Analysis

  • max time kernel
    20s
  • max time network
    22s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-04-2024 16:43

General

  • Target

    Jupiter.exe

  • Size

    14.0MB

  • MD5

    4d7fabfec07d2aa0f8776d4d95d3ba7a

  • SHA1

    fd407647a3867815285befe6a3520cb6ea6c849a

  • SHA256

    4531766df77ece29fbaf00b0380ee8449237a52f3f3c5cd674f3f1d5a2f065af

  • SHA512

    e46d1c03f103551b91790ff296ae31ccc9d295d37c378d6c3e5355db54081347df6f6a49f3af3627598c05e7243653d3366a66d91165923c107c4e79e908948d

  • SSDEEP

    393216:zN4r7M5liE1+TtIiFFCuARuATI85XSaumqiPC4:xC7M5lD1QtIGCuADH5Xqiq4

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 31 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 29 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Jupiter.exe
    "C:\Users\Admin\AppData\Local\Temp\Jupiter.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Users\Admin\AppData\Local\Temp\Jupiter.exe
      "C:\Users\Admin\AppData\Local\Temp\Jupiter.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1784
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "ver"
        3⤵
          PID:5020
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4324

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\VCRUNTIME140.dll

      Filesize

      116KB

      MD5

      be8dbe2dc77ebe7f88f910c61aec691a

      SHA1

      a19f08bb2b1c1de5bb61daf9f2304531321e0e40

      SHA256

      4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

      SHA512

      0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\_asyncio.pyd

      Filesize

      63KB

      MD5

      07a6e6dcc30e1c4c7e0cdc41a457a887

      SHA1

      53bc820b63d88cbe889944e242b50662b4b2cb42

      SHA256

      746bc8fa88282afe19dc60e426cc0a75bea3bd137cca06a0b57a30bd31459403

      SHA512

      837f1e40db9bdf1bc73b2a700df6086a3acdb7d52afc903239410b2d226ffd1dd5e8b5f317401bcf58dd042bd56787af6cdc49af96fcb588bcf0127d536b6c6d

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\_bz2.pyd

      Filesize

      82KB

      MD5

      aa1083bde6d21cabfc630a18f51b1926

      SHA1

      e40e61dba19301817a48fd66ceeaade79a934389

      SHA256

      00b8ca9a338d2b47285c9e56d6d893db2a999b47216756f18439997fb80a56e3

      SHA512

      2df0d07065170fee50e0cd6208b0cc7baa3a295813f4ad02bec5315aa2a14b7345da4cdf7cac893da2c7fc21b201062271f655a85ceb51940f0acb99bb6a1d4c

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\_cffi_backend.cp311-win_amd64.pyd

      Filesize

      177KB

      MD5

      fde9a1d6590026a13e81712cd2f23522

      SHA1

      ca99a48caea0dbaccf4485afd959581f014277ed

      SHA256

      16eccc4baf6cf4ab72acd53c72a1f2b04d952e07e385e9050a933e78074a7d5b

      SHA512

      a522661f5c3eeea89a39df8bbb4d23e6428c337aac1d231d32b39005ea8810fce26af18454586e0e94e51ea4ac0e034c88652c1c09b1ed588aeac461766981f4

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\_ctypes.pyd

      Filesize

      121KB

      MD5

      565d011ce1cee4d48e722c7421300090

      SHA1

      9dc300e04e5e0075de4c0205be2e8aae2064ae19

      SHA256

      c148292328f0aab7863af82f54f613961e7cb95b7215f7a81cafaf45bd4c42b7

      SHA512

      5af370884b5f82903fd93b566791a22e5b0cded7f743e6524880ea0c41ee73037b71df0be9f07d3224c733b076bec3be756e7e77f9e7ed5c2dd9505f35b0e4f5

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\_decimal.pyd

      Filesize

      249KB

      MD5

      c88282908ba54510eda3887c488198eb

      SHA1

      94ed1b44f99642b689f5f3824d2e490252936899

      SHA256

      980a63f2b39cf16910f44384398e25f24482346a482addb00de42555b17d4278

      SHA512

      312b081a90a275465787a539e48412d07f1a4c32bab0f3aa024e6e3fe534ac9c07595238d51dc4d6f13c8d03c2441f788dff9fe3d7ca2aad3940609501d273bd

