Overview
overview
7Static
static
7PC6�...��.url
windows7-x64
1PC6�...��.url
windows10-2004-x64
1jjdjr.exe
windows7-x64
7jjdjr.exe
windows10-2004-x64
7$PLUGINSDIR/17561.vbs
windows7-x64
3$PLUGINSDIR/17561.vbs
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDIR/SkinH.dll
windows7-x64
5$PLUGINSDIR/SkinH.dll
windows10-2004-x64
5$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/pcpc.vbs
windows7-x64
1$PLUGINSDIR/pcpc.vbs
windows10-2004-x64
3$PLUGINSDIR/run.vbs
windows7-x64
3$PLUGINSDIR/run.vbs
windows10-2004-x64
7$PLUGINSDI...��.exe
windows7-x64
3$PLUGINSDI...��.exe
windows10-2004-x64
3$PLUGINSDI...RL.dll
windows7-x64
3$PLUGINSDI...RL.dll
windows10-2004-x64
3$PLUGINSDIR/Inetc.dll
windows7-x64
3$PLUGINSDIR/Inetc.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3Shell/Norm...le.dll
windows7-x64
1Shell/Norm...le.dll
windows10-2004-x64
1uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 17:51
Behavioral task
behavioral1
Sample
PC6Ϸ.url
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
PC6Ϸ.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
jjdjr.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
jjdjr.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/17561.vbs
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/17561.vbs
Resource
win10v2004-20240910-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/AdvSplash.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/AdvSplash.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/ButtonLinker.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/ButtonLinker.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/SkinH.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/SkinH.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/pcpc.vbs
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/pcpc.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/run.vbs
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/run.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/Ϸ.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/Ϸ.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/BrandingURL.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/BrandingURL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/Inetc.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/Inetc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Shell/NormalColor/Shellstyle.dll
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
Shell/NormalColor/Shellstyle.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
uninst.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
uninst.exe
Resource
win10v2004-20240802-en
General
-
Target
jjdjr.exe
-
Size
1.6MB
-
MD5
387e4f3a8b8254b368c806f57fbb22b0
-
SHA1
3f6cd448d148984cfaf574977df392652afb7226
-
SHA256
eff1e0da378c6cf58c178a352b91bb08b69d7268c1ef650c2cc0eae7f224d123
-
SHA512
53aebb082300aa400ea184dfde68a381288883183054785d8d7e27dab376e37ade1197807f98b56210a8f6e434588e14a55c433da9519fdbaa026ce70ffa41df
-
SSDEEP
49152:oWl/yyQzxo/tmzPiNZSaND2011JzOAnMUj:wyQzG/2cZD2+
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral3/files/0x00050000000196a0-25.dat acprotect -
Loads dropped DLL 5 IoCs
pid Process 2424 jjdjr.exe 2424 jjdjr.exe 2424 jjdjr.exe 2424 jjdjr.exe 2424 jjdjr.exe -
resource yara_rule behavioral3/files/0x00050000000196a0-25.dat upx behavioral3/memory/2424-27-0x0000000000490000-0x00000000004CC000-memory.dmp upx behavioral3/memory/2424-102-0x0000000000490000-0x00000000004CC000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjdjr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2424 jjdjr.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
642B
MD585a70a8d3c673d192984a0a94c327c6e
SHA14e2dfda010267c4dd00b3102ab6cb86ffed76de6
SHA2565941b47e93a3796ca9edff2b35f5d90cab23e15b80ecd1f24f8c3ba42a739f4e
SHA5129ee5000bfdd3a862f8b11850e292ea6ac83b917e1881ef63aafeaeeca3be12ea99fa09088e5f6845469883965da2e59515a83db0eec33734c3d19becae570b16
-
Filesize
6KB
MD5a1bba35c752b36f575350cb7ddf238e4
SHA19603b691ae71d4fbc7a14dbb837bd97cecac8aab
SHA2560667863d71a3021ab844069b6dd0485f874bf638af478ab11c6fb8b7d6c834b6
SHA512eb5d3498dd994bec42a437cf91343665d3c35bfe3f6277a7393af6a0b8348772c3166d9be48955edddf6ef79fa508ec8d4f96d7d5df37ecdc52c90042e0a2967
-
Filesize
7KB
MD5dd85ac7d85c92dd0e3cc17dfd4890f54
SHA1a128fb7a05965c1a9913c6f5e419e6c4c0a7d2fa
SHA25627abd2a4fb1bf66add60221b52d061bbe24d2d21e13600725ff7a5c6c777b504
SHA512e4ff8216c65110a9d156f37c2062acb53a72daa8af12dfc24278920d9e1a4083a81b1446759df75405b2da34c7bfb1afc33184feedd0aee4ed73f79fcbb1a8a1
-
Filesize
14KB
MD50dc0cc7a6d9db685bf05a7e5f3ea4781
SHA15d8b6268eeec9d8d904bc9d988a4b588b392213f
SHA2568e287326f1cdd5ef2dcd7a72537c68cbe4299ceb1f820707c5820f3aa6d8206c
SHA512814dd17ebb434f4a3356f716c783ab7f569f9ee34ce5274fa50392526925f044798f8006198ac7afe3d1c2ca83a2ca8c472ca53fec5f12bbfbbe0707abacd6b0
-
Filesize
84KB
MD5a00c474dc4ced90b8f5a692108c45dce
SHA1e02722d30a6218523e9ddef287817788a4a9b9fc
SHA2566504e515cbcf89cb98fd9f1a310125bfdf93e1f6a6bf0c64c0229e5670cac9b1
SHA512e81b001379f94fabb71f1d6a019b81202e00da7338048b77d1728b40427689a32801419377d3e86c51c5e418cc3ccc328ee00adc69eaa575267bcaac8f477abd
-
Filesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667