Analysis
-
max time kernel
167s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 10:40
Static task
static1
Behavioral task
behavioral1
Sample
16371ba9e8a4542e146fd451d17603a3.jad
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
16371ba9e8a4542e146fd451d17603a3.jad
Resource
win10v2004-20231215-en
General
-
Target
16371ba9e8a4542e146fd451d17603a3.jad
-
Size
1.1MB
-
MD5
16371ba9e8a4542e146fd451d17603a3
-
SHA1
28968ee9c5ad195e4352c53fde30cac45fd9b531
-
SHA256
c155358f6d0bdb00958d419777b3dfb1a9ce7ac61d87fb875eb2c67311ca359b
-
SHA512
0a0adf91d9e6717ec0506c9ef8441c80d7628ad45d0ffcac383d15ae8d968b4202cdad37aa010d2bb5173d4ddf8b360982a62b2426276be263700e2823687b59
-
SSDEEP
24576:nzSVkv7Nt8oGkkejy42ueelIiE4V1Q6LOO3nbbGF7DNL:Ukz/8hkrjy01E4pCO3nbbGF7Dd
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\jad_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\jad_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\jad_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\jad_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.jad rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.jad\ = "jad_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\jad_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\jad_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2800 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2800 AcroRd32.exe 2800 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2288 2388 cmd.exe 29 PID 2388 wrote to memory of 2288 2388 cmd.exe 29 PID 2388 wrote to memory of 2288 2388 cmd.exe 29 PID 2288 wrote to memory of 2800 2288 rundll32.exe 31 PID 2288 wrote to memory of 2800 2288 rundll32.exe 31 PID 2288 wrote to memory of 2800 2288 rundll32.exe 31 PID 2288 wrote to memory of 2800 2288 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\16371ba9e8a4542e146fd451d17603a3.jad1⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\16371ba9e8a4542e146fd451d17603a3.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\16371ba9e8a4542e146fd451d17603a3.jad"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2800
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD576fd8dceeb94619a8b94c25c56b26292
SHA165107a974de6a34ee232020a1492031abfc92cbc
SHA256d86fae5a6ddd5fd456980e33264c52d5c2308d3658f3c4b3a534148333a02b16
SHA512b7ae6cfd08f959c4a8a61de7478fdc0d51a6f98c4e98e59dd731e137a7b0ce35f502e948dc030d71a631aff853e91438240f6f953e94f97a4cc8ff642a2db7be