Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 02:27
Behavioral task
behavioral1
Sample
3a98f49098a5bfbfada3220944312a30N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3a98f49098a5bfbfada3220944312a30N.exe
Resource
win10v2004-20240709-en
General
-
Target
3a98f49098a5bfbfada3220944312a30N.exe
-
Size
63KB
-
MD5
3a98f49098a5bfbfada3220944312a30
-
SHA1
186ccb1e83a6a9f7085f25c0dbee520bb3c3f59f
-
SHA256
dfb6a42dab45fdb3b7d3e0a5951089a40a0151ba89aac9b23ab78b4b2196c495
-
SHA512
91531b1964cd25d8be86dd877f116eaa5af2673b890af3a61a67ad57cfb125fd508049895864606da6fc274fa79fcc2f5f2a38cae12f70ef7a7b43949fd8cd23
-
SSDEEP
1536:fvQoLHjw2iWPKMvw71oLyXQUUqnouy8YXuvooodwwwt111n:fv5Ls27BIJoLyXTUyoutYXCooodwwwth
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2720 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2212 jaohost.exe -
resource yara_rule behavioral1/memory/2824-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x0007000000012119-3.dat upx behavioral1/memory/2212-4-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2824-5-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2212-6-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\jaohost.exe 3a98f49098a5bfbfada3220944312a30N.exe File opened for modification C:\Windows\Debug\jaohost.exe 3a98f49098a5bfbfada3220944312a30N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a98f49098a5bfbfada3220944312a30N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jaohost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 jaohost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz jaohost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2824 3a98f49098a5bfbfada3220944312a30N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2720 2824 3a98f49098a5bfbfada3220944312a30N.exe 31 PID 2824 wrote to memory of 2720 2824 3a98f49098a5bfbfada3220944312a30N.exe 31 PID 2824 wrote to memory of 2720 2824 3a98f49098a5bfbfada3220944312a30N.exe 31 PID 2824 wrote to memory of 2720 2824 3a98f49098a5bfbfada3220944312a30N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a98f49098a5bfbfada3220944312a30N.exe"C:\Users\Admin\AppData\Local\Temp\3a98f49098a5bfbfada3220944312a30N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\3A98F4~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Windows\Debug\jaohost.exeC:\Windows\Debug\jaohost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD51ec34b4fe9a15da33b2fd287a5a888f5
SHA16f89bf34aded990ff856bb53aa80cbf5e4f3d18b
SHA25679df50a360383ea2c09b37b3517f82332d6dcf806ddffcc190ed081bf6b9075f
SHA512ca21d8c0bc44c405ffe93b28c7bec6067f7e1430709c04a8620e42efbd572879147325667d1c97a1ef406291d66e03c97e42ea5cd78f12518ce4ee4bbfd948b1