Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 07:36
Static task
static1
Behavioral task
behavioral1
Sample
0f419239d517915b2e7210af73f89bdc.jad
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0f419239d517915b2e7210af73f89bdc.jad
Resource
win10v2004-20231215-en
General
-
Target
0f419239d517915b2e7210af73f89bdc.jad
-
Size
38KB
-
MD5
0f419239d517915b2e7210af73f89bdc
-
SHA1
87ec31718a1c2bb1410e2bb6a0ceb354e3a44792
-
SHA256
39ad3c55d9bb5b88af00b13fff416fe5f2b396a1c3e539ce2f11c14ac429a99b
-
SHA512
323658070000b48503eec4b60f87888f9a31f5a3e9fc1c01c2bfe7a42d829d7b57591998800c893ee8bcbdeb65ddadb962d03c6963d71cad92e658cc46deeb1a
-
SSDEEP
768:KeVSY9TMQMhHGWJDWrAJ890hMIt+i+0tk4utwlJNEtQXa35zCkFg:hVSqTMsQJ8mhki+8utwl6QXnk+
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\jad_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\.jad\ = "jad_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\jad_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\jad_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\.jad rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\jad_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\jad_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\jad_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2828 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2828 AcroRd32.exe 2828 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2724 2852 cmd.exe 29 PID 2852 wrote to memory of 2724 2852 cmd.exe 29 PID 2852 wrote to memory of 2724 2852 cmd.exe 29 PID 2724 wrote to memory of 2828 2724 rundll32.exe 30 PID 2724 wrote to memory of 2828 2724 rundll32.exe 30 PID 2724 wrote to memory of 2828 2724 rundll32.exe 30 PID 2724 wrote to memory of 2828 2724 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\0f419239d517915b2e7210af73f89bdc.jad1⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\0f419239d517915b2e7210af73f89bdc.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0f419239d517915b2e7210af73f89bdc.jad"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c2e12daae344da2835312717cbee4187
SHA1c03c0977ab61cd4f30dada016eddc3dd691ffdd5
SHA2565cc9c0b7d5acf14bb1e163b17255aaea98380e30a784004dd2ab66fc8681ca30
SHA512ae10ca0d60c5edf7e04a10c6ea46f8d534e77a44b2a55b653e1dd924ae0f7883bab9474e8649c2274096b7052b130de7cad9088f7138dbf8c1b99eb12aa208a4