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\_hashlib.pyd

      Filesize

      63KB

      MD5

      b4ff25b1aca23d48897fc616e102e9b6

      SHA1

      8295ee478191eb5f741a5f6a3f4ab4576ceec8d2

      SHA256

      87dd0c858620287454fd6d31d52b6a48eddbb2a08e09e8b2d9fdb0b92200d766

      SHA512

      a7adcf652bc88f8878dae2742a37af75599936d80223e62fe74755d6bafaafd985678595872fb696c715f69a1f963f12e3d52cd3d7e7a83747983b2ee244e8a2

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\_lzma.pyd

      Filesize

      155KB

      MD5

      b86b9f292af12006187ebe6c606a377d

      SHA1

      604224e12514c21ab6db4c285365b0996c7f2139

      SHA256

      f5e01b516c2c23035f7703e23569dec26c5616c05a929b2580ae474a5c6722c5

      SHA512

      d4e97f554d57048b488bf6515c35fddadeb9d101133ee27a449381ebe75ac3556930b05e218473eba5254f3c441436e12f3d0166fb1b1e3cd7b0946d5efab312

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\_multiprocessing.pyd

      Filesize

      33KB

      MD5

      cf0b31f01a95e9f181d87197786b96ca

      SHA1

      6214361452f7eaef5c710719a5cfb6109906975c

      SHA256

      975c1947798e3c39898c86675ca1eb68249f77361f41f172f9800275227213b9

      SHA512

      d56b096780bb263e3f7282f163da02353ed5d8767f964937deaff997156e95749312180f25582d5963d3c351260b8ff196221652e7bf088a8c6a4e766118abd3

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\_overlapped.pyd

      Filesize

      50KB

      MD5

      78e8049e26df6fd3a4011562ff8e74a0

      SHA1

      d5a91c720e4672c40e1dd6d54b3197b4a1f8b633

      SHA256

      ca106e4dfdeafeabf9e98956d3d8d0cb73e109f1a96f1a7e35bc47dbd7c7e164

      SHA512

      ea7a54d38cefed870cee65dd9460b6c51131ae5219933ddc998a86d12bb093784242cb5471c77bc324ccf59fa42c2914865dcf582f74c440fa52b7d15d9faeac

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\_queue.pyd

      Filesize

      31KB

      MD5

      7f52ef40b083f34fd5e723e97b13382f

      SHA1

      626d47df812738f28bc87c7667344b92847fdf6a

      SHA256

      3f8e7e6aa13b417acc78b63434fb1144e6319a010a9fc376c54d6e69b638fe4c

      SHA512

      48f7723a8c039abd6ccb2906fbd310f0cfa170dcbdf89a6437dd02c8f77f20e6c7c402d29b922cdaabd357d3a33e34c3ad826127134f38d77a4d6d9c83371949

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\_socket.pyd

      Filesize

      77KB

      MD5

      b77017baa2004833ef3847a3a3141280

      SHA1

      39666f74bd076015b376fc81250dff89dff4b0a6

      SHA256

      a19e3c7c03ef1b5625790b1c9c42594909311ab6df540fbf43c6aa93300ab166

      SHA512

      6b24d0e038c433b995bd05de7c8fe7dd7b0a11152937c189b8854c95780b0220a9435de0db7ac796a7de11a59c61d56b1aef9a8dbaba62d02325122ceb8b003d

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\_ssl.pyd

      Filesize

      174KB

      MD5

      0f02eccd7933b7a7c2bdedca2a72aab6

      SHA1

      0b4c551d8fe34d8128e5cf97daa19eb4c97db06e

      SHA256

      ba5388d6a6557d431e086734a3323621dc447f63ba299b0a815e5837cf869678

      SHA512

      90a64082dab51380e05c76047ee40e259c719d7170fb4acb247b68a03b710461b350da3821b426fd13167895ded32f9c5ec0e07587ad4125683a18a3495f5ed5

