Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 19:41
Static task
static1
Behavioral task
behavioral1
Sample
38c46c3e40ba20545caa2d07dde62eb0.jad
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
38c46c3e40ba20545caa2d07dde62eb0.jad
Resource
win10v2004-20231215-en
General
-
Target
38c46c3e40ba20545caa2d07dde62eb0.jad
-
Size
73KB
-
MD5
38c46c3e40ba20545caa2d07dde62eb0
-
SHA1
26029f6b89677f3875d05e95933a93d2eb9162b9
-
SHA256
ea7b698eb7e2c7245f322eb2168459b2a8a97c72dd1fc904560642e2c4a02739
-
SHA512
a1e2dd728af259490a46de7dc3f0a4e6090a1a8afa2e67682288474f91baadf85a3a44bd730731952149d47e8db1500881e8123ce9269fbae4fa0d4678e3df68
-
SSDEEP
1536:EHmKjUoJ1vC3QHsYlctwyXGtW2insgvrGoZFGtW2insgvrGoZw6:/EUozGQHXSTXZsArG4ZsArGL6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\jad_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\.jad rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\.jad\ = "jad_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\jad_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\jad_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\jad_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\jad_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\jad_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2692 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2692 AcroRd32.exe 2692 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2708 2212 cmd.exe 29 PID 2212 wrote to memory of 2708 2212 cmd.exe 29 PID 2212 wrote to memory of 2708 2212 cmd.exe 29 PID 2708 wrote to memory of 2692 2708 rundll32.exe 30 PID 2708 wrote to memory of 2692 2708 rundll32.exe 30 PID 2708 wrote to memory of 2692 2708 rundll32.exe 30 PID 2708 wrote to memory of 2692 2708 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\38c46c3e40ba20545caa2d07dde62eb0.jad1⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\38c46c3e40ba20545caa2d07dde62eb0.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\38c46c3e40ba20545caa2d07dde62eb0.jad"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2692
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD54561460e0f52e6293237dbe2aa2e5dd5
SHA1b33e4211ca8ec6a7d5c231bec288dba71e4dc19d
SHA256f4cd8f646df93b994be5d4765cac35bd1dbb55c821e296be3de9844d37a4daca
SHA512cfbcb73442455d627d8150433d9a5fb3c8d9ea44ed3f80699ee92758047aaa6f363096260efe3f1a9e58e5f874b5f6c3dcb9ea78377e4d1c69d106a8d5293d34