Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
46s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
19/08/2023, 20:48
Static task
static1
Behavioral task
behavioral1
Sample
JJSploit_7.2.1_x86_en-US.msi
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
JJSploit_7.2.1_x86_en-US.msi
Resource
win10v2004-20230703-en
General
-
Target
JJSploit_7.2.1_x86_en-US.msi
-
Size
5.8MB
-
MD5
4b884c18f4682189708c771c13ad573e
-
SHA1
a74f992bc18c1936671cb38f1a94ce872ee4c687
-
SHA256
e0b2d388d35046a5ce669e753adb96b8d6de670d352ae34fc41eaf79303a3d45
-
SHA512
bc466b11352b4671caad01acb763d763e40a9e9d20eaf3e0f5b7e8d9b5ef939049570ee18e0e08301fc9cb65b9b83997cf9c884c3a0c47ac91fb1baabe980574
-
SSDEEP
98304:Gr5BsITy5d5aaJweCkT8JdpF9aDK1ZcWmZYDpNTENWYbZkON/t1ZolL6r:EOITEaaJv+Jd9aDKUWJinDZol
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2844 MsiExec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe -
Drops file in Program Files directory 23 IoCs
description ioc Process File created C:\Program Files (x86)\JJSploit\resources\luascripts\beesim\autodig.lua msiexec.exe File created C:\Program Files (x86)\JJSploit\Uninstall JJSploit.lnk msiexec.exe File created C:\Program Files (x86)\JJSploit\resources\luascripts\general\multidimensionalcharacter.lua msiexec.exe File created C:\Program Files (x86)\JJSploit\resources\luascripts\animations\jumpland.lua msiexec.exe File created C:\Program Files (x86)\JJSploit\resources\luascripts\general\teleportto.lua msiexec.exe File created C:\Program Files (x86)\JJSploit\resources\luascripts\jailbreak\policeesp.lua msiexec.exe File created C:\Program Files (x86)\JJSploit\resources\luascripts\general\fly.lua msiexec.exe File created C:\Program Files (x86)\JJSploit\resources\luascripts\jailbreak\criminalesp.lua msiexec.exe File created C:\Program Files (x86)\JJSploit\resources\luascripts\jailbreak\walkspeed.lua msiexec.exe File created C:\Program Files (x86)\JJSploit\resources\luascripts\general\noclip.lua msiexec.exe File created C:\Program Files (x86)\JJSploit\resources\luascripts\animations\dab.lua msiexec.exe File created C:\Program Files (x86)\JJSploit\resources\luascripts\animations\walkthrough.lua msiexec.exe File created C:\Program Files (x86)\JJSploit\resources\luascripts\general\chattroll.lua msiexec.exe File created C:\Program Files (x86)\JJSploit\resources\luascripts\animations\levitate.lua msiexec.exe File created C:\Program Files (x86)\JJSploit\resources\luascripts\general\aimbot.lua msiexec.exe File created C:\Program Files (x86)\JJSploit\resources\luascripts\general\tptool.lua msiexec.exe File created C:\Program Files (x86)\JJSploit\resources\luascripts\general\infinitejump.lua msiexec.exe File opened for modification C:\Program Files (x86)\JJSploit\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File created C:\Program Files (x86)\JJSploit\JJSploit.exe msiexec.exe File created C:\Program Files (x86)\JJSploit\resources\luascripts\general\god.lua msiexec.exe File created C:\Program Files (x86)\JJSploit\resources\luascripts\general\magnetizeto.lua msiexec.exe File created C:\Program Files (x86)\JJSploit\resources\luascripts\jailbreak\removewalls.lua msiexec.exe File created C:\Program Files (x86)\JJSploit\resources\luascripts\animations\energizegui.lua msiexec.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\Installer\f76eb1d.msi msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\Installer\f76eb1a.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIEDA9.tmp msiexec.exe File created C:\Windows\Installer\{4FFE0D51-B912-462E-BE69-2B656A9E1AD4}\ProductIcon msiexec.exe File opened for modification C:\Windows\Installer\{4FFE0D51-B912-462E-BE69-2B656A9E1AD4}\ProductIcon msiexec.exe File opened for modification C:\Windows\Installer\f76eb1b.ipi msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Installer\f76eb1a.msi msiexec.exe File created C:\Windows\Installer\f76eb1b.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe -
