Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[New WTFBin]: AdobeUpdateService #36

Open
joshnck opened this issue Jan 2, 2023 · 1 comment
Open

[New WTFBin]: AdobeUpdateService #36

joshnck opened this issue Jan 2, 2023 · 1 comment
Labels
more info More information required new wtfbin

Comments

@joshnck
Copy link

joshnck commented Jan 2, 2023

  • Contributor Name:@ImLordOfTheRing
  • Application/Executable:Adobe Update service spawning process RuntimeCustomHook.exe
  • **WTF Behavior Description: During the update process it appears that Adobe accesses and modifies windows\sytem32\restore\MachineGuid.txt which may trigger detections monitoring for Volume Shadow Copy alteration. I believe that this is part of the registration process where Adobe is checking in to make sure you're authorized to use the product. The trigger follows this path:
    Adobe Installer.exe -> Setup.exe -> RuntimeCustomHook.exe -> VCRedist_X86.exe (command line: "C:\Program Files (x86)\Common Files\Adobe\Adobe Desktop Common\Runtime\customhook\vc13\32bit\vcredist_x86.exe" /q /norestart -burn.unelevated BurnPipe. "
    **
  • Link to Documentation of Behavior: None that I can find
  • Please provide any images for additional evidence.
@mttaggart mttaggart added the more info More information required label Apr 7, 2023
@59e5aaf4
Copy link

If that is a crowdstrike alert (no idea how I though of this ahem ahem ahem cough cough) then it's not related to this specific path, there's a DCOM operation in the raw eam2 telemetry (splunk events) with a GUID pointing to one specific operation which touches the VSS services. they (CS) generate a bunch of FP these days with that. their web UI is really confusing and does not show anywhere this critical piece of information, you have to dig down int the splunk telemetry data.
also, we're hiring.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
more info More information required new wtfbin
Projects
None yet
Development

No branches or pull requests

3 participants