Analysis
-
max time kernel
145s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 20:04
Static task
static1
Behavioral task
behavioral1
Sample
9a449e54a16c70a8a7858f24a075e180578ed56cf7b06e132748f5f2814ed4ec.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
9a449e54a16c70a8a7858f24a075e180578ed56cf7b06e132748f5f2814ed4ec.exe
Resource
win10v2004-20230915-en
General
-
Target
9a449e54a16c70a8a7858f24a075e180578ed56cf7b06e132748f5f2814ed4ec.exe
-
Size
198KB
-
MD5
783663acd0f5b57a54917898feb3192f
-
SHA1
c146f3168379a9b2c11bd73dbcdd035f1888e78d
-
SHA256
9a449e54a16c70a8a7858f24a075e180578ed56cf7b06e132748f5f2814ed4ec
-
SHA512
6e32f0703730bd1e7034cd4c6f2959a2e973a32ce314ddccc6f0f9a3177ed09e78b62f2f081aeeeca0518772714c29939e344152c22e7f21274988d327f6cbd5
-
SSDEEP
6144:rBs27MMLyX5HXXXDTXXXOGqIII+pXXX5AYjKXXXDoXXXG6XXXxXXXLIIIEAkOCOm:rK20HXXX/XXXFqIIIcXXX5j2XXXcXXXP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2088 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3060 jaohost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\jaohost.exe 9a449e54a16c70a8a7858f24a075e180578ed56cf7b06e132748f5f2814ed4ec.exe File opened for modification C:\Windows\Debug\jaohost.exe 9a449e54a16c70a8a7858f24a075e180578ed56cf7b06e132748f5f2814ed4ec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 jaohost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz jaohost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2204 9a449e54a16c70a8a7858f24a075e180578ed56cf7b06e132748f5f2814ed4ec.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2088 2204 9a449e54a16c70a8a7858f24a075e180578ed56cf7b06e132748f5f2814ed4ec.exe 29 PID 2204 wrote to memory of 2088 2204 9a449e54a16c70a8a7858f24a075e180578ed56cf7b06e132748f5f2814ed4ec.exe 29 PID 2204 wrote to memory of 2088 2204 9a449e54a16c70a8a7858f24a075e180578ed56cf7b06e132748f5f2814ed4ec.exe 29 PID 2204 wrote to memory of 2088 2204 9a449e54a16c70a8a7858f24a075e180578ed56cf7b06e132748f5f2814ed4ec.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a449e54a16c70a8a7858f24a075e180578ed56cf7b06e132748f5f2814ed4ec.exe"C:\Users\Admin\AppData\Local\Temp\9a449e54a16c70a8a7858f24a075e180578ed56cf7b06e132748f5f2814ed4ec.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\9A449E~1.EXE > nul2⤵
- Deletes itself
PID:2088
-
-
C:\Windows\Debug\jaohost.exeC:\Windows\Debug\jaohost.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:3060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD57a09a716b35757b4d75d2cb072267971
SHA17a6402a2054e7a7588461b66dd318a5dd6d68433
SHA256ba061009cd016e9923fb479b656e4f3e1472af5528607bdea379c8c31a5fa656
SHA512c6c65699abaeebb82bec182d0fddbca3143d2659f040301aa989fc1f6d8b66765e79f25d1a3d34667fd2f54ac2369efa8e6f6d2efaad45ce77380c1c5606519e