Modifies registry class 35 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\15D0EFF4219BE264EB96B256A6E9A14D\ProductIcon = "C:\\Windows\\Installer\\{4FFE0D51-B912-462E-BE69-2B656A9E1AD4}\\ProductIcon" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\15D0EFF4219BE264EB96B256A6E9A14D\InstanceType = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\1B5BE67603097495AB20AEE6179D01CA msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\15D0EFF4219BE264EB96B256A6E9A14D\SourceList\Media\1 = ";" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\15D0EFF4219BE264EB96B256A6E9A14D\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\15D0EFF4219BE264EB96B256A6E9A14D\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\15D0EFF4219BE264EB96B256A6E9A14D\Environment = "MainProgram" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\15D0EFF4219BE264EB96B256A6E9A14D msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\15D0EFF4219BE264EB96B256A6E9A14D\Assignment = "1" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\15D0EFF4219BE264EB96B256A6E9A14D msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\15D0EFF4219BE264EB96B256A6E9A14D\External msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\15D0EFF4219BE264EB96B256A6E9A14D\SourceList\PackageName = "JJSploit_7.2.1_x86_en-US.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\15D0EFF4219BE264EB96B256A6E9A14D\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\15D0EFF4219BE264EB96B256A6E9A14D\SourceList\Media msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\1B5BE67603097495AB20AEE6179D01CA msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\15D0EFF4219BE264EB96B256A6E9A14D msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\15D0EFF4219BE264EB96B256A6E9A14D\ShortcutsFeature = "MainProgram" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\15D0EFF4219BE264EB96B256A6E9A14D\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\15D0EFF4219BE264EB96B256A6E9A14D\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Products\15D0EFF4219BE264EB96B256A6E9A14D msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\15D0EFF4219BE264EB96B256A6E9A14D\MainProgram msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Products\15D0EFF4219BE264EB96B256A6E9A14D\SourceList msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\15D0EFF4219BE264EB96B256A6E9A14D\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\15D0EFF4219BE264EB96B256A6E9A14D\SourceList msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\15D0EFF4219BE264EB96B256A6E9A14D\SourceList\Net msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Features\15D0EFF4219BE264EB96B256A6E9A14D msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\15D0EFF4219BE264EB96B256A6E9A14D msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\15D0EFF4219BE264EB96B256A6E9A14D\ProductName = "JJSploit" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\15D0EFF4219BE264EB96B256A6E9A14D\PackageCode = "49609792D6E90464E88BAFB44015DF73" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\15D0EFF4219BE264EB96B256A6E9A14D\Clients = 3a0000000000 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\15D0EFF4219BE264EB96B256A6E9A14D\Language = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\15D0EFF4219BE264EB96B256A6E9A14D\SourceList\Media msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\15D0EFF4219BE264EB96B256A6E9A14D\SourceList\Net msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\15D0EFF4219BE264EB96B256A6E9A14D\Version = "117571585" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\1B5BE67603097495AB20AEE6179D01CA\15D0EFF4219BE264EB96B256A6E9A14D msiexec.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2848 msiexec.exe 2848 msiexec.exe 1792 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2284 msiexec.exe Token: SeIncreaseQuotaPrivilege 2284 msiexec.exe Token: SeRestorePrivilege 2848 msiexec.exe Token: SeTakeOwnershipPrivilege 2848 msiexec.exe Token: SeSecurityPrivilege 2848 msiexec.exe Token: SeCreateTokenPrivilege 2284 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2284 msiexec.exe Token: SeLockMemoryPrivilege 2284 msiexec.exe Token: SeIncreaseQuotaPrivilege 2284 msiexec.exe Token: SeMachineAccountPrivilege 2284 msiexec.exe Token: SeTcbPrivilege 2284 msiexec.exe Token: SeSecurityPrivilege 2284 msiexec.exe Token: SeTakeOwnershipPrivilege 2284 msiexec.exe Token: SeLoadDriverPrivilege 2284 msiexec.exe Token: SeSystemProfilePrivilege 2284 msiexec.exe Token: SeSystemtimePrivilege 2284 msiexec.exe Token: SeProfSingleProcessPrivilege 2284 msiexec.exe Token: SeIncBasePriorityPrivilege 2284 msiexec.exe Token: SeCreatePagefilePrivilege 2284 msiexec.exe Token: SeCreatePermanentPrivilege 2284 msiexec.exe Token: SeBackupPrivilege 2284 msiexec.exe Token: SeRestorePrivilege 2284 msiexec.exe Token: SeShutdownPrivilege 2284 msiexec.exe Token: SeDebugPrivilege 2284 msiexec.exe Token: SeAuditPrivilege 2284 msiexec.exe Token: SeSystemEnvironmentPrivilege 2284 msiexec.exe Token: SeChangeNotifyPrivilege 2284 msiexec.exe Token: SeRemoteShutdownPrivilege 2284 msiexec.exe Token: SeUndockPrivilege 2284 msiexec.exe Token: SeSyncAgentPrivilege 2284 msiexec.exe Token: SeEnableDelegationPrivilege 2284 msiexec.exe Token: SeManageVolumePrivilege 2284 msiexec.exe Token: SeImpersonatePrivilege 2284 msiexec.exe Token: SeCreateGlobalPrivilege 2284 msiexec.exe Token: SeCreateTokenPrivilege 2284 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2284 msiexec.exe Token: SeLockMemoryPrivilege 2284 msiexec.exe Token: SeIncreaseQuotaPrivilege 2284 msiexec.exe Token: SeMachineAccountPrivilege 2284 msiexec.exe Token: SeTcbPrivilege 2284 msiexec.exe Token: SeSecurityPrivilege 2284 msiexec.exe Token: SeTakeOwnershipPrivilege 2284 msiexec.exe Token: SeLoadDriverPrivilege 2284 msiexec.exe Token: SeSystemProfilePrivilege 2284 msiexec.exe Token: SeSystemtimePrivilege 2284 msiexec.exe Token: SeProfSingleProcessPrivilege 2284 msiexec.exe Token: SeIncBasePriorityPrivilege 2284 msiexec.exe Token: SeCreatePagefilePrivilege 2284 msiexec.exe Token: SeCreatePermanentPrivilege 2284 msiexec.exe Token: SeBackupPrivilege 2284 msiexec.exe Token: SeRestorePrivilege 2284 msiexec.exe Token: SeShutdownPrivilege 2284 msiexec.exe Token: SeDebugPrivilege 2284 msiexec.exe Token: SeAuditPrivilege 2284 msiexec.exe Token: SeSystemEnvironmentPrivilege 2284 msiexec.exe Token: SeChangeNotifyPrivilege 2284 msiexec.exe Token: SeRemoteShutdownPrivilege 2284 msiexec.exe Token: SeUndockPrivilege 2284 msiexec.exe Token: SeSyncAgentPrivilege 2284 msiexec.exe Token: SeEnableDelegationPrivilege 2284 msiexec.exe Token: SeManageVolumePrivilege 2284 msiexec.exe Token: SeImpersonatePrivilege 2284 msiexec.exe Token: SeCreateGlobalPrivilege 2284 msiexec.exe Token: SeCreateTokenPrivilege 2284 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2284 msiexec.exe 2284 msiexec.