Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 20:36
Behavioral task
behavioral1
Sample
3f51defddcc6ccf6cd1bc06fc9a1f3fc5b0236e6f87f868f95eca3612eae2c5a.exe
Resource
win7-20240221-en
General
-
Target
3f51defddcc6ccf6cd1bc06fc9a1f3fc5b0236e6f87f868f95eca3612eae2c5a.exe
-
Size
57KB
-
MD5
f535c20df83f112e7c049d6f32e958e2
-
SHA1
6ceccecabebfe757a04b312557d21261dd8e9bec
-
SHA256
3f51defddcc6ccf6cd1bc06fc9a1f3fc5b0236e6f87f868f95eca3612eae2c5a
-
SHA512
7a6246fef5fe59b83bc5384c131c673c03a945270439123d0f2b73d838c3cb17d552820ca2e13a5efb2e6ddd405f2479dd3f5ed72f63955552a233e21ddc33b9
-
SSDEEP
768:mrItKyw5WHXfQmjIiIk9ecAaU896KyXmuJrjTg+5lPulv:mr3Z5IfQmv81aU85yXmIjTg42
Malware Config
Signatures
-
Detects Windows executables referencing non-Windows User-Agents 4 IoCs
resource yara_rule behavioral2/memory/1252-0-0x0000000000400000-0x0000000000414000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/files/0x000800000002334c-4.dat INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1252-5-0x0000000000400000-0x0000000000414000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/3160-6-0x0000000000400000-0x0000000000414000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
UPX dump on OEP (original entry point) 4 IoCs
resource yara_rule behavioral2/memory/1252-0-0x0000000000400000-0x0000000000414000-memory.dmp UPX behavioral2/files/0x000800000002334c-4.dat UPX behavioral2/memory/1252-5-0x0000000000400000-0x0000000000414000-memory.dmp UPX behavioral2/memory/3160-6-0x0000000000400000-0x0000000000414000-memory.dmp UPX -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 380 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-553605503-2331009851-2137262461-1000\Control Panel\International\Geo\Nation 3f51defddcc6ccf6cd1bc06fc9a1f3fc5b0236e6f87f868f95eca3612eae2c5a.exe -
Executes dropped EXE 1 IoCs
pid Process 3160 jqahost.exe -
resource yara_rule behavioral2/memory/1252-0-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/files/0x000800000002334c-4.dat upx behavioral2/memory/1252-5-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3160-6-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\jqahost.exe 3f51defddcc6ccf6cd1bc06fc9a1f3fc5b0236e6f87f868f95eca3612eae2c5a.exe File opened for modification C:\Windows\Debug\jqahost.exe 3f51defddcc6ccf6cd1bc06fc9a1f3fc5b0236e6f87f868f95eca3612eae2c5a.exe File opened for modification C:\Windows\Debug\jqahost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1252 3f51defddcc6ccf6cd1bc06fc9a1f3fc5b0236e6f87f868f95eca3612eae2c5a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1252 wrote to memory of 380 1252 3f51defddcc6ccf6cd1bc06fc9a1f3fc5b0236e6f87f868f95eca3612eae2c5a.exe 82 PID 1252 wrote to memory of 380 1252 3f51defddcc6ccf6cd1bc06fc9a1f3fc5b0236e6f87f868f95eca3612eae2c5a.exe 82 PID 1252 wrote to memory of 380 1252 3f51defddcc6ccf6cd1bc06fc9a1f3fc5b0236e6f87f868f95eca3612eae2c5a.exe 82 PID 1252 wrote to memory of 4756 1252 3f51defddcc6ccf6cd1bc06fc9a1f3fc5b0236e6f87f868f95eca3612eae2c5a.exe 86 PID 1252 wrote to memory of 4756 1252 3f51defddcc6ccf6cd1bc06fc9a1f3fc5b0236e6f87f868f95eca3612eae2c5a.exe 86 PID 1252 wrote to memory of 4756 1252 3f51defddcc6ccf6cd1bc06fc9a1f3fc5b0236e6f87f868f95eca3612eae2c5a.exe 86 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 380 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f51defddcc6ccf6cd1bc06fc9a1f3fc5b0236e6f87f868f95eca3612eae2c5a.exe"C:\Users\Admin\AppData\Local\Temp\3f51defddcc6ccf6cd1bc06fc9a1f3fc5b0236e6f87f868f95eca3612eae2c5a.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\jqahost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:380
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\3F51DE~1.EXE > nul2⤵PID:4756
-
-
C:\Windows\Debug\jqahost.exeC:\Windows\Debug\jqahost.exe1⤵
- Executes dropped EXE
PID:3160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD5139bdb3a7232afef7064fe9809cdf5ca
SHA162b02ac0d9ed8e6cc4f10f05c4780db8a089469b
SHA2562e70684afb10fc449725c5ba4be2d10b9df2ef6a6c9d71796ed6d81bca8dfdc1
SHA5124674dfbdd82535eabb650d57dc14691ce3920b9e45ea1613bfa6c7edd4429ace2042072698e34a4174c3cbe56d3d9eb55ce89ac141e61f31176c3913d81e66e3