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\_uuid.pyd

      Filesize

      24KB

      MD5

      cc2fc10d528ec8eac403f3955a214d5b

      SHA1

      3eefd8e449532c13ae160aa631fdb0ad8f6f2ea4

      SHA256

      e6aa7f1637e211251c9d6f467203b2b6d85e5bc2d901699f2a55af637fa89250

      SHA512

      bf18089bd0b3a880930827d2035302060ea9db529ad1020879e5be6de42693bd0a01b40270b4e93ceaea3cfed20dad1e2942d983cde8bb2c99159b32209b34bb

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\aiohttp\_helpers.cp311-win_amd64.pyd

      Filesize

      37KB

      MD5

      526a3f976a6b3d947ee5feda49b06b13

      SHA1

      a0cc66b8cc9368085fc1ef245901b93d89ef96d7

      SHA256

      634247428fb072ef5fe9d9cd7bbaee6be01706cbea028dbb5d22436e92593f94

      SHA512

      ec3d80694cde7dbe82c581849e6f0326f8c469000479ae2fb5c2e56516c205e408c7e702eb6d8da3e75bd0d4c01021f43afb9d81ba786414e1034f7d7ab7bbf1

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\aiohttp\_http_parser.cp311-win_amd64.pyd

      Filesize

      211KB

      MD5

      b7f8455a6da42a547b2516a1379be24f

      SHA1

      fec08c12afb80478c93677438a131e987ce1a07c

      SHA256

      fbfdf2265ea8cefb49711c10a4e7500d2ffd8cbd5d6d0337c3a4a089ab4a6100

      SHA512

      188c4bba964f21f533adc9d86c8d2ec5c114e47a9f4f2ed71765fcdb101a53ecbae05660633e788c8469a47721ab8efe7c98844d2ce8072a22db828bde8d02a7

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\aiohttp\_http_writer.cp311-win_amd64.pyd

      Filesize

      34KB

      MD5

      615199313bd1c18b47ccd96c405fc54f

      SHA1

      452815d3b10bc68de24f5ec082fd7ee07ceab6be

      SHA256

      cb20aa328e0bd40ef705447ad21d1bcbbfc3aec875e95343982ae8181b9ee584

      SHA512

      823c3c21296d37e9fc978c3b0a66ed2dca467f33b786dc5e7ffa499b99c4b6786c140ec328be3d09eb85655ec04cc6f3a501a166347a281bffa14699f73aab00

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\aiohttp\_websocket.cp311-win_amd64.pyd

      Filesize

      23KB

      MD5

      c57689dc4d26a7d967df24a637dae014

      SHA1

      7c4633837c09e39d218e6ff54e43a4721b210aff

      SHA256

      9f2a593faa20bdd77d3a5c83912f805baaa72d2e054babf30320dbaaae57eb16

      SHA512

      8e03a76f28d2bb4fcc60800982cb8c6882a1ee0d5af3c2e709d4f9602186cbb723a1373ded8e26b0e69d45346a7967c073bbd1e5cde72aa4e1a9978bdd92f78c

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\base_library.zip

      Filesize

      1.4MB

      MD5

      4b011f052728ae5007f9ec4e97a4f625

      SHA1

      9d940561f08104618ec9e901a9cd0cd13e8b355d

      SHA256

      c88cd8549debc046a980b0be3bf27956ae72dcdcf1a448e55892194752c570e6

      SHA512

      be405d80d78a188a563086809c372c44bcd1ccab5a472d50714f559559795a1df49437c1712e15eb0403917c7f6cfaf872d6bb0c8e4dd67a512c2c4a5ae93055

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\charset_normalizer\md.cp311-win_amd64.pyd

      Filesize

      10KB

      MD5

      28af0ffb49cc20fe5af9fe8efa49d6f1

      SHA1

      2c17057c33382ddffea3ca589018cba04c4e49d7

      SHA256

      f1e26ef5d12c58d652b0b5437c355a14cd66606b2fbc00339497dd00243081e0

      SHA512

      9aa99e17f20a5dd485ae43ac85842bd5270ebab83a49e896975a8fa9f98ffc5f7585bef84ed46ba55f40a25e224f2640e85cebe5acb9087cf46d178ecc8029f0

