Analysis
-
max time kernel
110s -
max time network
93s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 12:25
Static task
static1
Behavioral task
behavioral1
Sample
8b3408dcc91ae969e00b8180dbfd8790N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8b3408dcc91ae969e00b8180dbfd8790N.exe
Resource
win10v2004-20240802-en
General
-
Target
8b3408dcc91ae969e00b8180dbfd8790N.exe
-
Size
66KB
-
MD5
8b3408dcc91ae969e00b8180dbfd8790
-
SHA1
8215572cd6b225a09cbbee4dfed6c7794c46f02a
-
SHA256
a8e8030ed85a5bca1f9f163e5456f15a732fe411dd87fd567a7af393af61b6d4
-
SHA512
9614bdf6b02566b5bb65552cba1b666f502fa6be4f3a4ca79bf1d67facc2d2535698992cc0360653689d8e4784944851f4ed49725462978fe13361d39cb03e34
-
SSDEEP
768:ZrItKyw5WHXfQIhIiIk9ecAaVPD96KyX6t:Zr3Z5IfQIR81ad5yX6t
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1988 attrib.exe -
Deletes itself 1 IoCs
pid Process 2760 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2652 jaohost.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\jaohost.exe 8b3408dcc91ae969e00b8180dbfd8790N.exe File opened for modification C:\Windows\Debug\jaohost.exe 8b3408dcc91ae969e00b8180dbfd8790N.exe File opened for modification C:\Windows\Debug\jaohost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b3408dcc91ae969e00b8180dbfd8790N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jaohost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2084 8b3408dcc91ae969e00b8180dbfd8790N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2084 wrote to memory of 1988 2084 8b3408dcc91ae969e00b8180dbfd8790N.exe 30 PID 2084 wrote to memory of 1988 2084 8b3408dcc91ae969e00b8180dbfd8790N.exe 30 PID 2084 wrote to memory of 1988 2084 8b3408dcc91ae969e00b8180dbfd8790N.exe 30 PID 2084 wrote to memory of 1988 2084 8b3408dcc91ae969e00b8180dbfd8790N.exe 30 PID 2084 wrote to memory of 2760 2084 8b3408dcc91ae969e00b8180dbfd8790N.exe 33 PID 2084 wrote to memory of 2760 2084 8b3408dcc91ae969e00b8180dbfd8790N.exe 33 PID 2084 wrote to memory of 2760 2084 8b3408dcc91ae969e00b8180dbfd8790N.exe 33 PID 2084 wrote to memory of 2760 2084 8b3408dcc91ae969e00b8180dbfd8790N.exe 33 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1988 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b3408dcc91ae969e00b8180dbfd8790N.exe"C:\Users\Admin\AppData\Local\Temp\8b3408dcc91ae969e00b8180dbfd8790N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\jaohost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1988
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\8B3408~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2760
-
-
C:\Windows\Debug\jaohost.exeC:\Windows\Debug\jaohost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD50847c806f7166cd436dfd35c7c0adbd2
SHA147862fa01bf79254bddfd69929ffb39c38c8ad23
SHA256df1237e1560ec67701de97b77f38895b96f1b06041092be5ecbb2898cdbeb312
SHA512fd9526a79c4bbfee3c8f5345344b2d856db834cfc7542500d94880042e49f65991eab513ef4e21bb166083894feced4eb81a07726fe843522134637431f2d817