Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
28/10/2023, 18:03
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.1978093d098dafaa49c4fe49218b7a50.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.1978093d098dafaa49c4fe49218b7a50.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.1978093d098dafaa49c4fe49218b7a50.exe
-
Size
473KB
-
MD5
1978093d098dafaa49c4fe49218b7a50
-
SHA1
d56298d42d3d2a23c3112e1eb6305cf9cff9dd9f
-
SHA256
ffa7cbcfdc97c1bd2b043123d12dfb38754f93e4c9d6ec8d7bbdc8edc555f612
-
SHA512
6c618955be4a4bce11958a986b1b7f9eb9e11ec35cea663aab7432df36047c247b7878c43ba9dc554877a2ad5203147e6237fb4c45fea0d12f22341764c049a2
-
SSDEEP
1536:ur3Z5IfQmv81a1xyXHZ+NGQSLNmCm6oyz7jBd7qDmbNPMJAVC+++f:yJOfQm01mxyXHZKG7pm6j77X
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2236 attrib.exe -
Deletes itself 1 IoCs
pid Process 2700 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2856 jaohost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\jaohost.exe NEAS.1978093d098dafaa49c4fe49218b7a50.exe File opened for modification C:\Windows\Debug\jaohost.exe NEAS.1978093d098dafaa49c4fe49218b7a50.exe File opened for modification C:\Windows\Debug\jaohost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2224 NEAS.1978093d098dafaa49c4fe49218b7a50.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2236 2224 NEAS.1978093d098dafaa49c4fe49218b7a50.exe 28 PID 2224 wrote to memory of 2236 2224 NEAS.1978093d098dafaa49c4fe49218b7a50.exe 28 PID 2224 wrote to memory of 2236 2224 NEAS.1978093d098dafaa49c4fe49218b7a50.exe 28 PID 2224 wrote to memory of 2236 2224 NEAS.1978093d098dafaa49c4fe49218b7a50.exe 28 PID 2224 wrote to memory of 2700 2224 NEAS.1978093d098dafaa49c4fe49218b7a50.exe 31 PID 2224 wrote to memory of 2700 2224 NEAS.1978093d098dafaa49c4fe49218b7a50.exe 31 PID 2224 wrote to memory of 2700 2224 NEAS.1978093d098dafaa49c4fe49218b7a50.exe 31 PID 2224 wrote to memory of 2700 2224 NEAS.1978093d098dafaa49c4fe49218b7a50.exe 31 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2236 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.1978093d098dafaa49c4fe49218b7a50.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.1978093d098dafaa49c4fe49218b7a50.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\jaohost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:2236
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\NEAS19~1.EXE > nul2⤵
- Deletes itself
PID:2700
-
-
C:\Windows\Debug\jaohost.exeC:\Windows\Debug\jaohost.exe1⤵
- Executes dropped EXE
PID:2856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
473KB
MD5720f045796cdc4d751b13e19b63d7a95
SHA10bf29bf8b93b801ec85f45f7771b73c3b41bf7ee
SHA2561beaeb6da391736b3d98fb6a853c0da834529e9ada079182590124f90a3fc7e4
SHA512fd99fb0bfcbd7bd3c56b41c31e72cbb2549df4b52126983b2a9bf6a142992aca8cc0cc708e5502cf87f07953712cd4a0c00c6e89adb79dac1ee3550ec7b5e956
-
Filesize
473KB
MD5720f045796cdc4d751b13e19b63d7a95
SHA10bf29bf8b93b801ec85f45f7771b73c3b41bf7ee
SHA2561beaeb6da391736b3d98fb6a853c0da834529e9ada079182590124f90a3fc7e4
SHA512fd99fb0bfcbd7bd3c56b41c31e72cbb2549df4b52126983b2a9bf6a142992aca8cc0cc708e5502cf87f07953712cd4a0c00c6e89adb79dac1ee3550ec7b5e956