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2844 2848 msiexec.exe 29 PID 2848 wrote to memory of 2844 2848 msiexec.exe 29 PID 2848 wrote to memory of 2844 2848 msiexec.exe 29 PID 2848 wrote to memory of 2844 2848 msiexec.exe 29 PID 2848 wrote to memory of 2844 2848 msiexec.exe 29 PID 2848 wrote to memory of 2844 2848 msiexec.exe 29 PID 2848 wrote to memory of 2844 2848 msiexec.exe 29 PID 2848 wrote to memory of 1792 2848 msiexec.exe 35 PID 2848 wrote to memory of 1792 2848 msiexec.exe 35 PID 2848 wrote to memory of 1792 2848 msiexec.exe 35
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\JJSploit_7.2.1_x86_en-US.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2284
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 858EA47424D0B156A832A70F27F1D4C4 C2⤵
- Loads dropped DLL
PID:2844
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -windowstyle hidden try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 } catch {}; Invoke-WebRequest -Uri "https://go.microsoft.com/fwlink/p/?LinkId=2124703" -OutFile "$env:TEMP\MicrosoftEdgeWebview2Setup.exe" ; Start-Process -FilePath "$env:TEMP\MicrosoftEdgeWebview2Setup.exe" -ArgumentList ('/silent', '/install') -Wait2⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1792
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:312
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005E4" "0000000000000328"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:1488
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:768
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.9MB
MD5325420af7bbb170cc7c94e3cab26c169
SHA1dce685934565878c8fb925a45b1a8ac30dbd482c
SHA25672be69123b64e13408d5c6ff629eea2bb3a8860e522380afa3ba079ff9d179c7
SHA5120a53bf1cf7dd0ad2f95faf9f5ce3867e7a59de3ccdee6b5342d640911c29a918ca8f4e0231fc0e5fa346439b4231ec8973bc7c7d65dccef8b178d52f86296c1e
-
Filesize
2KB
MD5a0a1ea9dd68e2778923305584c7ca8ca
SHA151b7a72d4cad9f9fff1fdd50e55192a29f66280b
SHA256884ebc5ddb12470e53344a7f9ad3cb70f0952d1b7de9a21059d35a854f48b0c6
SHA51287aadf811936e2d4daaf979ecf04a857d338b2f01fedcb0f4700cf6f2622f58c3a965c0bfb7bbb316b1a8d1cfa0bbf66103b4c85f8cfb2911df83371b3f2f5bf
-
Filesize
113KB
MD54fdd16752561cf585fed1506914d73e0
SHA1f00023b9ae3c8ce5b7bb92f25011eaebe6f9d424
SHA256aecd2d2fe766f6d439acc2bbf1346930ecc535012cf5ad7b3273d2875237b7e7
SHA5123695e7eb1e35ec959243a91ab5b4454eb59aeef0f2699aa5de8e03de8fbb89f756a89130526da5c08815408cb700284a17936522ad2cad594c3e6e9d18a3f600
-
Filesize
5.8MB
MD54b884c18f4682189708c771c13ad573e
SHA1a74f992bc18c1936671cb38f1a94ce872ee4c687
SHA256e0b2d388d35046a5ce669e753adb96b8d6de670d352ae34fc41eaf79303a3d45
SHA512bc466b11352b4671caad01acb763d763e40a9e9d20eaf3e0f5b7e8d9b5ef939049570ee18e0e08301fc9cb65b9b83997cf9c884c3a0c47ac91fb1baabe980574
-
Filesize
113KB
MD54fdd16752561cf585fed1506914d73e0
SHA1f00023b9ae3c8ce5b7bb92f25011eaebe6f9d424
SHA256aecd2d2fe766f6d439acc2bbf1346930ecc535012cf5ad7b3273d2875237b7e7
SHA5123695e7eb1e35ec959243a91ab5b4454eb59aeef0f2699aa5de8e03de8fbb89f756a89130526da5c08815408cb700284a17936522ad2cad594c3e6e9d18a3f600