Overview
overview
10Static
static
10jjsploit.rar
windows7-x64
3jjsploit.rar
windows10-2004-x64
3jjsploit.exe
windows7-x64
7jjsploit.exe
windows10-2004-x64
9discord_to...er.pyc
windows7-x64
3discord_to...er.pyc
windows10-2004-x64
3get_cookies.pyc
windows7-x64
3get_cookies.pyc
windows10-2004-x64
3misc.pyc
windows7-x64
3misc.pyc
windows10-2004-x64
3passwords_grabber.pyc
windows7-x64
3passwords_grabber.pyc
windows10-2004-x64
3source_prepared.pyc
windows7-x64
3source_prepared.pyc
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 21:01
Behavioral task
behavioral1
Sample
jjsploit.rar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
jjsploit.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
jjsploit.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
jjsploit.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
discord_token_grabber.pyc
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
discord_token_grabber.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
get_cookies.pyc
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
get_cookies.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
misc.pyc
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
misc.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
passwords_grabber.pyc
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
passwords_grabber.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
source_prepared.pyc
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
source_prepared.pyc
Resource
win10v2004-20240802-en
General
-
Target
jjsploit.rar
-
Size
66.4MB
-
MD5
49acebfd72357fea16b1b716e3e422d0
-
SHA1
b03eabab8cdda5902357d2ca2bedb1e7dfe07c8f
-
SHA256
6a66dbced3c4174929db5a1f877947a8e2cd53e602bdb75163f56b076c714f5c
-
SHA512
3d5027880f808f88c00ae4c0a1f147441d17bd833dc0104f6d30317c0b98758501b3e8f4f7bd2a39aaece1142509192f3623b5533707081223aa7dd8ee8e346e
-
SSDEEP
1572864:N2c0ujC2xsadQG2WSRSr8zpARMcH6DdqQbaxXlH+JSKR4bjZk5iZYD5:rjC2H2WSMIpLcaTa3eqby59F
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
RdrCEF.exeAcroRd32.exeRdrCEF.exeRdrCEF.exeRdrCEF.exeRdrCEF.exeRdrCEF.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
OpenWith.exepid Process 1056 OpenWith.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
Processes:
OpenWith.exeAcroRd32.exepid Process 1056 OpenWith.exe 1056 OpenWith.exe 1056 OpenWith.exe 1056 OpenWith.exe 1056 OpenWith.exe 1056 OpenWith.exe 1056 OpenWith.exe 1056 OpenWith.exe 1056 OpenWith.exe 1056 OpenWith.exe 1056 OpenWith.exe 1056 OpenWith.exe 1056 OpenWith.exe 1056 OpenWith.exe 1056 OpenWith.exe 3716 AcroRd32.exe 3716 AcroRd32.exe 3716 AcroRd32.exe 3716 AcroRd32.exe 3716 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
OpenWith.exeAcroRd32.exeRdrCEF.exedescription pid Process procid_target PID 1056 wrote to memory of 3716 1056 OpenWith.exe 97 PID 1056 wrote to memory of 3716 1056 OpenWith.exe 97 PID 1056 wrote to memory of 3716 1056 OpenWith.exe 97 PID 3716 wrote to memory of 3588 3716 AcroRd32.exe 99 PID 3716 wrote to memory of 3588 3716 AcroRd32.exe 99 PID 3716 wrote to memory of 3588 3716 AcroRd32.exe 99 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 4384 3588 RdrCEF.exe 100 PID 3588 wrote to memory of 3084 3588 RdrCEF.exe 101 PID 3588 wrote to memory of 3084 3588 RdrCEF.exe 101 PID 3588 wrote to memory of 3084 3588 RdrCEF.exe 101 PID 3588 wrote to memory of 3084 3588 RdrCEF.exe 101 PID 3588 wrote to memory of 3084 3588 RdrCEF.exe 101 PID 3588 wrote to memory of 3084 3588 RdrCEF.exe 101 PID 3588 wrote to memory of 3084 3588 RdrCEF.exe 101 PID 3588 wrote to memory of 3084 3588 RdrCEF.exe 101 PID 3588 wrote to memory of 3084 3588 RdrCEF.exe 101 PID 3588 wrote to memory of 3084 3588 RdrCEF.exe 101 PID 3588 wrote to memory of 3084 3588 RdrCEF.exe 101 PID 3588 wrote to memory of 3084 3588 RdrCEF.exe 101 PID 3588 wrote to memory of 3084 3588 RdrCEF.exe 101 PID 3588 wrote to memory of 3084 3588 RdrCEF.exe 101 PID 3588 wrote to memory of 3084 3588 RdrCEF.exe 101 PID 3588 wrote to memory of 3084 3588 RdrCEF.exe 101 PID 3588 wrote to memory of 3084 3588 RdrCEF.exe 101
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\jjsploit.rar1⤵
- Modifies registry class
PID:4464
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\jjsploit.rar"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0C39219B4E7204C1D81BCD304B1F177D --mojo-platform-channel-handle=1752 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:4384
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=E81E64D83CA4D5B50215D349272DDCCD --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=E81E64D83CA4D5B50215D349272DDCCD --renderer-client-id=2 --mojo-platform-channel-handle=1760 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:3084
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B4E250ADDCA7973C91DC302039D35762 --mojo-platform-channel-handle=2328 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:1936
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0BFC9F348C1EB7DE034611DC07D58C8D --mojo-platform-channel-handle=1944 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:4636
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=732E85F0BEA8FB8B352AA1BF551CDF35 --mojo-platform-channel-handle=2380 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:4352
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3396