Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 12:27
Static task
static1
Behavioral task
behavioral1
Sample
1e4d4c2e9ba9465d5c65ad99e467a565.jad
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1e4d4c2e9ba9465d5c65ad99e467a565.jad
Resource
win10v2004-20231215-en
General
-
Target
1e4d4c2e9ba9465d5c65ad99e467a565.jad
-
Size
62KB
-
MD5
1e4d4c2e9ba9465d5c65ad99e467a565
-
SHA1
a09b729e9a7a999b0c3ac191e1bd763b6bcbef68
-
SHA256
57327aab311e25a58f0c71cfc837b6b7b9644531aa42d943a844da47acdbf48e
-
SHA512
5203469d771b75ac73e59b5dc3d7cc48056c042b9dda92b1fb3f037095cb81075bdc1341084b68702e1e2d828b629011c607db338e391c78e5c3169e0ab74b1d
-
SSDEEP
1536:BKjedtiZG3UfRjdAahAWVZaEJ3v1ZdjEVCDoobyqd8jGX:BKjaIZG3UJjdAEZaERNEC38jE
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\jad_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\jad_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\jad_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\jad_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\.jad rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\.jad\ = "jad_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\jad_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\jad_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2716 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2716 AcroRd32.exe 2716 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2032 wrote to memory of 3064 2032 cmd.exe 29 PID 2032 wrote to memory of 3064 2032 cmd.exe 29 PID 2032 wrote to memory of 3064 2032 cmd.exe 29 PID 3064 wrote to memory of 2716 3064 rundll32.exe 30 PID 3064 wrote to memory of 2716 3064 rundll32.exe 30 PID 3064 wrote to memory of 2716 3064 rundll32.exe 30 PID 3064 wrote to memory of 2716 3064 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\1e4d4c2e9ba9465d5c65ad99e467a565.jad1⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\1e4d4c2e9ba9465d5c65ad99e467a565.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1e4d4c2e9ba9465d5c65ad99e467a565.jad"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2716
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD57fd006b2a6a2af4e95fb7861f2a388ba
SHA1b23df9b8fbe29f822c723c5ce584d35897e3bf70
SHA256780b8bd09f68720a0c0aeaf6e37f241a9b0a85a81c57ced834fc891a5ecc06f0
SHA51201ed3a1618c1120e470907a6f7d7ccc2d56998a9986511847a7f09d53f11a5f108867b1f31b2a938cc263e52b0358ba9d98c62c2dfd063e7c0c8e18bfb25a16f