Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 19:48
Static task
static1
Behavioral task
behavioral1
Sample
392aaae892506500888b5659b9c5a9cd.jad
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
392aaae892506500888b5659b9c5a9cd.jad
Resource
win10v2004-20231215-en
General
-
Target
392aaae892506500888b5659b9c5a9cd.jad
-
Size
216KB
-
MD5
392aaae892506500888b5659b9c5a9cd
-
SHA1
53e1848f8ead1309c2f4d91199ea2903f07c819e
-
SHA256
00778b2e3e51ea8693f3f17000fd2c75bc06b82b23d048541475f8136804b171
-
SHA512
80d5fba98837d3c1feed7bc2b175e7703473fdabf10bc46ba4ba3d809305d919bf013e10100fad3a1efe08e93cf3da4098e87a7446cea1bc5e0dbfdc121665b8
-
SSDEEP
3072:vdipqJc9npbCSdjunSNbPMJ2fJYPBzzJc6tqIbmKgZIVOR+ZfLlyQ9:li0c9npNP9m/nqIbmKgZIooZzYq
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\jad_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.jad\ = "jad_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\jad_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\jad_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\jad_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\jad_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.jad rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\jad_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2352 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2352 AcroRd32.exe 2352 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2364 1960 cmd.exe 17 PID 1960 wrote to memory of 2364 1960 cmd.exe 17 PID 1960 wrote to memory of 2364 1960 cmd.exe 17 PID 2364 wrote to memory of 2352 2364 rundll32.exe 30 PID 2364 wrote to memory of 2352 2364 rundll32.exe 30 PID 2364 wrote to memory of 2352 2364 rundll32.exe 30 PID 2364 wrote to memory of 2352 2364 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\392aaae892506500888b5659b9c5a9cd.jad1⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\392aaae892506500888b5659b9c5a9cd.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\392aaae892506500888b5659b9c5a9cd.jad"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2352
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58caf076e0d3809e1947ccdcf6d5808a4
SHA1b7b383f4077ed0682c911bc679cbe6eac343c1a3
SHA2566a6defa9b0321aa381f188326c37314e6566b6462f0a84a8a523e22fa5aa5da6
SHA512a3000f85e66ecf93f400fafbef5d3a9baa52682a92a3a881c72d46a19b58b170ceee870e74065c973e3ac8e863b0ba94093debb4ba6b95e693841c79a66268ff