Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 19:00
Static task
static1
Behavioral task
behavioral1
Sample
JSON.exe-malware
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
JSON.exe-malware
Resource
win10v2004-20240226-en
General
-
Target
JSON.exe-malware
-
Size
235KB
-
MD5
3a8a5d3252a154bc42a97eccb84b97ce
-
SHA1
20ef9489c85e06ee06ae3108930758c5d634ffbb
-
SHA256
da049d68a0a8723ddebf502f9c991a2f3c76efdf1ca77bb7e977dc98a5686c3a
-
SHA512
cafe307d68a643d6dcf86718a51c18302a126b299f8ed21a6cbd188d3d7abdc5d4b9aeb171958f81561e30ff033f24dcc0e014d451211ed57cbb9cc549fdf4c1
-
SSDEEP
6144:zbDuqJhf1AVSgE29xxspm0n1vuz3T9yvZJT3CqbMrhryfQNRPaCieMjAkvCJv1Vv:Jf1AVSgE29xxspm0n1vuz3T9yvZJT3CB
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe-malware rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe-malware\ = "exe-malware_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\exe-malware_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\exe-malware_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\exe-malware_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\exe-malware_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\exe-malware_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\exe-malware_auto_file\shell\Read\command rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2920 AcroRd32.exe 2920 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2688 2492 cmd.exe 29 PID 2492 wrote to memory of 2688 2492 cmd.exe 29 PID 2492 wrote to memory of 2688 2492 cmd.exe 29 PID 2688 wrote to memory of 2920 2688 rundll32.exe 30 PID 2688 wrote to memory of 2920 2688 rundll32.exe 30 PID 2688 wrote to memory of 2920 2688 rundll32.exe 30 PID 2688 wrote to memory of 2920 2688 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\JSON.exe-malware1⤵
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\JSON.exe-malware2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\JSON.exe-malware"3⤵
- Suspicious use of SetWindowsHookEx
PID:2920
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD547df6db5189581e730379ab179c70687
SHA1a4983d1747cc9546d898c0cf6dde243a3c02e04e
SHA25686a8a9fe5a43f12c9a83add08fac7ccc9f71aebc59464231dc33bc314524c7ca
SHA51248d263d0d5dcddc89d40b5ec18084fb977704898a4d79e65c0dfaf50f72032ce3930e26cf2957e9070d1f02eaae09882018c4bca8a04dcff9a3df609777329f5