Analysis

  • max time kernel
    41s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    08-07-2023 23:49

General

  • Target

    Jagevod.exe

  • Size

    1.0MB

  • MD5

    b57310fe4ef9bc46048a7071bd093aeb

  • SHA1

    778c56c107b0ea9cc5bc4f65081bb00c9b1acd91

  • SHA256

    773828acf9dff953d04d7c99a95c7dec0972fca55f271729a0693963e0eac1b9

  • SHA512

    f765f1444545301605bf9d865f0dd388c9e6e795c6a9ec11fe54e261ac2680f30e38f6a44eb3dabdd4cb8deb780a13e5ab0e11594bf49e0073effdb5b819326f

  • SSDEEP

    24576:B47j3JbmYUPFt2fFTZf8mWSgS55miP6UaEGIilo2egEa870iBh:BUMY+Ft2f9Zf8mWSg45mydjGIilo2sa+

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Jagevod.exe
    "C:\Users\Admin\AppData\Local\Temp\Jagevod.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2316

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2316-54-0x00000000047C0000-0x00000000047D0000-memory.dmp

    Filesize

    64KB

  • memory/2316-55-0x0000000004680000-0x0000000004681000-memory.dmp

    Filesize

    4KB