Analysis
-
max time kernel
126s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 04:53
Static task
static1
Behavioral task
behavioral1
Sample
28f642a20c5c715e1fc96ca7f1d976b1.jad
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
28f642a20c5c715e1fc96ca7f1d976b1.jad
Resource
win10v2004-20231215-en
General
-
Target
28f642a20c5c715e1fc96ca7f1d976b1.jad
-
Size
366KB
-
MD5
28f642a20c5c715e1fc96ca7f1d976b1
-
SHA1
b612873177906b21032344db7ad03105135a245e
-
SHA256
c535695270c110792b6e1fdf313a9fd5d955ab5807372d157b434f05d743128c
-
SHA512
1010201bc715f16a7a90c6366814e510e56b73b0eff534cae0fc9aa3adcf1464d0bce1777f6de7dda96807658c576cc0d93afeb8f78d4b50514b94b851ab1aa1
-
SSDEEP
6144:Pbe8RI2w98lJOcS1S0BwB8IoRnfti8t7eZwXePIsXLTYfDEo89uhNGjsGx:TcM1lxEftJReieDXLMfDnMu4sU
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.jad rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\jad_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\jad_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\jad_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.jad\ = "jad_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\jad_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\jad_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\jad_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2540 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2540 AcroRd32.exe 2540 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2704 2180 cmd.exe 29 PID 2180 wrote to memory of 2704 2180 cmd.exe 29 PID 2180 wrote to memory of 2704 2180 cmd.exe 29 PID 2704 wrote to memory of 2540 2704 rundll32.exe 31 PID 2704 wrote to memory of 2540 2704 rundll32.exe 31 PID 2704 wrote to memory of 2540 2704 rundll32.exe 31 PID 2704 wrote to memory of 2540 2704 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\28f642a20c5c715e1fc96ca7f1d976b1.jad1⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\28f642a20c5c715e1fc96ca7f1d976b1.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\28f642a20c5c715e1fc96ca7f1d976b1.jad"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2540
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e8caecb3d11a4c4d2a1f44dececa7e23
SHA19b49952da7f4a6fa357c13b98bcb9411895430f3
SHA256ae1ca0740782867b94b749351f85e257acf908fea47e195b4e8b53da350608d7
SHA5126f9848c34119c017151fa24f7f02db0bb60b4860c098eb65302c00ed21d376102ae6d8d53de95288b38f2c11d0dc6bc3fd682c8bad8c6fcf77fcb063fca83cc0