Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 06:18
Static task
static1
Behavioral task
behavioral1
Sample
2b7adedb48f9761a5168d10706a03e90.jad
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2b7adedb48f9761a5168d10706a03e90.jad
Resource
win10v2004-20231222-en
General
-
Target
2b7adedb48f9761a5168d10706a03e90.jad
-
Size
83KB
-
MD5
2b7adedb48f9761a5168d10706a03e90
-
SHA1
7fd16e1d668941e53cd180f33ea45b0f1a99872f
-
SHA256
0f555d9cdd5924325bcf4158cc6aa842e370891c97ae2d375fb7fcbea1cef675
-
SHA512
9c1d4018b742fde0f6efe50fe1ddc5ced647db0db9110914e761108a4f1311693562f96aaa044f666b355eca3afbbe290d24ac809caefa4b88b230e40f1c2d99
-
SSDEEP
1536:aUxpX2stC06URF36zeZYEpzYodXyX6Z0Tyqw7xPuT64GE7QnBJYdJRqjJFYnrHpZ:FxpX2WB6IpzYOyPeT7xeGtBJYH6YnrH3
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\jad_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\.jad rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\.jad\ = "jad_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\jad_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\jad_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\jad_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\jad_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\jad_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2772 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2772 AcroRd32.exe 2772 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2804 2848 cmd.exe 29 PID 2848 wrote to memory of 2804 2848 cmd.exe 29 PID 2848 wrote to memory of 2804 2848 cmd.exe 29 PID 2804 wrote to memory of 2772 2804 rundll32.exe 30 PID 2804 wrote to memory of 2772 2804 rundll32.exe 30 PID 2804 wrote to memory of 2772 2804 rundll32.exe 30 PID 2804 wrote to memory of 2772 2804 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\2b7adedb48f9761a5168d10706a03e90.jad1⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\2b7adedb48f9761a5168d10706a03e90.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\2b7adedb48f9761a5168d10706a03e90.jad"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2772
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5fc39aebe7eb3dd8a5f6f4b199abb9c7f
SHA104792c16bb9a458c746f904fdb5bff0cd9312fae
SHA25694bdb5bebde933efc5592e7b38d98223342a1689de478a288b008adf6b4797c4
SHA512b9434604a7bf5bc10ec7d81f4924da996d42a340ec87dd5cc6b8f023f221e633b40d1eed68da4f432f63edbfe69c637ce3111c2cc2cd56c366cbcf932b9fec41