General
-
Target
JJSploitBootstrapper.bat
-
Size
992B
-
Sample
240920-dgsa8avera
-
MD5
bca8f39baed66bcfcc6aaf4804a7770f
-
SHA1
198fde86f372a658952ea1a9b18601d8672585d6
-
SHA256
a62f52af73df95dfb8482f0658fd396ccce80460a17bbeeabad15afd4757a9c6
-
SHA512
4330793748cfc3ca02dc7258d4c60dd8ab58623ffe90e2704a33544d4625b9a70e9c7ab0f611f29534b69af2bcf7068e9f982615ca997037f0ed5cde0103e972
Static task
static1
Behavioral task
behavioral1
Sample
JJSploitBootstrapper.bat
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
JJSploitBootstrapper.bat
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
JJSploitBootstrapper.bat
-
Size
992B
-
MD5
bca8f39baed66bcfcc6aaf4804a7770f
-
SHA1
198fde86f372a658952ea1a9b18601d8672585d6
-
SHA256
a62f52af73df95dfb8482f0658fd396ccce80460a17bbeeabad15afd4757a9c6
-
SHA512
4330793748cfc3ca02dc7258d4c60dd8ab58623ffe90e2704a33544d4625b9a70e9c7ab0f611f29534b69af2bcf7068e9f982615ca997037f0ed5cde0103e972
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1