Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 20:42
Static task
static1
Behavioral task
behavioral1
Sample
11a31c2df2c1cf7e66252e71051e92ae.jad
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
11a31c2df2c1cf7e66252e71051e92ae.jad
Resource
win10v2004-20231222-en
General
-
Target
11a31c2df2c1cf7e66252e71051e92ae.jad
-
Size
68KB
-
MD5
11a31c2df2c1cf7e66252e71051e92ae
-
SHA1
adf8468f99a876d69628e1e2eb378c0d5f768f76
-
SHA256
7e0e7b6abc479cd164ab05e990444c2d9f3ea43d92153d36e822b2eeb45fbc4c
-
SHA512
6f8263c2007fe70569e484bbdf1be389cab43c91c57bd7479abaf15f9d7f8a0109ab02c34ba0bc33543918237bda90a13b64583a02eae20d6a2eeb2f3e7b92be
-
SSDEEP
1536:EjUcFC+MEcNwy7GtW2insgvrGoZNGtW2insgvrGoZW:EjUctoz7ZsArG8ZsArGp
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.jad\ = "jad_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.jad rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2648 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2648 AcroRd32.exe 2648 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2716 2372 cmd.exe 16 PID 2372 wrote to memory of 2716 2372 cmd.exe 16 PID 2372 wrote to memory of 2716 2372 cmd.exe 16 PID 2716 wrote to memory of 2648 2716 rundll32.exe 30 PID 2716 wrote to memory of 2648 2716 rundll32.exe 30 PID 2716 wrote to memory of 2648 2716 rundll32.exe 30 PID 2716 wrote to memory of 2648 2716 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\11a31c2df2c1cf7e66252e71051e92ae.jad1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\11a31c2df2c1cf7e66252e71051e92ae.jad"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2648
-
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\11a31c2df2c1cf7e66252e71051e92ae.jad1⤵
- Suspicious use of WriteProcessMemory
PID:2372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b2c6a6094fcc532e1aa76ba30750be74
SHA1a57fd3d6175cb0d564316d6c6a547332c4e51012
SHA25602d8d37977e7a01168e3ba8c374d3260fbe3fbbfd6f6fb87c9daaa691dfb68e6
SHA512de3458dc518e2e73fa1e89e9d70e8e1abc75d46d7e19bae0b62b237e6bc957069a75b85b7b3ade9aa063da83592daf6d06250c8da8dedc62fbfab4982893d7b9