Analysis

  • max time kernel
    172s
  • max time network
    175s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2023, 01:06

General

  • Target

    9b4efc4651d9892025dfa9a918b391faed88bfe10f1a4c98b283827d2d6e8cb2.exe

  • Size

    198KB

  • MD5

    0c30b1b723fc8fd4d3423c9f021f36ed

  • SHA1

    db87e51f02b91f96296da82f0a5daa49e89bb49f

  • SHA256

    9b4efc4651d9892025dfa9a918b391faed88bfe10f1a4c98b283827d2d6e8cb2

  • SHA512

    3ade16250fa0f48f265a5233ae95323d11ffe8c4b36378652b25fdddc4078efd784f7b636937921915d63711655b9435ab38b0ebd9e7522de0849aae3d91217a

  • SSDEEP

    6144:rBs27MMLyX5HXXXDTXXXOGqIII+pXXX5AYjKXXXDoXXXG6XXXxXXXLIIIEAkOCOO:rK20HXXX/XXXFqIIIcXXX5j2XXXcXXX7

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b4efc4651d9892025dfa9a918b391faed88bfe10f1a4c98b283827d2d6e8cb2.exe
    "C:\Users\Admin\AppData\Local\Temp\9b4efc4651d9892025dfa9a918b391faed88bfe10f1a4c98b283827d2d6e8cb2.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\9B4EFC~1.EXE > nul
      2⤵
      • Deletes itself
      PID:2632
  • C:\Windows\Debug\jaohost.exe
    C:\Windows\Debug\jaohost.exe
    1⤵
    • Executes dropped EXE
    • Checks processor information in registry
    PID:2124

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\debug\jaohost.exe

          Filesize

          198KB

          MD5

          6c36df56141222ae7f0087f0bc0654cb

          SHA1

          fceefdb3b95cf5ebbd4fa282a4d6706aad392226

          SHA256

          b64614df83ad2e11fe58e063a6a9db1e98034b66663c258b7bef3baf8acb0ef1

          SHA512

          d19a12037afae63e13ef8dd0fe44dc31c3ef4e667100f4532ac8c5f0afc1c94b7bdd91bddc113dcfa7b2f06041fff7945046a4ab64393507d6d0a774307cc373