Overview
overview
9Static
static
3JJSploit 2...or.exe
windows10-2004-x64
9JJSploit 2...or.exe
windows11-21h2-x64
9creal.pyc
windows10-2004-x64
3creal.pyc
windows11-21h2-x64
3JJSploit 2...it.exe
windows10-2004-x64
7JJSploit 2...it.exe
windows11-21h2-x64
7jjsploit.pyc
windows10-2004-x64
3jjsploit.pyc
windows11-21h2-x64
3Analysis
-
max time kernel
34s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:24
Behavioral task
behavioral1
Sample
JJSploit 2.0/injector.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
JJSploit 2.0/injector.exe
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
creal.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
creal.pyc
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
JJSploit 2.0/jjsploit.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
JJSploit 2.0/jjsploit.exe
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
jjsploit.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
jjsploit.pyc
Resource
win11-20240802-en
General
-
Target
creal.pyc
-
Size
76KB
-
MD5
fcd494f9797d27908e665993ba552d14
-
SHA1
3587096445e2a419f51e4a9bfeda736e95bf3589
-
SHA256
23814d7a8df0dc35fe69d0e7d07e13d44c79fed2f39ac92c4cee8323a56de038
-
SHA512
ad94651c0d7802fe6097ec5a2f2d22373a40db13122fe9d8403b868250dfaf0e774d35fc3fa360c795cda51f5ea4e1cda522c522888814b994d4450ee44b4b50
-
SSDEEP
1536:KLKOqK/SWSRjsJlflX2Is89RaJ+InaYJEuN6RKer:KhqFi2Is8qjxJJN6Rn
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3492 OpenWith.exe