Analysis
-
max time kernel
110s -
max time network
94s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 11:40
Behavioral task
behavioral1
Sample
ba75ccb6b7d7b79f89d9f60d275bf6f0N.exe
Resource
win7-20240708-en
General
-
Target
ba75ccb6b7d7b79f89d9f60d275bf6f0N.exe
-
Size
162KB
-
MD5
ba75ccb6b7d7b79f89d9f60d275bf6f0
-
SHA1
4361b5690cfb24eb566e355a1692838e23b07b22
-
SHA256
215bfcaaedf4640aa020ccde2106a23329019e3654b38d20135c21b1d87fe015
-
SHA512
1c8afd9f56b31a8ef029fa00abcffa386ad9da9385969fe5d45427886f6a89c304f28aa42a127f1eb5703a300aff409fcf1292a1c680fe599446800873ec202b
-
SSDEEP
1536:kVdmQr3Z5IfQmv81aypP1s3yX+tlehTzz:008JOfQm01F9s3yX+fehT3
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2216 attrib.exe -
Deletes itself 1 IoCs
pid Process 2032 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2356 jaohost.exe -
resource yara_rule behavioral1/memory/2120-0-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/files/0x000900000001225f-4.dat upx behavioral1/memory/2356-5-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/memory/2120-6-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/memory/2356-7-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\jaohost.exe ba75ccb6b7d7b79f89d9f60d275bf6f0N.exe File opened for modification C:\Windows\Debug\jaohost.exe ba75ccb6b7d7b79f89d9f60d275bf6f0N.exe File opened for modification C:\Windows\Debug\jaohost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 jaohost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz jaohost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2120 ba75ccb6b7d7b79f89d9f60d275bf6f0N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2216 2120 ba75ccb6b7d7b79f89d9f60d275bf6f0N.exe 30 PID 2120 wrote to memory of 2216 2120 ba75ccb6b7d7b79f89d9f60d275bf6f0N.exe 30 PID 2120 wrote to memory of 2216 2120 ba75ccb6b7d7b79f89d9f60d275bf6f0N.exe 30 PID 2120 wrote to memory of 2216 2120 ba75ccb6b7d7b79f89d9f60d275bf6f0N.exe 30 PID 2120 wrote to memory of 2032 2120 ba75ccb6b7d7b79f89d9f60d275bf6f0N.exe 33 PID 2120 wrote to memory of 2032 2120 ba75ccb6b7d7b79f89d9f60d275bf6f0N.exe 33 PID 2120 wrote to memory of 2032 2120 ba75ccb6b7d7b79f89d9f60d275bf6f0N.exe 33 PID 2120 wrote to memory of 2032 2120 ba75ccb6b7d7b79f89d9f60d275bf6f0N.exe 33 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2216 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba75ccb6b7d7b79f89d9f60d275bf6f0N.exe"C:\Users\Admin\AppData\Local\Temp\ba75ccb6b7d7b79f89d9f60d275bf6f0N.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\jaohost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:2216
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\BA75CC~1.EXE > nul2⤵
- Deletes itself
PID:2032
-
-
C:\Windows\Debug\jaohost.exeC:\Windows\Debug\jaohost.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:2356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
162KB
MD55abccaf6e6674b8225a96105ca722f78
SHA1d4760b00be734a8a3956a27a7823a16677e620d1
SHA256ef22cdf80713df3e12ab234094591ea9e34deca74b2de96704e498c6949d6ad3
SHA512f49ff2c0264e89d761196a18900439dda76f219a135a4f85eaca50a88325223eefa347dbd848dc95aae4a01c54c64a0366016269532da5dee8a18af9434d8310