Overview
overview
10Static
static
3jet.zip
windows7-x64
1jet.zip
windows10-2004-x64
1jet/crack.dll
windows7-x64
1jet/crack.dll
windows10-2004-x64
1jet/jet.exe
windows7-x64
7jet/jet.exe
windows10-2004-x64
7jet.pyc
windows7-x64
3jet.pyc
windows10-2004-x64
3jet/loader.exe
windows7-x64
7jet/loader.exe
windows10-2004-x64
10main.pyc
windows7-x64
3main.pyc
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 22:30
Behavioral task
behavioral1
Sample
jet.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
jet.zip
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
jet/crack.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
jet/crack.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
jet/jet.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
jet/jet.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
jet.pyc
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
jet.pyc
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
jet/loader.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
jet/loader.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
main.pyc
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
main.pyc
Resource
win10v2004-20240709-en
General
-
Target
jet/jet.exe
-
Size
34.2MB
-
MD5
5e06053d551d8d4030796d1f962aba92
-
SHA1
6cf2351a65be0515dc1392b59902774f476c36e8
-
SHA256
1ed92d4e3caae52e8b39dbe22d031c4a057355befa038045ebc7383e1da1f9b9
-
SHA512
9ecc16aa0c0e8ed6d817b701e86a6db320c7167d399349bd97f109dfade95d6ee3f786dd4b2004e0e396a090fb509633aea6bbe46065853a3abf42f3c2782bee
-
SSDEEP
786432:VuXHiRyc0PacOHzeMKVxzx5cfOHzeMKVxzx5cU5FRA3L:VuXHLc0PacOHzDCd5cfOHzDCd5cUzRO
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2644 jet.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2644 2264 jet.exe 31 PID 2264 wrote to memory of 2644 2264 jet.exe 31 PID 2264 wrote to memory of 2644 2264 jet.exe 31
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD558e01abc9c9b5c885635180ed104fe95
SHA11c2f7216b125539d63bd111a7aba615c69deb8ba
SHA256de1b95d2e951fc048c84684bc7df4346138910544ee335b61fc8e65f360c3837
SHA512cd32c77191309d99aeed47699501b357b35669123f0dd70ed97c3791a009d1855ab27162db24a4bd9e719b68ee3b0539ee6db88e71abb9a2d4d629f87bc2c081