InternetReadFile, InternetCrackUrlW, InternetOpenW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, InternetErrorDlg, InternetSetOptionW, InternetCloseHandle
SensApi.dllIsNetworkAlive
Secur32.dllLsaGetLogonSessionData, LsaFreeReturnBuffer
KERNEL32.dllGetModuleFileNameW, GetModuleHandleA, GlobalAlloc, GlobalLock, GlobalUnlock, GlobalFree, MulDiv, FlushFileBuffers, GetFullPathNameW, LockFile, UnlockFile, DuplicateHandle, LoadLibraryExW, LoadLibraryA, GetCurrentThreadId, GetVersionExW, GlobalDeleteAtom, FileTimeToLocalFileTime, FindNextFileW, SystemTimeToTzSpecificLocalTime, FileTimeToSystemTime, SetThreadPriority, LeaveCriticalSection, ResumeThread, GetPrivateProfileIntW, GlobalAddAtomW, EncodePointer, GetSystemDirectoryW, GlobalFindAtomW, CompareStringW, GetFileAttributesExW, GetFileSizeEx, GetFileTime, InitializeCriticalSection, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GlobalReAlloc, GlobalHandle, LocalReAlloc, SetErrorMode, GetLocaleInfoW, GetSystemDefaultUILanguage, EnterCriticalSection, GlobalFlags, GetUserDefaultLCID, ResetEvent, WaitForSingleObjectEx, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, OutputDebugStringA, GetCurrentProcessId, ProcessIdToSessionId, GlobalMemoryStatusEx, GetEnvironmentVariableW, GetSystemInfo, DeleteCriticalSection, DecodePointer, RaiseException, InitializeCriticalSectionEx, OpenEventW, Module32NextW, Module32FirstW, GetNativeSystemInfo, Process32NextW, GetLongPathNameW, Process32FirstW, CreateToolhelp32Snapshot, FindResourceExW, GetProcessHeap, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, HeapDestroy, lstrcmpA, lstrcmpW, LocalAlloc, GetExitCodeProcess, CreateProcessW, GetFileInformationByHandle, OpenMutexW, CreateMutexW, WideCharToMultiByte, SetCurrentDirectoryW, GetCurrentDirectoryW, FreeLibrary, SystemTimeToFileTime, SetEndOfFile, RemoveDirectoryW, GetFileSize, SetFilePointer, GetThreadLocale, GetPrivateProfileSectionNamesW, MoveFileW, WaitNamedPipeW, CreateNamedPipeW, ConnectNamedPipe, SetNamedPipeHandleState, DisconnectNamedPipe, ReadFile, LocalFree, GetUserDefaultLangID, UnmapViewOfFile, OpenFileMappingW, MapViewOfFile, FormatMessageW, GetLocalTime, GetModuleHandleW, GetVolumeInformationW, GetPrivateProfileStringW, WritePrivateProfileStringW, MoveFileExW, CreateFileW, GetCurrentThread, GetCurrentProcess, GetTempPathW, OpenProcess, CopyFileW, GetProcAddress, GetACP, LoadLibraryW, WaitForSingleObject, SetEvent, GetTickCount64, CloseHandle, CreateEventW, SetLastError, Sleep, GetThreadPriority, MultiByteToWideChar, FindClose, FindFirstFileW, DeleteFileW, lstrlenW, SetFileAttributesW, SetFileTime, WriteFile, GetLastError, InitializeCriticalSectionAndSpinCount, CreateDirectoryW, GetFileAttributesW, FindResourceW, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetStringTypeW, LCMapStringW, GetCPInfo, RtlUnwind, GetDriveTypeW, SetEnvironmentVariableW, CreateThread, ExitThread, FreeLibraryAndExitThread, GetModuleHandleExW, GetCommandLineA, GetCommandLineW, SetStdHandle, GetFileType, HeapQueryInformation, GetStdHandle, ExitProcess, GetDateFormatW, GetTimeFormatW, IsValidLocale, EnumSystemLocalesW, GetTimeZoneInformation, GetConsoleCP, GetConsoleMode, ReadConsoleW, SetFilePointerEx, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, SuspendThread, GetUserDefaultUILanguage
USER32.dllDestroyMenu, GetMonitorInfoW, MonitorFromWindow, WinHelpW, UnhookWindowsHookEx, GetTopWindow, GetClassNameW, GetClassLongW, PtInRect, MapWindowPoints, AdjustWindowRectEx, RemovePropW, GetPropW, SetPropW, ShowScrollBar, GetScrollPos, RedrawWindow, TrackPopupMenu, SetMenu, GetMenu, GetCapture, EndDeferWindowPos, DeferWindowPos, BeginDeferWindowPos, IsChild, IsMenu, CreateWindowExW, GetClassInfoExW, GetClassInfoW, RegisterClassW, CallWindowProcW, DefWindowProcW, GetMessageTime, GetMessagePos, CopyRect, GetSysColor, ScreenToClient, EndPaint, BeginPaint, ReleaseDC, GetDC, TabbedTextOutW, GrayStringW, DrawTextExW, DrawTextW, GetDesktopWindow, GetNextDlgTabItem, EndDialog, CreateDialogIndirectParamW, DestroyWindow, SetWindowLongW, GetWindowTextLengthW, SetFocus, GetDlgCtrlID, SetDlgItemTextW, GetSysColorBrush, ShowWindow, GetLastActivePopup, GetWindowLongW, IsWindowEnabled, CallNextHookEx, SetWindowsHookExW, ValidateRect, GetKeyState, DispatchMessageW, TranslateMessage, GetMessageW, LoadBitmapW, SetMenuItemInfoW, GetMenuCheckMarkDimensions, SetMenuItemBitmaps, EnableMenuItem, CheckMenuItem, PostQuitMessage, CharUpperW, GetMenuStringW, OffsetRect, SendDlgItemMessageA, UnregisterClassW, GetWindow, FindWindowW, ExitWindowsEx, RegisterWindowMessageW, EnumWindows, RealChildWindowFromPoint, InvalidateRect, GetWindowTextW, IsWindowVisible, GetWindowThreadProcessId, FindWindowExW, SystemParametersInfoW, SetActiveWindow, DrawAnimatedRects, SetForegroundWindow, SetMenuDefaultItem, ModifyMenuW, GetMenuItemID, GetMenuItemCount, GetSubMenu, ClientToScreen, GetCursorPos, LoadMenuW, SetCursor, DrawFocusRect, InflateRect, SetRectEmpty, GetParent, SetWindowTextW, LoadCursorW, GetActiveWindow, KillTimer, DrawIcon, GetClientRect, GetSystemMetrics, IsIconic, PeekMessageW, UpdateWindow, GetFocus, IsWindow, SetTimer, GetWindowRect, SendMessageW, LoadIconW, EnableWindow, PostMessageW, SetWindowPos, GetForegroundWindow, MessageBoxW, GetDlgItem, IsDialogMessageW
GDI32.dllSetMapMode, CreateBitmap, ScaleWindowExtEx, ScaleViewportExtEx, OffsetViewportOrgEx, GetDeviceCaps, DeleteDC, GetTextExtentPoint32W, SetWindowExtEx, SetViewportOrgEx, SetViewportExtEx, ExtTextOutW, TextOutW, SetTextColor, CreateFontIndirectW, GetObjectW, SetBkMode, SetBkColor, SelectObject, SaveDC, RestoreDC, RectVisible, PtVisible, GetStockObject, GetClipBox, Escape, DeleteObject
WINSPOOL.DRVDocumentPropertiesW, ClosePrinter, OpenPrinterW
ADVAPI32.dllRegEnumKeyExW, RegOpenKeyExW, RegQueryInfoKeyW, RegEnumValueW, RegCloseKey, CopySid, GetLengthSid, IsValidSid, GetSidSubAuthority, InitializeSid, GetSidLengthRequired, OpenProcessToken, RegQueryValueW, RegEnumKeyW, RegDeleteKeyW, RegFlushKey, ConvertSidToStringSidW, LookupAccountNameW, ControlService, QueryServiceStatusEx, CloseServiceHandle, OpenServiceW, OpenSCManagerW, CreateWellKnownSid, RegCreateKeyW, RegDeleteKeyExW, LookupAccountSidW, GetTokenInformation, DuplicateTokenEx, CreateProcessAsUserW, AdjustTokenPrivileges, LookupPrivilegeValueW, GetUserNameW, RegCreateKeyExW, RegQueryValueExW, RegSetValueExW, RegDeleteValueW, ConvertStringSecurityDescriptorToSecurityDescriptorW, CheckTokenMembership, DuplicateToken, OpenThreadToken
SHELL32.dllSHGetFolderPathW, SHCreateDirectoryExW, ShellExecuteExW, SHFileOperationW, Shell_NotifyIconW, SHAppBarMessage, ShellExecuteW
COMCTL32.dll_TrackMouseEvent, InitCommonControlsEx
SHLWAPI.dllPathIsUNCW, PathStripToRootW, PathFindExtensionW, PathFindFileNameW, SHDeleteKeyW
ole32.dllCoInitialize, CoUninitialize, CoTaskMemFree, CoInitializeEx, CoInitializeSecurity, CoCreateInstance, OleRun, CoCreateGuid
OLEAUT32.dllSysAllocString, SysFreeString, VariantClear, SysAllocStringByteLen, SysStringByteLen, VariantInit, VariantCopy, VariantChangeType, GetErrorInfo
urlmon.dllURLDownloadToFileW
USERENV.dllCreateEnvironmentBlock, UnloadUserProfile, DestroyEnvironmentBlock
CRYPT32.dllCryptProtectData, CryptDecodeObject, CryptMsgClose, CertCloseStore, CertFreeCertificateContext, CertGetNameStringW, CertFindCertificateInStore, CryptQueryObject, CryptUnprotectData, CryptMsgGetParam
WINTRUST.dllWinVerifyTrust
OLEACC.dllCreateStdAccessibleObject, LresultFromObject
DescriptionData
LegalCopyrightCopyright 2020 Adobe Inc. All rights reserved.
InternalNameAdobeARM.exe
FileVersion1.824.42.0176
CompanyNameAdobe Inc.
ProductNameAdobe Reader and Acrobat Manager
ProductVersion1.824.42.0176
FileDescriptionAdobe Reader and Acrobat Manager
OriginalFilenameAdobeARM.exe
Translation0x0409 0x04e4
Language of compilation systemCountry where language is spokenMap
EnglishUnited States

Network Behavior

No network behavior found

Code Manipulations

Statistics

System Behavior

Start time:21:50:30
Start date:11/02/2021
Path:C:\Users\user\Desktop\AdobeARM.exe
Wow64 process (32bit):true
Commandline:'C:\Users\user\Desktop\AdobeARM.exe'
Imagebase:0x1060000
File size:1557200 bytes
MD5 hash:B8B96354DD88484208F17101F6704F7C
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

Disassembly

Code Analysis