Analysis
-
max time kernel
554s -
max time network
557s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-04-2024 15:57
Static task
static1
Behavioral task
behavioral1
Sample
JoltBeacon.dll
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
JoltBeacon.dll
Resource
win10v2004-20240226-en
General
-
Target
JoltBeacon.dll
-
Size
170KB
-
MD5
6a6c11510e1743835c938eb1135d5f8f
-
SHA1
cab05283c7458cb74499772525f1eeb174ae2daa
-
SHA256
89e7621123c613d82aadfe6defded7f2816a7add36a7ef1576c08206c84fc90d
-
SHA512
149c6f5bcf6b05c40e1c040d89586b6d992bbc7c3c23ca24292caa064531f373dee1243249f803fd20abfe53621ec7816d4fdb097cc2ee63bbca209cc993ccd5
-
SSDEEP
3072:WGDjIrSZFEhB2oMk3pXO+4ao8eB4JP5/xemoyUuziq7:WYj3KhWmODB4//xloyUuuq
Malware Config
Signatures
-
Blocklisted process makes network request 36 IoCs
flow pid Process 2 4084 msiexec.exe 12 4084 msiexec.exe 15 4084 msiexec.exe 16 4084 msiexec.exe 17 4084 msiexec.exe 18 4084 msiexec.exe 19 4084 msiexec.exe 20 4084 msiexec.exe 21 4084 msiexec.exe 22 4084 msiexec.exe 23 4084 msiexec.exe 24 4084 msiexec.exe 25 4084 msiexec.exe 26 4084 msiexec.exe 27 4084 msiexec.exe 28 4084 msiexec.exe 29 4084 msiexec.exe 30 4084 msiexec.exe 31 4084 msiexec.exe 32 4084 msiexec.exe 33 4084 msiexec.exe 34 4084 msiexec.exe 35 4084 msiexec.exe 36 4084 msiexec.exe 37 4084 msiexec.exe 38 4084 msiexec.exe 39 4084 msiexec.exe 40 4084 msiexec.exe 41 4084 msiexec.exe 42 4084 msiexec.exe 43 4084 msiexec.exe 44 4084 msiexec.exe 45 4084 msiexec.exe 46 4084 msiexec.exe 47 4084 msiexec.exe 59 4084 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4240 set thread context of 4084 4240 rundll32.exe 76 -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4240 wrote to memory of 4084 4240 rundll32.exe 76 PID 4240 wrote to memory of 4084 4240 rundll32.exe 76
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JoltBeacon.dll,#11⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\System32\msiexec.exe\??\C:\Windows\System32\msiexec.exe2⤵
- Blocklisted process makes network request
PID:4084
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3B
MD58a80554c91d9fca8acb82f023de02f11
SHA15f36b2ea290645ee34d943220a14b54ee5ea5be5
SHA256ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356
SHA512ca4b6defb8adcc010050bc8b1bb8f8092c4928b8a0fba32146abcfb256e4d91672f88ca2cdf6210e754e5b8ac5e23fb023806ccd749ac8b701f79a691f03c87a