Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 03:28

General

  • Target

    26607182708f0d40b90568727e4def26.exe

  • Size

    240KB

  • MD5

    26607182708f0d40b90568727e4def26

  • SHA1

    2f28d204ed97eb11aef2ca6bf6413892f26f6d49

  • SHA256

    19c149d633702c96a7154c2d175c5af4b0934d87c43aeb6fde15159979e75589

  • SHA512

    1e0340bba627aee9ddd2004c692908290b4b98b6069d28426c4919cc667611d8b267a97787e7bab00c895d46fb55b4325eb628d55191b1788fd4ed5dcf335319

  • SSDEEP

    6144:ZU343dwqsNwemAB0EqxF6snji81RUinKchhyNSQ:IidQQJs0

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26607182708f0d40b90568727e4def26.exe
    "C:\Users\Admin\AppData\Local\Temp\26607182708f0d40b90568727e4def26.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Users\Admin\jaidif.exe
      "C:\Users\Admin\jaidif.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\jaidif.exe

    Filesize

    85KB

    MD5

    04cf3a90ed94c590497798c4e76f2aad

    SHA1

    f2e35e2bc7df9b74dd85fbe4cf0d9bec896f91ee

    SHA256

    68918a3dec80195b9e5ae0a19b29f12c16bf5f9a248d35dfc57a8c1aa06f3f5a

    SHA512

    23f876ad9b9c6ecd5fecd09b7c2d3649c8a6db39fe823ab4be445bdf43961b001785cc9405873d5b387eebeae0dcb373279e0e3bf46005d8c5e6c6fe86c35925

  • C:\Users\Admin\jaidif.exe

    Filesize

    240KB

    MD5

    3fddf5ebba95fabae8b5c0ee01725097

    SHA1

    c5b0b631a7eb73e6071bdd561129965f3da49857

    SHA256

    c38ae0ae37b814c4aa4eb84ee638a3612e8528ce2b7d8c965c5ef56bb8d3b365

    SHA512

    2e0261edc7288aa29be24c8f30a1b752b3092dbe1dc6056bd48bd5c0be2735e37fbbc2a02aa2493835ffa5d3725fcfeba37f240bb2a05ec8e72dfcde7109ff9e

  • \Users\Admin\jaidif.exe

    Filesize

    137KB

    MD5

    bbe2e3078f9ab2511dc6e777a1bb7310

    SHA1

    3061e233b043704f70e23c275444350fbe470a56

    SHA256

    d7b2dfa4709bcfacd1da3472415ede14a8a7c4065d75c6b607e2f7c630f0e8a0

    SHA512

    9749938553084528ba84a62311b94ca84d96450cac484efea9f0c621c8183948956827ff57319eb6da04a79b794eda033359330f4336d9578d6941ddc06a51aa