Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 10:19
Static task
static1
Behavioral task
behavioral1
Sample
JJSPrivate.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JJSPrivate.exe
Resource
win10v2004-20241007-en
General
-
Target
JJSPrivate.exe
-
Size
38.5MB
-
MD5
614daaa56de42eda32fb82e869e9ac31
-
SHA1
6e0969d1668a6c1e200f4d02066d074a8ab0e889
-
SHA256
9b45bd6f93817b2140fbfcd28e85bbb910d473432bfc1acee2566a335de0e22f
-
SHA512
5c8f38af08e1f33b74fa872e3300b7a66b801c4c1fe9c3b876298030987ac833da037e4d2a54d5a2341a4d392c743c26fabe8691ef9bd94227f429ad941ca549
-
SSDEEP
786432:XnR0nhLp698hEn1n60JVIh9LxtjsvPxSyw8/zt5lM2CB8kU:3OhLpWjn9JOh93sc+/ztL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2500 Stub.exe -
Loads dropped DLL 2 IoCs
pid Process 592 JJSPrivate.exe 2500 Stub.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 592 wrote to memory of 2500 592 JJSPrivate.exe 30 PID 592 wrote to memory of 2500 592 JJSPrivate.exe 30 PID 592 wrote to memory of 2500 592 JJSPrivate.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JJSPrivate.exe"C:\Users\Admin\AppData\Local\Temp\JJSPrivate.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Users\Admin\AppData\Local\Temp\onefile_592_133748435988562000\Stub.exeC:\Users\Admin\AppData\Local\Temp\JJSPrivate.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2500
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5e4533934b37e688106beac6c5919281e
SHA1ada39f10ef0bbdcf05822f4260e43d53367b0017
SHA2562bf761bae584ba67d9a41507b45ebd41ab6ae51755b1782496d0bc60cc1d41d5
SHA512fa681a48ddd81854c9907026d4f36b008e509729f1d9a18a621f1d86cd1176c1a1ff4f814974306fa4d9e3886e2ce112a4f79b66713e1401f5dae4bcd8b898b9