Overview
overview
10Static
static
10jjsploit.rar
windows7-x64
3jjsploit.rar
windows10-2004-x64
3jjsploit.exe
windows7-x64
7jjsploit.exe
windows10-2004-x64
9discord_to...er.pyc
windows7-x64
3discord_to...er.pyc
windows10-2004-x64
3get_cookies.pyc
windows7-x64
3get_cookies.pyc
windows10-2004-x64
3misc.pyc
windows7-x64
3misc.pyc
windows10-2004-x64
3passwords_grabber.pyc
windows7-x64
3passwords_grabber.pyc
windows10-2004-x64
3source_prepared.pyc
windows7-x64
3source_prepared.pyc
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 21:01
Behavioral task
behavioral1
Sample
jjsploit.rar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
jjsploit.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
jjsploit.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
jjsploit.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
discord_token_grabber.pyc
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
discord_token_grabber.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
get_cookies.pyc
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
get_cookies.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
misc.pyc
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
misc.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
passwords_grabber.pyc
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
passwords_grabber.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
source_prepared.pyc
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
source_prepared.pyc
Resource
win10v2004-20240802-en
General
-
Target
jjsploit.exe
-
Size
67.8MB
-
MD5
909612b38445bb0f4d498d56918c3a8e
-
SHA1
3d6e8fa743f0057a76cdac427453f0df58e3ab19
-
SHA256
1b2ee4937e0355f15cd9a7245ae9e4dcfcee5ea88d1cfd4dfbffa9e6177a96d7
-
SHA512
cd5bec3083434c6819701ce2a133522317779843514de5b89d6fdbd041e4794dcdec388425581fdd49bcc564e79dccbfd46b012ecd7d11670ea7436f7e25233d
-
SSDEEP
1572864:/+Wtgp8b8irAH8+1osuTCSxOB6xMLiIpa2qHWB75iVmBxaQr7qm:2ogOb8S6xjKcBa6c2qHO5iVIxaQrG
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
jjsploit.exepid Process 1640 jjsploit.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
jjsploit.exedescription pid Process procid_target PID 2552 wrote to memory of 1640 2552 jjsploit.exe 30 PID 2552 wrote to memory of 1640 2552 jjsploit.exe 30 PID 2552 wrote to memory of 1640 2552 jjsploit.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.6MB
MD5cae8fa4e7cb32da83acf655c2c39d9e1
SHA17a0055588a2d232be8c56791642cb0f5abbc71f8
SHA2568ad53c67c2b4db4387d5f72ee2a3ca80c40af444b22bf41a6cfda2225a27bb93
SHA512db2190da2c35bceed0ef91d7553ff0dea442286490145c3d0e89db59ba1299b0851e601cc324b5f7fd026414fc73755e8eff2ef5fb5eeb1c54a9e13e7c66dd0c
-
C:\Users\Admin\AppData\Local\Temp\_MEI25522\setuptools\_vendor\importlib_metadata-8.0.0.dist-info\INSTALLER
Filesize4B
MD5365c9bfeb7d89244f2ce01c1de44cb85
SHA1d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1
-
Filesize
1023B
MD5141643e11c48898150daa83802dbc65f
SHA10445ed0f69910eeaee036f09a39a13c6e1f37e12
SHA25686da0f01aeae46348a3c3d465195dc1ceccde79f79e87769a64b8da04b2a4741
SHA512ef62311602b466397baf0b23caca66114f8838f9e78e1b067787ceb709d09e0530e85a47bbcd4c5a0905b74fdb30df0cc640910c6cc2e67886e5b18794a3583f
-
Filesize
92B
MD543136dde7dd276932f6197bb6d676ef4
SHA16b13c105452c519ea0b65ac1a975bd5e19c50122
SHA256189eedfe4581172c1b6a02b97a8f48a14c0b5baa3239e4ca990fbd8871553714
SHA512e7712ba7d36deb083ebcc3b641ad3e7d19fb071ee64ae3a35ad6a50ee882b20cd2e60ca1319199df12584fe311a6266ec74f96a3fb67e59f90c7b5909668aee1