Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 01:08
Static task
static1
Behavioral task
behavioral1
Sample
1f5079fe17e24c6cebe111fc93768db5.jad
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1f5079fe17e24c6cebe111fc93768db5.jad
Resource
win10v2004-20231215-en
General
-
Target
1f5079fe17e24c6cebe111fc93768db5.jad
-
Size
660KB
-
MD5
1f5079fe17e24c6cebe111fc93768db5
-
SHA1
ba4982e222cdb4cc9415a83b4be609d3ed3d84ea
-
SHA256
57dd7460958bec5fd2256b5b627729a0ae2f5ab09ae63800b7e42d26c02242bd
-
SHA512
c2cd494cc377d2a0b8482cf1f81322789865dd8f3e7ca213a3366c60545fba7e10fee34c5992affc11dded81cc1ff657a7beeaa522f9030e02a10f3997861363
-
SSDEEP
12288:jR3PoqaLiVEn+RQjylIbOhU3KdtaDwJWfc1Ct:jJoN
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.jad\ = "jad_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.jad rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2004 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2004 AcroRd32.exe 2004 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2776 2080 cmd.exe 29 PID 2080 wrote to memory of 2776 2080 cmd.exe 29 PID 2080 wrote to memory of 2776 2080 cmd.exe 29 PID 2776 wrote to memory of 2004 2776 rundll32.exe 30 PID 2776 wrote to memory of 2004 2776 rundll32.exe 30 PID 2776 wrote to memory of 2004 2776 rundll32.exe 30 PID 2776 wrote to memory of 2004 2776 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\1f5079fe17e24c6cebe111fc93768db5.jad1⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\1f5079fe17e24c6cebe111fc93768db5.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1f5079fe17e24c6cebe111fc93768db5.jad"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2004
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD507f6dd2fcd95128e4e9f6dbeb65e750a
SHA104fcd653820940f27a9d1068b479f589575ae799
SHA256439afdba14e3fb1e68b1a5f224a5f45397dce80096b0d8b7df48dbd581c9ca12
SHA5125e1bdbb0bcb16896a2171cca7d459ce9bdb34c62e737a277495cb482a2ec5a043bfa2e06bc6069d91a74a3b40c35e48934dcbf9808816fe12256939adca34e0b