Overview
overview
8Static
static
3JJSploit_8...is.zip
windows10-2004-x64
8JJSploit_8...up.exe
windows10-2004-x64
8$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...rd.bmp
windows10-2004-x64
7$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3JJSploit.exe
windows10-2004-x64
3db.json
windows10-2004-x64
3libcrypto-3-x64.dll
windows10-2004-x64
1libssl-3-x64.dll
windows10-2004-x64
1resources/...bot.js
windows10-2004-x64
3resources/...lip.js
windows10-2004-x64
3uninstall.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3xxhash.dll
windows10-2004-x64
1zstd.dll
windows10-2004-x64
1Analysis
-
max time kernel
1366s -
max time network
1157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 02:43
Static task
static1
Behavioral task
behavioral1
Sample
JJSploit_8.10.7_x64-setup.nsis.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
JJSploit_8.10.7_x64-setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsis_tauri_utils.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
JJSploit.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
db.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
libcrypto-3-x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
libssl-3-x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
resources/luascripts/general/aimbot.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
resources/luascripts/general/noclip.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
uninstall.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsis_tauri_utils.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
xxhash.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral20
Sample
zstd.dll
Resource
win10v2004-20241007-en
General
-
Target
db.json
-
Size
311B
-
MD5
84095feb496d351b9c80e926938f9ca8
-
SHA1
d8ac99f45d8420698809521a4c1a30e954f118da
-
SHA256
1ee333036765e94b9f6975a2cfb6a799c42b3357078b424753f6aa61b225e54b
-
SHA512
347ef12c4f1849a5455014413097ea6d7a6406b36027da4734afad736a5581c6068dd4878aeab02843abbc1e1cfdb37f34c167b4886c8644ad8778e592393e10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3236 OpenWith.exe