Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 12:31
Static task
static1
Behavioral task
behavioral1
Sample
1e9157515be4e20c1bcef1f052d6297a.jad
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1e9157515be4e20c1bcef1f052d6297a.jad
Resource
win10v2004-20231215-en
General
-
Target
1e9157515be4e20c1bcef1f052d6297a.jad
-
Size
42KB
-
MD5
1e9157515be4e20c1bcef1f052d6297a
-
SHA1
8d9a957b84ae78b2bfe3fde4d9f6de50c37bcea8
-
SHA256
7f1514791e4c61996140c31fbf6c18a10b2e953a4eb7a9e9c2f3c32b6d8797e0
-
SHA512
09e9e2f200c0b1495848366aafc83f46355b2da5c3565da84723e7ddacc4565dc6dd17f1464d546b4675ee6aeefbe110dd3aa4fd668c14daf120252a75c3d0c4
-
SSDEEP
768:EnB20/v4Dav+5U1q5ay6u8ylZO9U/GeIzoZljvaif6IAdxF1nFFeMP56M:wBD/v4QMU8k6zSUueIMZFvX1Ad5nqYX
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\.jad rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\.jad\ = "jad_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\jad_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\jad_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\jad_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\jad_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\jad_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\jad_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2332 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2332 AcroRd32.exe 2332 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 320 wrote to memory of 2808 320 cmd.exe 17 PID 320 wrote to memory of 2808 320 cmd.exe 17 PID 320 wrote to memory of 2808 320 cmd.exe 17 PID 2808 wrote to memory of 2332 2808 rundll32.exe 30 PID 2808 wrote to memory of 2332 2808 rundll32.exe 30 PID 2808 wrote to memory of 2332 2808 rundll32.exe 30 PID 2808 wrote to memory of 2332 2808 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\1e9157515be4e20c1bcef1f052d6297a.jad1⤵
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\1e9157515be4e20c1bcef1f052d6297a.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1e9157515be4e20c1bcef1f052d6297a.jad"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2332
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD56c03da4550b40a78520019eeec25b6e3
SHA13d2ab3f220f25f157ac72495c12fee3ea3124de6
SHA2566fd6273a6de02e725346448e02582df8f5db3525aca3953e5f350a01ab2127cc
SHA51253efd806743ece2666b7f2d339af23d35db4e849e3e67bc82945a6e7724331c0ae9a85585895208a32efbd948a0ec5ddb9a202677ba09d2502961bf767634554