Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    31-10-2024 10:19

General

  • Target

    JJSPrivate.exe

  • Size

    38.5MB

  • MD5

    614daaa56de42eda32fb82e869e9ac31

  • SHA1

    6e0969d1668a6c1e200f4d02066d074a8ab0e889

  • SHA256

    9b45bd6f93817b2140fbfcd28e85bbb910d473432bfc1acee2566a335de0e22f

  • SHA512

    5c8f38af08e1f33b74fa872e3300b7a66b801c4c1fe9c3b876298030987ac833da037e4d2a54d5a2341a4d392c743c26fabe8691ef9bd94227f429ad941ca549

  • SSDEEP

    786432:XnR0nhLp698hEn1n60JVIh9LxtjsvPxSyw8/zt5lM2CB8kU:3OhLpWjn9JOh93sc+/ztL

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JJSPrivate.exe
    "C:\Users\Admin\AppData\Local\Temp\JJSPrivate.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:592
    • C:\Users\Admin\AppData\Local\Temp\onefile_592_133748435988562000\Stub.exe
      C:\Users\Admin\AppData\Local\Temp\JJSPrivate.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2500

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\onefile_592_133748435988562000\python310.dll

    Filesize

    4.3MB

    MD5

    e4533934b37e688106beac6c5919281e

    SHA1

    ada39f10ef0bbdcf05822f4260e43d53367b0017

    SHA256

    2bf761bae584ba67d9a41507b45ebd41ab6ae51755b1782496d0bc60cc1d41d5

    SHA512

    fa681a48ddd81854c9907026d4f36b008e509729f1d9a18a621f1d86cd1176c1a1ff4f814974306fa4d9e3886e2ce112a4f79b66713e1401f5dae4bcd8b898b9

  • memory/592-63-0x000000013F310000-0x00000001419B7000-memory.dmp

    Filesize

    38.7MB

  • memory/2500-34-0x000000013FE30000-0x0000000145871000-memory.dmp

    Filesize

    90.3MB