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\charset_normalizer\md__mypyc.cp311-win_amd64.pyd

      Filesize

      110KB

      MD5

      6cdca2fde9df198da58955397033af98

      SHA1

      e457c97721504d25f43b549d57e4538a62623168

      SHA256

      a4a758eabd1b2b45f3c4699bdfebc98f196dc691c0a3d5407e17fffffafc5df7

      SHA512

      7b3c384ba9993d3192ed852191ff77bdcd3421cbc69ff636c6deb8fe7248e066573b68d80a8f280ae0c1cb015f79967d46d910455d932eaeac072c76d0757e92

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\frozenlist\_frozenlist.cp311-win_amd64.pyd

      Filesize

      76KB

      MD5

      7f06b8ac7734c5d932108b260d545a6d

      SHA1

      63a55be8ebd69918805f0188a3dcae83ed494a54

      SHA256

      173551fdf4514c7995e32652b637c2b08da7b0e0fd4d17392441f48169475d65

      SHA512

      9df9058460e50cb8943d1071abc93851d21aa0efad84419fd08ca384301f9bf98871e45962d991cd8f04ecf9b0d74398a5f56779a12be49fce0c8feb59ec2e93

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\libcrypto-3.dll

      Filesize

      5.0MB

      MD5

      e547cf6d296a88f5b1c352c116df7c0c

      SHA1

      cafa14e0367f7c13ad140fd556f10f320a039783

      SHA256

      05fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de

      SHA512

      9f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\libffi-8.dll

      Filesize

      38KB

      MD5

      0f8e4992ca92baaf54cc0b43aaccce21

      SHA1

      c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

      SHA256

      eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

      SHA512

      6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\libssl-3.dll

      Filesize

      768KB

      MD5

      19a2aba25456181d5fb572d88ac0e73e

      SHA1

      656ca8cdfc9c3a6379536e2027e93408851483db

      SHA256

      2e9fbcd8f7fdc13a5179533239811456554f2b3aa2fb10e1b17be0df81c79006

      SHA512

      df17dc8a882363a6c5a1b78ba3cf448437d1118ccc4a6275cc7681551b13c1a4e0f94e30ffb94c3530b688b62bff1c03e57c2c185a7df2bf3e5737a06e114337

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\multidict\_multidict.cp311-win_amd64.pyd

      Filesize

      45KB

      MD5

      b92f8efb672c383ab60b971b3c6c87de

      SHA1

      acb671089a01d7f1db235719c52e6265da0f708f

      SHA256

      b7376b5d729115a06b1cab60b251df3efc3051ebba31524ea82f0b8db5a49a72

      SHA512

      680663d6c6cd7b9d63160c282f6d38724bd8b8144d15f430b28b417dda0222bfff7afefcb671e863d1b4002b154804b1c8af2d8a28fff11fa94972b207df081b

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\nacl\_sodium.pyd

      Filesize

      340KB

      MD5

      9d1b8bad0e17e63b9d8e441cdc15baee

      SHA1

      0c5a62135b072d1951a9d6806b9eff7aa9c897a3

      SHA256

      d733c23c6a4b21625a4ff07f6562ba882bcbdb0f50826269419d8de0574f88cd

      SHA512

      49e7f6ab825d5047421641ed4618ff6cb2a8d22a8a4ae1bd8f2deefe7987d80c8e0acc72b950d02214f7b41dc4a42df73a7f5742ebc96670d1c5a28c47b97355

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\pyexpat.pyd

      Filesize

      194KB

      MD5

      79561bc9f70383f8ae073802a321adfb

      SHA1

      5f378f47888e5092598c20c56827419d9f480fa7

      SHA256

      c7c7564f7f874fb660a46384980a2cf28bc3e245ca83628a197ccf861eab5560

      SHA512

      476c839f544b730c5b133e2ae08112144cac07b6dfb8332535058f5cbf54ce7ed4a72efb38e6d56007ae755694b05e81e247d0a10210c993376484a057f2217c

