Analysis
-
max time kernel
142s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10-10-2023 20:46
Static task
static1
Behavioral task
behavioral1
Sample
452efcec0b6b70452260e644945af75631ecd9d8388b27651a452c9fdf383fea.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
452efcec0b6b70452260e644945af75631ecd9d8388b27651a452c9fdf383fea.exe
Resource
win10v2004-20230915-en
General
-
Target
452efcec0b6b70452260e644945af75631ecd9d8388b27651a452c9fdf383fea.exe
-
Size
199KB
-
MD5
9d6159b75fb264b9a9e5b07c4927f09d
-
SHA1
e1aefbc9440b62fc12be300c7ca28beea77df7e3
-
SHA256
452efcec0b6b70452260e644945af75631ecd9d8388b27651a452c9fdf383fea
-
SHA512
c9171b1073af112843d57d72ec99b9ced110a7e5c8b4b5ce477e23559565e665ef929be0b2fe7135073097928a89bd1487c81e022eb03a2079180b329e24f529
-
SSDEEP
6144:rBs27MMLyX5HXXXDTXXXOGqIII+pXXX5AYjKXXXDoXXXG6XXXxXXXLIIIEAkOCOb:rK20HXXX/XXXFqIIIcXXX5j2XXXcXXXm
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2748 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2212 jaohost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\jaohost.exe 452efcec0b6b70452260e644945af75631ecd9d8388b27651a452c9fdf383fea.exe File opened for modification C:\Windows\Debug\jaohost.exe 452efcec0b6b70452260e644945af75631ecd9d8388b27651a452c9fdf383fea.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 jaohost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz jaohost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1900 452efcec0b6b70452260e644945af75631ecd9d8388b27651a452c9fdf383fea.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2748 1900 452efcec0b6b70452260e644945af75631ecd9d8388b27651a452c9fdf383fea.exe 29 PID 1900 wrote to memory of 2748 1900 452efcec0b6b70452260e644945af75631ecd9d8388b27651a452c9fdf383fea.exe 29 PID 1900 wrote to memory of 2748 1900 452efcec0b6b70452260e644945af75631ecd9d8388b27651a452c9fdf383fea.exe 29 PID 1900 wrote to memory of 2748 1900 452efcec0b6b70452260e644945af75631ecd9d8388b27651a452c9fdf383fea.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\452efcec0b6b70452260e644945af75631ecd9d8388b27651a452c9fdf383fea.exe"C:\Users\Admin\AppData\Local\Temp\452efcec0b6b70452260e644945af75631ecd9d8388b27651a452c9fdf383fea.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\452EFC~1.EXE > nul2⤵
- Deletes itself
PID:2748
-
-
C:\Windows\Debug\jaohost.exeC:\Windows\Debug\jaohost.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:2212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
199KB
MD5e409a4ee410a30790e0e27d22fe9e0b8
SHA115157fc1bb84697b529bcb17c6ae754c7c543672
SHA2568022da89e42bd94334a6bd3350f451be77eb9e363821c34fcf180b7dccb34fbf
SHA5126af5dbd1c89e75a60f4321390e699d240342b4edec1b7f186f8abed19b85910ddbaf30dc95c070db88f60be1df108475426a2e25b22ed74773230b5420ce68c9
-
Filesize
199KB
MD5e409a4ee410a30790e0e27d22fe9e0b8
SHA115157fc1bb84697b529bcb17c6ae754c7c543672
SHA2568022da89e42bd94334a6bd3350f451be77eb9e363821c34fcf180b7dccb34fbf
SHA5126af5dbd1c89e75a60f4321390e699d240342b4edec1b7f186f8abed19b85910ddbaf30dc95c070db88f60be1df108475426a2e25b22ed74773230b5420ce68c9