Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 02:14
Static task
static1
Behavioral task
behavioral1
Sample
2422e7651e6ee9a52fbdd009256b69d3.jad
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2422e7651e6ee9a52fbdd009256b69d3.jad
Resource
win10v2004-20231215-en
General
-
Target
2422e7651e6ee9a52fbdd009256b69d3.jad
-
Size
68KB
-
MD5
2422e7651e6ee9a52fbdd009256b69d3
-
SHA1
f52c5e1bbe7aeb2d2d1ccfaca490121ad0f60c0c
-
SHA256
6b801322a258690bd3785a4b8bcbfa5bda3383cb7c4e960d4ad30d78aace3afe
-
SHA512
45fcdab5c1bc1c0df5bf635cb4063dea2232d952d7223e6021aae4972f205341d49d76b8c218af3849d176d8d62b24d5e6f7df164b979f5237a3ac54bc3190e9
-
SSDEEP
1536:EjUcFC+MEcMwy7GtW2insgvrGoZNGtW2insgvrGoZn:EjUctog7ZsArG8ZsArGs
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.jad rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.jad\ = "jad_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file\ rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2888 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2888 AcroRd32.exe 2888 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2744 2552 cmd.exe 17 PID 2552 wrote to memory of 2744 2552 cmd.exe 17 PID 2552 wrote to memory of 2744 2552 cmd.exe 17 PID 2744 wrote to memory of 2888 2744 rundll32.exe 30 PID 2744 wrote to memory of 2888 2744 rundll32.exe 30 PID 2744 wrote to memory of 2888 2744 rundll32.exe 30 PID 2744 wrote to memory of 2888 2744 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\2422e7651e6ee9a52fbdd009256b69d3.jad1⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\2422e7651e6ee9a52fbdd009256b69d3.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\2422e7651e6ee9a52fbdd009256b69d3.jad"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2888
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5976e1ddda3e39ec7673263810c7e7780
SHA16ef1b4a68b33e8628169e1e65686c3cd115b101e
SHA2568df7571242eebc4f09b2a196c354cfbab1ab6ce815872f37c327725d757c81c9
SHA51231b03668c6069e205a99130274ca2d75aec66d1fe611118abd07bb471305e0601fc74ce2207f49a0b9f62406c4faa0bb32814e6baea0cd01d171603c849635fe