Overview
overview
8Static
static
7JJSploit.exe
windows11-21h2-x64
$PLUGINSDI...ns.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3HWiNFO32.dll
windows11-21h2-x64
3Qt5Core.dll
windows11-21h2-x64
3Qt5Gui.dll
windows11-21h2-x64
3Qt5Network.dll
windows11-21h2-x64
3Qt5Svg.dll
windows11-21h2-x64
3Qt5Widgets.dll
windows11-21h2-x64
3ThermaltakeUpdate.exe
windows11-21h2-x64
3X1 RGB.exe
windows11-21h2-x64
8fw/X1 RGB ...te.exe
windows11-21h2-x64
3hidapi.dll
windows11-21h2-x64
3imageformats/qdds.dll
windows11-21h2-x64
3imageformats/qgif.dll
windows11-21h2-x64
3imageforma...ns.dll
windows11-21h2-x64
3imageformats/qico.dll
windows11-21h2-x64
3imageformats/qjp2.dll
windows11-21h2-x64
1imageforma...eg.dll
windows11-21h2-x64
3imageformats/qmng.dll
windows11-21h2-x64
1imageformats/qsvg.dll
windows11-21h2-x64
3imageformats/qtga.dll
windows11-21h2-x64
3imageforma...ff.dll
windows11-21h2-x64
3imageforma...mp.dll
windows11-21h2-x64
3imageforma...bp.dll
windows11-21h2-x64
3libeay32.dll
windows11-21h2-x64
3platforms/...al.dll
windows11-21h2-x64
3platforms/...en.dll
windows11-21h2-x64
3platforms/...ws.dll
windows11-21h2-x64
3ssleay32.dll
windows11-21h2-x64
3uninst.exe
windows11-21h2-x64
7vc_redist.x86.exe
windows11-21h2-x64
7Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
04/10/2024, 08:17
Static task
static1
Behavioral task
behavioral1
Sample
JJSploit.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
HWiNFO32.dll
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
Qt5Core.dll
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
Qt5Gui.dll
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
Qt5Network.dll
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
Qt5Svg.dll
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
Qt5Widgets.dll
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
ThermaltakeUpdate.exe
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
X1 RGB.exe
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
fw/X1 RGB Firmware Update.exe
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
hidapi.dll
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
imageformats/qdds.dll
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
imageformats/qgif.dll
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
imageformats/qicns.dll
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
imageformats/qico.dll
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
imageformats/qjp2.dll
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
imageformats/qjpeg.dll
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
imageformats/qmng.dll
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
imageformats/qsvg.dll
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
imageformats/qtga.dll
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
imageformats/qtiff.dll
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
imageformats/qwbmp.dll
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
imageformats/qwebp.dll
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
libeay32.dll
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
platforms/qminimal.dll
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
platforms/qoffscreen.dll
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
platforms/qwindows.dll
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
ssleay32.dll
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
uninst.exe
Resource
win11-20240802-en
Behavioral task
behavioral32
Sample
vc_redist.x86.exe
Resource
win11-20240802-en
General
-
Target
uninst.exe
-
Size
425KB
-
MD5
a66cd68e574c04fda61a2f579e053f24
-
SHA1
8244163229f4ce6f31bb18b93f7228785eb40c3c
-
SHA256
cc0bfdfb8e26f009f903767ce604c4ea380dc328cb1d762ca64edaa12aafc6d9
-
SHA512
d48fa2f3a6b32f9579d09a1d97e54e8daec6ac8ee02c1afc9700071a13b3a8d3b9ef07945282ed151d9a19b18b780820e299fa8334002f63e20307cec4553359
-
SSDEEP
3072:vLuXzXwYyr6Doocc6AWyl5gVjATqzq+kRrU8rUCuB:vpIJWyLT+iReCuB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1368 Un_A.exe -
Executes dropped EXE 1 IoCs
pid Process 1368 Un_A.exe -
Loads dropped DLL 2 IoCs
pid Process 1368 Un_A.exe 1368 Un_A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Un_A.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral31/files/0x000100000002adbe-3.dat nsis_installer_1 behavioral31/files/0x000100000002adbe-3.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1368 Un_A.exe 1368 Un_A.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1568 wrote to memory of 1368 1568 uninst.exe 78 PID 1568 wrote to memory of 1368 1568 uninst.exe 78 PID 1568 wrote to memory of 1368 1568 uninst.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD583142eac84475f4ca889c73f10d9c179
SHA1dbe43c0de8ef881466bd74861b2e5b17598b5ce8
SHA256ae2f1658656e554f37e6eac896475a3862841a18ffc6fad2754e2d3525770729
SHA5121c66eab21f0c9e0b99ecc3844516a6978f52e0c7f489405a427532ecbe78947c37dac5b4c8b722cc8bc1edfb74ba4824519d56099e587e754e5c668701e83bd1
-
Filesize
11KB
MD53f176d1ee13b0d7d6bd92e1c7a0b9bae
SHA1fe582246792774c2c9dd15639ffa0aca90d6fd0b
SHA256fa4ab1d6f79fd677433a31ada7806373a789d34328da46ccb0449bbf347bd73e
SHA5120a69124819b7568d0dea4e9e85ce8fe61c7ba697c934e3a95e2dcfb9f252b1d9da7faf8774b6e8efd614885507acc94987733eba09a2f5e7098b774dfc8524b6
-
Filesize
425KB
MD5a66cd68e574c04fda61a2f579e053f24
SHA18244163229f4ce6f31bb18b93f7228785eb40c3c
SHA256cc0bfdfb8e26f009f903767ce604c4ea380dc328cb1d762ca64edaa12aafc6d9
SHA512d48fa2f3a6b32f9579d09a1d97e54e8daec6ac8ee02c1afc9700071a13b3a8d3b9ef07945282ed151d9a19b18b780820e299fa8334002f63e20307cec4553359