Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20-07-2024 03:54
Behavioral task
behavioral1
Sample
46f0a706173f256cbe158d9ea7a3f510N.exe
Resource
win7-20240705-en
General
-
Target
46f0a706173f256cbe158d9ea7a3f510N.exe
-
Size
75KB
-
MD5
46f0a706173f256cbe158d9ea7a3f510
-
SHA1
33e59d81596646f1d4faa4ce660579041bcc2244
-
SHA256
ec19333b5f6e7c2768074af6f34239f59ddba604275a413418168016c85ca0a1
-
SHA512
0429340182ccafd613d257b37768e287507721d6f83398a8766f35abe6b04992897c038cdc56d00820d0e354bb14ee32c506357ebaa0a3b9bfa7a2f84bd06b9c
-
SSDEEP
1536:8AAbhIP83LNnouy88zJHNWnnn3CCCCrrDRNxUUUmBDdddd4:87hEUL1out8zdID1K
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2540 attrib.exe -
Deletes itself 1 IoCs
pid Process 2052 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2580 jaohost.exe -
resource yara_rule behavioral1/memory/1908-0-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/files/0x00090000000120fa-4.dat upx behavioral1/memory/2580-5-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/1908-7-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/2580-8-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/2580-14-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/2580-17-0x0000000000400000-0x0000000000415000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\jaohost.exe 46f0a706173f256cbe158d9ea7a3f510N.exe File opened for modification C:\Windows\Debug\jaohost.exe 46f0a706173f256cbe158d9ea7a3f510N.exe File opened for modification C:\Windows\Debug\jaohost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 jaohost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz jaohost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1908 46f0a706173f256cbe158d9ea7a3f510N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2540 1908 46f0a706173f256cbe158d9ea7a3f510N.exe 30 PID 1908 wrote to memory of 2540 1908 46f0a706173f256cbe158d9ea7a3f510N.exe 30 PID 1908 wrote to memory of 2540 1908 46f0a706173f256cbe158d9ea7a3f510N.exe 30 PID 1908 wrote to memory of 2540 1908 46f0a706173f256cbe158d9ea7a3f510N.exe 30 PID 1908 wrote to memory of 2052 1908 46f0a706173f256cbe158d9ea7a3f510N.exe 33 PID 1908 wrote to memory of 2052 1908 46f0a706173f256cbe158d9ea7a3f510N.exe 33 PID 1908 wrote to memory of 2052 1908 46f0a706173f256cbe158d9ea7a3f510N.exe 33 PID 1908 wrote to memory of 2052 1908 46f0a706173f256cbe158d9ea7a3f510N.exe 33 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2540 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\46f0a706173f256cbe158d9ea7a3f510N.exe"C:\Users\Admin\AppData\Local\Temp\46f0a706173f256cbe158d9ea7a3f510N.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\jaohost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:2540
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\46F0A7~1.EXE > nul2⤵
- Deletes itself
PID:2052
-
-
C:\Windows\Debug\jaohost.exeC:\Windows\Debug\jaohost.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:2580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD58fb29e5b7257bea1fd3bbbe47bf4bea0
SHA138bbdc49c2eeb0185300f5bf5dd77326d6c9597c
SHA256a925d45338afa7e45b3bb2c57d96e4b335ad83a3f398efd170e20e13a1c01515
SHA512f70656df3f74f8703dba1e17aedb3a98ba60377a4f9f4bab3768b9493dfef753a3b0baf9f46e7a93ae724dc56f621d43ea78884039dd24f70d6ad26e150e5adf