Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 07:47

General

  • Target

    0ff7ecfd4f3b5517b2d42f20ee89ffae.jad

  • Size

    830KB

  • MD5

    0ff7ecfd4f3b5517b2d42f20ee89ffae

  • SHA1

    c5148b693de20d7e11f71577756938006c76502d

  • SHA256

    52a3a17e0e105ca28add2f455658a6f5e6313d052c5a71976a6c967e961dd094

  • SHA512

    d3051b793ed8edb08827be56adeea405ed27a2f40a55d2eaf403d058091102512d71f3381bc6b734d105320b10c36fb68a12074b9b8502e8d9d35a2120a00c0d

  • SSDEEP

    12288:5iKNAMiUbzM3tB3Gk5Wtqv6I8zyMpPrDlWrjk5t3jVi20cZ6dNfAffDi8vElAZ:0UbzsB3Gt+6/yGXck5RjgcZ6d+fx6AZ

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\0ff7ecfd4f3b5517b2d42f20ee89ffae.jad
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\0ff7ecfd4f3b5517b2d42f20ee89ffae.jad
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0ff7ecfd4f3b5517b2d42f20ee89ffae.jad"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    4b9ef3c92e76531e0ee903d38ea4fab0

    SHA1

    80b10390254421bb6c8e0d59c9568cdcc82f693f

    SHA256

    b6c9226bc50420d3e5955ce749613ce1a2b32829aef8951f26cca9e561d4c618

    SHA512

    eb3519437b036047091f77d340b2a4c2bb17d0fd273103de7946135e2fc970ed4161e8aa336ed13da48acc86aeb850a8002c40af2d06dc790dd5479f652712c9