Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-03-2024 23:17
Static task
static1
Behavioral task
behavioral1
Sample
cc818de3efeea02239ba171779d5612b.jad
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc818de3efeea02239ba171779d5612b.jad
Resource
win10v2004-20240226-en
General
-
Target
cc818de3efeea02239ba171779d5612b.jad
-
Size
111KB
-
MD5
cc818de3efeea02239ba171779d5612b
-
SHA1
dbc8654869cd419892dc4a483b21242eedeb2b22
-
SHA256
59b079a0384e4f8436bd86a743b25a7fb60ca7e0a968234810f936502033a3dd
-
SHA512
d17f676849bd9a08b1e77912629c0237515424051232cf069a27544c4cea72146e566dff15d1129942cb83485d84c51edd93a1860374b68d57376e6b7024ec6d
-
SSDEEP
3072:FBZZIgMG+6nfTY7wa6OeNsqinnlyNkIQzUTNY0:zIsnfTwiOqgnnIkIvRY0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\jad_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\jad_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\jad_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.jad rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\jad_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\jad_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.jad\ = "jad_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\jad_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2664 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2664 AcroRd32.exe 2664 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1896 wrote to memory of 3048 1896 cmd.exe 29 PID 1896 wrote to memory of 3048 1896 cmd.exe 29 PID 1896 wrote to memory of 3048 1896 cmd.exe 29 PID 3048 wrote to memory of 2664 3048 rundll32.exe 30 PID 3048 wrote to memory of 2664 3048 rundll32.exe 30 PID 3048 wrote to memory of 2664 3048 rundll32.exe 30 PID 3048 wrote to memory of 2664 3048 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\cc818de3efeea02239ba171779d5612b.jad1⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\cc818de3efeea02239ba171779d5612b.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\cc818de3efeea02239ba171779d5612b.jad"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2664
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5952c534347526a9b3c8862d86d9057f1
SHA19e91b61107c649ff48467c03a2c4c10a245b7438
SHA25641028e86aacd6cc07079db9126cd8740246412863b0f46f37ec670e41538de62
SHA512a6b5deb20ed4c97680ba66ad4cb98d0ae2f2475f121cb7e7b23c72757659065a13573796cc22873a9f1dde6961e664802fae0302ed7cc0e559f5a8c62c767fcb