Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 21:59
Static task
static1
Behavioral task
behavioral1
Sample
14300d9399d7c67a3a7bfbf3758f03ea.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
14300d9399d7c67a3a7bfbf3758f03ea.exe
Resource
win10v2004-20231215-en
General
-
Target
14300d9399d7c67a3a7bfbf3758f03ea.exe
-
Size
320KB
-
MD5
14300d9399d7c67a3a7bfbf3758f03ea
-
SHA1
99a2310a77862e66e7f5d8dde0a5ee9d26054c0f
-
SHA256
17c2e3336403b39a18a887a11a6a359e26695ff9b741563e4cee85dd6c4d4e8a
-
SHA512
2531e8ed82f3096aaaf87f8eeef0451954a7a6dd109b7d8e30e705d95d0f811318c8520c9617eff77f3dbbf7d17abe472eb92097ff896389a191d658451eccd3
-
SSDEEP
6144:ChIcFeEK/fObT/bGibErxUyF+fmYYdPMAaiSnD:ChIcFeEK/fObT/bGiPo+eYYt/LSnD
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 14300d9399d7c67a3a7bfbf3758f03ea.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jaaci.exe -
Executes dropped EXE 1 IoCs
pid Process 1092 jaaci.exe -
Loads dropped DLL 2 IoCs
pid Process 1716 14300d9399d7c67a3a7bfbf3758f03ea.exe 1716 14300d9399d7c67a3a7bfbf3758f03ea.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /I" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /x" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /A" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /q" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /k" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /p" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /S" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /O" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /C" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /v" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /H" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /L" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /V" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /r" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /W" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /n" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /B" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /U" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /Y" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /E" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /j" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /P" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /J" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /R" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /e" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /K" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /M" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /N" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /u" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /g" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /s" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /F" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /f" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /h" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /b" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /d" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /c" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /D" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /l" 14300d9399d7c67a3a7bfbf3758f03ea.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /t" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /X" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /Q" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /a" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /T" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /l" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /z" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /G" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /y" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /i" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /w" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /Z" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /o" jaaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaaci = "C:\\Users\\Admin\\jaaci.exe /m" jaaci.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1716 14300d9399d7c67a3a7bfbf3758f03ea.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe 1092 jaaci.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1716 14300d9399d7c67a3a7bfbf3758f03ea.exe 1092 jaaci.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1716 wrote to memory of 1092 1716 14300d9399d7c67a3a7bfbf3758f03ea.exe 28 PID 1716 wrote to memory of 1092 1716 14300d9399d7c67a3a7bfbf3758f03ea.exe 28 PID 1716 wrote to memory of 1092 1716 14300d9399d7c67a3a7bfbf3758f03ea.exe 28 PID 1716 wrote to memory of 1092 1716 14300d9399d7c67a3a7bfbf3758f03ea.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\14300d9399d7c67a3a7bfbf3758f03ea.exe"C:\Users\Admin\AppData\Local\Temp\14300d9399d7c67a3a7bfbf3758f03ea.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\jaaci.exe"C:\Users\Admin\jaaci.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
275KB
MD576dc6d9f07fe6786911067312b521c8c
SHA1c0886a74e51a2516b5fc7b8bdbac5b3ec794cb89
SHA256129ed24afebb6a62ec45184e53993656c979d9bbac3250f88602a8c5aed58ed2
SHA512e6c4b25537977946396aa48a49c15da9cc1fc202660d132e290971646212c78783460202641c3971ee870e11328287e0ab06167485d461975409dd628b59e8a1
-
Filesize
320KB
MD5ff68b54f91c441383c8edc206d34f968
SHA1e40af0ea5444e8bd44914ad16cf6db208493ddfe
SHA256d01927756732b5859dab8c4def1444148ca24699497295ddf210b972d1992705
SHA51219f06a8edc3a33714543a78274fd78940731178ab80c101ef3b4be385e4c9c7ceec7b70d195722df206c2a3ac6a9fca148288f0bffec913d8ef4e1708d21f1ad