Analysis
-
max time kernel
172s -
max time network
175s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 01:06
Static task
static1
Behavioral task
behavioral1
Sample
9b4efc4651d9892025dfa9a918b391faed88bfe10f1a4c98b283827d2d6e8cb2.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
9b4efc4651d9892025dfa9a918b391faed88bfe10f1a4c98b283827d2d6e8cb2.exe
Resource
win10v2004-20230915-en
General
-
Target
9b4efc4651d9892025dfa9a918b391faed88bfe10f1a4c98b283827d2d6e8cb2.exe
-
Size
198KB
-
MD5
0c30b1b723fc8fd4d3423c9f021f36ed
-
SHA1
db87e51f02b91f96296da82f0a5daa49e89bb49f
-
SHA256
9b4efc4651d9892025dfa9a918b391faed88bfe10f1a4c98b283827d2d6e8cb2
-
SHA512
3ade16250fa0f48f265a5233ae95323d11ffe8c4b36378652b25fdddc4078efd784f7b636937921915d63711655b9435ab38b0ebd9e7522de0849aae3d91217a
-
SSDEEP
6144:rBs27MMLyX5HXXXDTXXXOGqIII+pXXX5AYjKXXXDoXXXG6XXXxXXXLIIIEAkOCOO:rK20HXXX/XXXFqIIIcXXX5j2XXXcXXX7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2632 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2124 jaohost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\jaohost.exe 9b4efc4651d9892025dfa9a918b391faed88bfe10f1a4c98b283827d2d6e8cb2.exe File opened for modification C:\Windows\Debug\jaohost.exe 9b4efc4651d9892025dfa9a918b391faed88bfe10f1a4c98b283827d2d6e8cb2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 jaohost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz jaohost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3036 9b4efc4651d9892025dfa9a918b391faed88bfe10f1a4c98b283827d2d6e8cb2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2632 3036 9b4efc4651d9892025dfa9a918b391faed88bfe10f1a4c98b283827d2d6e8cb2.exe 30 PID 3036 wrote to memory of 2632 3036 9b4efc4651d9892025dfa9a918b391faed88bfe10f1a4c98b283827d2d6e8cb2.exe 30 PID 3036 wrote to memory of 2632 3036 9b4efc4651d9892025dfa9a918b391faed88bfe10f1a4c98b283827d2d6e8cb2.exe 30 PID 3036 wrote to memory of 2632 3036 9b4efc4651d9892025dfa9a918b391faed88bfe10f1a4c98b283827d2d6e8cb2.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b4efc4651d9892025dfa9a918b391faed88bfe10f1a4c98b283827d2d6e8cb2.exe"C:\Users\Admin\AppData\Local\Temp\9b4efc4651d9892025dfa9a918b391faed88bfe10f1a4c98b283827d2d6e8cb2.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\9B4EFC~1.EXE > nul2⤵
- Deletes itself
PID:2632
-
-
C:\Windows\Debug\jaohost.exeC:\Windows\Debug\jaohost.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:2124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD56c36df56141222ae7f0087f0bc0654cb
SHA1fceefdb3b95cf5ebbd4fa282a4d6706aad392226
SHA256b64614df83ad2e11fe58e063a6a9db1e98034b66663c258b7bef3baf8acb0ef1
SHA512d19a12037afae63e13ef8dd0fe44dc31c3ef4e667100f4532ac8c5f0afc1c94b7bdd91bddc113dcfa7b2f06041fff7945046a4ab64393507d6d0a774307cc373