Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 03:28
Static task
static1
Behavioral task
behavioral1
Sample
26607182708f0d40b90568727e4def26.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
26607182708f0d40b90568727e4def26.exe
Resource
win10v2004-20231215-en
General
-
Target
26607182708f0d40b90568727e4def26.exe
-
Size
240KB
-
MD5
26607182708f0d40b90568727e4def26
-
SHA1
2f28d204ed97eb11aef2ca6bf6413892f26f6d49
-
SHA256
19c149d633702c96a7154c2d175c5af4b0934d87c43aeb6fde15159979e75589
-
SHA512
1e0340bba627aee9ddd2004c692908290b4b98b6069d28426c4919cc667611d8b267a97787e7bab00c895d46fb55b4325eb628d55191b1788fd4ed5dcf335319
-
SSDEEP
6144:ZU343dwqsNwemAB0EqxF6snji81RUinKchhyNSQ:IidQQJs0
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 26607182708f0d40b90568727e4def26.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jaidif.exe -
Executes dropped EXE 1 IoCs
pid Process 2808 jaidif.exe -
Loads dropped DLL 2 IoCs
pid Process 2364 26607182708f0d40b90568727e4def26.exe 2364 26607182708f0d40b90568727e4def26.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaidif = "C:\\Users\\Admin\\jaidif.exe /l" jaidif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaidif = "C:\\Users\\Admin\\jaidif.exe /h" jaidif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaidif = "C:\\Users\\Admin\\jaidif.exe /f" jaidif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaidif = "C:\\Users\\Admin\\jaidif.exe /t" jaidif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaidif = "C:\\Users\\Admin\\jaidif.exe /s" jaidif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaidif = "C:\\Users\\Admin\\jaidif.exe /q" jaidif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaidif = "C:\\Users\\Admin\\jaidif.exe /a" jaidif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaidif = "C:\\Users\\Admin\\jaidif.exe /d" jaidif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaidif = "C:\\Users\\Admin\\jaidif.exe /r" jaidif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaidif = "C:\\Users\\Admin\\jaidif.exe /e" jaidif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaidif = "C:\\Users\\Admin\\jaidif.exe /w" jaidif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaidif = "C:\\Users\\Admin\\jaidif.exe /v" jaidif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaidif = "C:\\Users\\Admin\\jaidif.exe /g" jaidif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaidif = "C:\\Users\\Admin\\jaidif.exe /j" jaidif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaidif = "C:\\Users\\Admin\\jaidif.exe /b" jaidif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaidif = "C:\\Users\\Admin\\jaidif.exe /p" jaidif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaidif = "C:\\Users\\Admin\\jaidif.exe /y" jaidif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaidif = "C:\\Users\\Admin\\jaidif.exe /n" jaidif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaidif = "C:\\Users\\Admin\\jaidif.exe /k" jaidif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaidif = "C:\\Users\\Admin\\jaidif.exe /m" jaidif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaidif = "C:\\Users\\Admin\\jaidif.exe /i" jaidif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaidif = "C:\\Users\\Admin\\jaidif.exe /z" jaidif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaidif = "C:\\Users\\Admin\\jaidif.exe /o" jaidif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaidif = "C:\\Users\\Admin\\jaidif.exe /x" 26607182708f0d40b90568727e4def26.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaidif = "C:\\Users\\Admin\\jaidif.exe /c" jaidif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaidif = "C:\\Users\\Admin\\jaidif.exe /u" jaidif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaidif = "C:\\Users\\Admin\\jaidif.exe /x" jaidif.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2364 26607182708f0d40b90568727e4def26.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe 2808 jaidif.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2364 26607182708f0d40b90568727e4def26.exe 2808 jaidif.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2808 2364 26607182708f0d40b90568727e4def26.exe 28 PID 2364 wrote to memory of 2808 2364 26607182708f0d40b90568727e4def26.exe 28 PID 2364 wrote to memory of 2808 2364 26607182708f0d40b90568727e4def26.exe 28 PID 2364 wrote to memory of 2808 2364 26607182708f0d40b90568727e4def26.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\26607182708f0d40b90568727e4def26.exe"C:\Users\Admin\AppData\Local\Temp\26607182708f0d40b90568727e4def26.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\jaidif.exe"C:\Users\Admin\jaidif.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD504cf3a90ed94c590497798c4e76f2aad
SHA1f2e35e2bc7df9b74dd85fbe4cf0d9bec896f91ee
SHA25668918a3dec80195b9e5ae0a19b29f12c16bf5f9a248d35dfc57a8c1aa06f3f5a
SHA51223f876ad9b9c6ecd5fecd09b7c2d3649c8a6db39fe823ab4be445bdf43961b001785cc9405873d5b387eebeae0dcb373279e0e3bf46005d8c5e6c6fe86c35925
-
Filesize
240KB
MD53fddf5ebba95fabae8b5c0ee01725097
SHA1c5b0b631a7eb73e6071bdd561129965f3da49857
SHA256c38ae0ae37b814c4aa4eb84ee638a3612e8528ce2b7d8c965c5ef56bb8d3b365
SHA5122e0261edc7288aa29be24c8f30a1b752b3092dbe1dc6056bd48bd5c0be2735e37fbbc2a02aa2493835ffa5d3725fcfeba37f240bb2a05ec8e72dfcde7109ff9e
-
Filesize
137KB
MD5bbe2e3078f9ab2511dc6e777a1bb7310
SHA13061e233b043704f70e23c275444350fbe470a56
SHA256d7b2dfa4709bcfacd1da3472415ede14a8a7c4065d75c6b607e2f7c630f0e8a0
SHA5129749938553084528ba84a62311b94ca84d96450cac484efea9f0c621c8183948956827ff57319eb6da04a79b794eda033359330f4336d9578d6941ddc06a51aa