Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 17:44
Static task
static1
Behavioral task
behavioral1
Sample
d87c584792750d405ab939ad4db56a70N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d87c584792750d405ab939ad4db56a70N.exe
Resource
win10v2004-20240802-en
General
-
Target
d87c584792750d405ab939ad4db56a70N.exe
-
Size
75KB
-
MD5
d87c584792750d405ab939ad4db56a70
-
SHA1
f13a815a158af471d95cefacc77321dced50ab15
-
SHA256
3172909c1e78a285676e68202502bff165b33af0bc56daa3a056ebea784f7a95
-
SHA512
01d9443e3643ccac42ddd6794dde9982406a4dee47d1830b125cbcec1c5fa770b2930b38231a1e8c022d413fab6face034f50e565ea819a0fbc440446f35920e
-
SSDEEP
768:ZrItKyw5WHXfQmjIiIk9ecAx7pP1EPU96MyXPdtldE9bIIIwjkg:Zr3Z5IfQmv81x7pP1r3yXPdtnyjp
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1044 attrib.exe -
Deletes itself 1 IoCs
pid Process 2532 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2912 jaohost.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\jaohost.exe d87c584792750d405ab939ad4db56a70N.exe File opened for modification C:\Windows\Debug\jaohost.exe d87c584792750d405ab939ad4db56a70N.exe File opened for modification C:\Windows\Debug\jaohost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d87c584792750d405ab939ad4db56a70N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jaohost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz jaohost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 jaohost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1460 d87c584792750d405ab939ad4db56a70N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1460 wrote to memory of 1044 1460 d87c584792750d405ab939ad4db56a70N.exe 30 PID 1460 wrote to memory of 1044 1460 d87c584792750d405ab939ad4db56a70N.exe 30 PID 1460 wrote to memory of 1044 1460 d87c584792750d405ab939ad4db56a70N.exe 30 PID 1460 wrote to memory of 1044 1460 d87c584792750d405ab939ad4db56a70N.exe 30 PID 1460 wrote to memory of 2532 1460 d87c584792750d405ab939ad4db56a70N.exe 33 PID 1460 wrote to memory of 2532 1460 d87c584792750d405ab939ad4db56a70N.exe 33 PID 1460 wrote to memory of 2532 1460 d87c584792750d405ab939ad4db56a70N.exe 33 PID 1460 wrote to memory of 2532 1460 d87c584792750d405ab939ad4db56a70N.exe 33 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1044 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d87c584792750d405ab939ad4db56a70N.exe"C:\Users\Admin\AppData\Local\Temp\d87c584792750d405ab939ad4db56a70N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\jaohost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1044
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\D87C58~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2532
-
-
C:\Windows\Debug\jaohost.exeC:\Windows\Debug\jaohost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD5206f49bdbe923741540c213909fd0438
SHA1d956d6a6bd597a92f1e6b2c0cc283f0a88233672
SHA256f10cd9881f386b86b3f3328ca5940dd23ef6a770ea390ba6ea5653f0869eda68
SHA512b1a47a7f21e152d3da81664fffccf81229d26feb7aaa012b8de7e61a703142b19de5fe96bce1bb12383fafb8dab4e6503ca62fa541fdd4e4347e60e8bef76236