Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 03:01
Static task
static1
Behavioral task
behavioral1
Sample
6005a146de106a3bd5cce4a1980e5650N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6005a146de106a3bd5cce4a1980e5650N.exe
Resource
win10v2004-20240709-en
General
-
Target
6005a146de106a3bd5cce4a1980e5650N.exe
-
Size
63KB
-
MD5
6005a146de106a3bd5cce4a1980e5650
-
SHA1
49ca8661752c9b40ae3099d6f51fcf96e6fc162b
-
SHA256
46bf873406ef28e96eab03e783ff68b1a45c0e512c200706eb27a338d4f1458f
-
SHA512
f516ec5eba9c0c1eb7a2aa045decaf83178f8630f568d1395ed730d1526e7c332b0fd0081b1f3f90167b12dea32794fee5ac8273562f6e49a4e1bd2aa5f55190
-
SSDEEP
768:OrItKyw5WHXfQmjIiIk9ecAa6cMb964yXhDLdr:Or3Z5IfQmv81awvyX5Zr
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2176 attrib.exe -
Deletes itself 1 IoCs
pid Process 2768 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2292 jaohost.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\jaohost.exe 6005a146de106a3bd5cce4a1980e5650N.exe File opened for modification C:\Windows\Debug\jaohost.exe 6005a146de106a3bd5cce4a1980e5650N.exe File opened for modification C:\Windows\Debug\jaohost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6005a146de106a3bd5cce4a1980e5650N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jaohost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2072 6005a146de106a3bd5cce4a1980e5650N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2176 2072 6005a146de106a3bd5cce4a1980e5650N.exe 30 PID 2072 wrote to memory of 2176 2072 6005a146de106a3bd5cce4a1980e5650N.exe 30 PID 2072 wrote to memory of 2176 2072 6005a146de106a3bd5cce4a1980e5650N.exe 30 PID 2072 wrote to memory of 2176 2072 6005a146de106a3bd5cce4a1980e5650N.exe 30 PID 2072 wrote to memory of 2768 2072 6005a146de106a3bd5cce4a1980e5650N.exe 33 PID 2072 wrote to memory of 2768 2072 6005a146de106a3bd5cce4a1980e5650N.exe 33 PID 2072 wrote to memory of 2768 2072 6005a146de106a3bd5cce4a1980e5650N.exe 33 PID 2072 wrote to memory of 2768 2072 6005a146de106a3bd5cce4a1980e5650N.exe 33 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2176 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6005a146de106a3bd5cce4a1980e5650N.exe"C:\Users\Admin\AppData\Local\Temp\6005a146de106a3bd5cce4a1980e5650N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\jaohost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2176
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\6005A1~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2768
-
-
C:\Windows\Debug\jaohost.exeC:\Windows\Debug\jaohost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD52f8ccda174b41b87cf108b69d7395049
SHA1e867754a65ac6bdc2c157493c80fefe3e5686838
SHA2564b72203b3eeabafecc60e5358f7e4ce193feccb9f082df61c6f41519a38c6d86
SHA512215bc7debbbfa1c06d02128c47154bb5499d805da3b0506cc7e7155f7e276f5ba10b5077450fecf8e13239682745e489fdca242e41067820a4d8fe8ce5b5711f