Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 12:16
Behavioral task
behavioral1
Sample
jet/crack.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
jet/crack.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
jet/jet.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
jet/jet.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
jet/loader.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
jet/loader.exe
Resource
win10v2004-20240709-en
General
-
Target
jet/jet.exe
-
Size
34.2MB
-
MD5
5e06053d551d8d4030796d1f962aba92
-
SHA1
6cf2351a65be0515dc1392b59902774f476c36e8
-
SHA256
1ed92d4e3caae52e8b39dbe22d031c4a057355befa038045ebc7383e1da1f9b9
-
SHA512
9ecc16aa0c0e8ed6d817b701e86a6db320c7167d399349bd97f109dfade95d6ee3f786dd4b2004e0e396a090fb509633aea6bbe46065853a3abf42f3c2782bee
-
SSDEEP
786432:VuXHiRyc0PacOHzeMKVxzx5cfOHzeMKVxzx5cU5FRA3L:VuXHLc0PacOHzDCd5cfOHzDCd5cUzRO
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1980 jet.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2236 wrote to memory of 1980 2236 jet.exe 29 PID 2236 wrote to memory of 1980 2236 jet.exe 29 PID 2236 wrote to memory of 1980 2236 jet.exe 29
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD558e01abc9c9b5c885635180ed104fe95
SHA11c2f7216b125539d63bd111a7aba615c69deb8ba
SHA256de1b95d2e951fc048c84684bc7df4346138910544ee335b61fc8e65f360c3837
SHA512cd32c77191309d99aeed47699501b357b35669123f0dd70ed97c3791a009d1855ab27162db24a4bd9e719b68ee3b0539ee6db88e71abb9a2d4d629f87bc2c081