Overview
overview
10Static
static
3jet.zip
windows7-x64
1jet.zip
windows10-2004-x64
1jet/crack.dll
windows7-x64
1jet/crack.dll
windows10-2004-x64
1jet/jet.exe
windows7-x64
7jet/jet.exe
windows10-2004-x64
7jet.pyc
windows7-x64
3jet.pyc
windows10-2004-x64
3jet/loader.exe
windows7-x64
7jet/loader.exe
windows10-2004-x64
10main.pyc
windows7-x64
3main.pyc
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 22:30
Behavioral task
behavioral1
Sample
jet.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
jet.zip
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
jet/crack.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
jet/crack.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
jet/jet.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
jet/jet.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
jet.pyc
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
jet.pyc
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
jet/loader.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
jet/loader.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
main.pyc
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
main.pyc
Resource
win10v2004-20240709-en
General
-
Target
jet/loader.exe
-
Size
39.3MB
-
MD5
cb5900d8c99b9b2b8391c5e07de93048
-
SHA1
21434e75d38c698a924a28a39498f230ba1e23f2
-
SHA256
53d60f5a2e65c6aae90eb6e9f872cd381fc152f33e8227bef5fe27d61e09ceb3
-
SHA512
148be276c6a8b98971c975c27a7b4d27146667b80447198d09777131b2dd5511de51db3ded5b3d04b72a85f12f772792e0590427c3cbceb2b1d9b5420d9d205d
-
SSDEEP
786432:vp039FS+ab44n6ASQSc6k00CZcKoTMS4n4BgmpHvT6CKrftQKN:vps9Fnab4+6DQSc6JUCSC4hH2CKLtQK
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
loader.exepid process 3056 loader.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\_MEI23402\python310.dll upx -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
loader.exedescription pid process target process PID 2340 wrote to memory of 3056 2340 loader.exe loader.exe PID 2340 wrote to memory of 3056 2340 loader.exe loader.exe PID 2340 wrote to memory of 3056 2340 loader.exe loader.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD54a6afa2200b1918c413d511c5a3c041c
SHA139ca3c2b669adac07d4a5eb1b3b79256cfe0c3b3
SHA256bec187f608507b57cf0475971ba646b8ab42288af8fdcf78bce25f1d8c84b1da
SHA512dbffb06ffff0542200344ea9863a44a6f1e1b783379e53df18580e697e8204d3911e091deb32a9c94b5599cdd54301b705b74e1f51104151cf13b89d57280a20