Analysis
-
max time kernel
155s -
max time network
62s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 04:59
Static task
static1
Behavioral task
behavioral1
Sample
563653658d7b70d1c00129e9433ec2fc.jad
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
563653658d7b70d1c00129e9433ec2fc.jad
Resource
win10v2004-20231215-en
General
-
Target
563653658d7b70d1c00129e9433ec2fc.jad
-
Size
282KB
-
MD5
563653658d7b70d1c00129e9433ec2fc
-
SHA1
806848f9051b92d388ab476c3a586977b84340e1
-
SHA256
6809bb9bfa9c8ccc122a5cd06acdbbc9f245cc987f8e9246dbfb5f912d9632d9
-
SHA512
c1a74ee8c4f9401bae4dbb1a906def70b9ececc003e691678c56dfeb79956332737b8c1bfc018a82dd2a0f32f2c067f36091beae5eaf20329dea473bd4b2dda2
-
SSDEEP
6144:D47xFDZO11CsDvigYggnk5QdL0UOYbCUE67N5:07BJsTigY5k0XOYbdE67L
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\jad_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\.jad rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\jad_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\jad_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\jad_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\jad_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\.jad\ = "jad_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\jad_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1652 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1652 AcroRd32.exe 1652 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2572 wrote to memory of 2584 2572 cmd.exe 30 PID 2572 wrote to memory of 2584 2572 cmd.exe 30 PID 2572 wrote to memory of 2584 2572 cmd.exe 30 PID 2584 wrote to memory of 1652 2584 rundll32.exe 31 PID 2584 wrote to memory of 1652 2584 rundll32.exe 31 PID 2584 wrote to memory of 1652 2584 rundll32.exe 31 PID 2584 wrote to memory of 1652 2584 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\563653658d7b70d1c00129e9433ec2fc.jad1⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\563653658d7b70d1c00129e9433ec2fc.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\563653658d7b70d1c00129e9433ec2fc.jad"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1652
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58d5dd784eb30d9e2b2442b81acb5b2c0
SHA1b2fb2a67772c7a1106dae649971b8f166b4f6704
SHA2566114527a6ab1f451f6b749d59615062713a9980501b7ee216564c5e39383d5a2
SHA5120b09ae747f76c645c7b544468a18c9ac3d9d692068ba760dacfc2b057f53cd6dcb395774f860931f828a639df3e1614e2a93d506983dd0471fdc1cb2e23e9447