Analysis

  • max time kernel
    149s
  • max time network
    158s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240704-en
  • resource tags

    arch:x64arch:x86image:win11-20240704-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    05/07/2024, 13:21 UTC

General

  • Target

    jet/build/jet/jet.pkg

  • Size

    33.9MB

  • MD5

    cdb06694672bf0885b437b8c5f272240

  • SHA1

    8ac57003c042df9021d794072a251ba178bb9297

  • SHA256

    55b27ab744fbbc1149e9336197c81c47027000751d6c8e76e755bdd89f6e9de2

  • SHA512

    ca01257a8dbe5e7ccda79a0f205250a72f5b12b95a3074f2cbfb9326ed5805ccaa5fb717abcb8b9c39fa447b1586be4dc8d5f8b83be4d1ca84073363a0462b6d

  • SSDEEP

    786432:8uXHiRyc0PacOHzeMKVxzx5cfOHzeMKVxzx5cU5FRA3L:8uXHLc0PacOHzDCd5cfOHzDCd5cUzRO

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\jet\build\jet\jet.pkg
    1⤵
    • Modifies registry class
    PID:2724
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3376

Network

  • flag-us
    DNS
    226.162.46.104.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    226.162.46.104.in-addr.arpa
    IN PTR
    Response
  • 52.111.236.22:443
    322 B
    7
  • 8.8.8.8:53
    226.162.46.104.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    226.162.46.104.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.