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\python3.DLL

      Filesize

      65KB

      MD5

      7e07c63636a01df77cd31cfca9a5c745

      SHA1

      593765bc1729fdca66dd45bbb6ea9fcd882f42a6

      SHA256

      db84bc052cfb121fe4db36242ba5f1d2c031b600ef5d8d752cf25b7c02b6bac6

      SHA512

      8c538625be972481c495c7271398993cfe188e2f0a71d38fb51eb18b62467205fe3944def156d0ff09a145670af375d2fc974c6b18313fa275ce6b420decc729

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\python311.dll

      Filesize

      5.5MB

      MD5

      387bb2c1e40bde1517f06b46313766be

      SHA1

      601f83ef61c7699652dec17edd5a45d6c20786c4

      SHA256

      0817a2a657a24c0d5fbb60df56960f42fc66b3039d522ec952dab83e2d869364

      SHA512

      521cde6eaa5d4a2e0ef6bbfdea50b00750ae022c1c7bd66b20654c035552b49c9d2fac18ef503bbd136a7a307bdeb97f759d45c25228a0bf0c37739b6e897bad

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\select.pyd

      Filesize

      29KB

      MD5

      e4ab524f78a4cf31099b43b35d2faec3

      SHA1

      a9702669ef49b3a043ca5550383826d075167291

      SHA256

      bae0974390945520eb99ab32486c6a964691f8f4a028ac408d98fa8fb0db7d90

      SHA512

      5fccfb3523c87ad5ab2cde4b9c104649c613388bc35b6561517ae573d3324f9191dd53c0f118b9808ba2907440cbc92aecfc77d0512ef81534e970118294cdee

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\unicodedata.pyd

      Filesize

      1.1MB

      MD5

      fd9132f966ee6d214e0076bf0492fb30

      SHA1

      89b95957f002bf382435d015e26962a42032cb97

      SHA256

      37c68617fa02a2cadced17ef724e2d450ef12a8a37215da789a4679fde1c5c02

      SHA512

      e35729abc45e5561aae1fb9e0e7c711dd7d3c1491520aa5c44fcc50c955f549f81d90897959327e930d02a5356afe08d6195adf002c87801a7a11235670639b5

    • C:\Users\Admin\AppData\Local\Temp\_MEI20762\yarl\_quoting_c.cp311-win_amd64.pyd

      Filesize

      65KB

      MD5

      0edc0f96b64523314788745fa2cc7ddd

      SHA1

      555a0423ce66c8b0fa5eea45caac08b317d27d68

      SHA256

      db5b421e09bf2985fbe4ef5cdf39fc16e2ff0bf88534e8ba86c6b8093da6413f

      SHA512

      bb0074169e1bd05691e1e39c2e3c8c5fae3a68c04d851c70028452012bb9cb8d19e49cdff34efb72e962ed0a03d418dfbad34b7c9ad032105cf5acd311c1f713

    • memory/4324-128-0x0000028567170000-0x0000028567171000-memory.dmp

      Filesize

      4KB

    • memory/4324-127-0x0000028567170000-0x0000028567171000-memory.dmp

      Filesize

      4KB

    • memory/4324-129-0x0000028567170000-0x0000028567171000-memory.dmp

      Filesize

      4KB

    • memory/4324-134-0x0000028567170000-0x0000028567171000-memory.dmp

      Filesize

      4KB

    • memory/4324-133-0x0000028567170000-0x0000028567171000-memory.dmp

      Filesize

      4KB

    • memory/4324-135-0x0000028567170000-0x0000028567171000-memory.dmp

      Filesize

      4KB

    • memory/4324-139-0x0000028567170000-0x0000028567171000-memory.dmp

      Filesize

      4KB

    • memory/4324-138-0x0000028567170000-0x0000028567171000-memory.dmp

      Filesize

      4KB

    • memory/4324-137-0x0000028567170000-0x0000028567171000-memory.dmp

      Filesize

      4KB

    • memory/4324-136-0x0000028567170000-0x0000028567171000-memory.dmp

      Filesize

      4KB