Overview
overview
10Static
static
10Jarvas-mai...bi.exe
windows7-x64
3Jarvas-mai...bi.exe
windows10-2004-x64
3Jarvas-main/gorm.exe
windows7-x64
10Jarvas-main/gorm.exe
windows10-2004-x64
10Jarvas-main/hook.ps1
windows7-x64
3Jarvas-main/hook.ps1
windows10-2004-x64
8Jarvas-mai...ion.js
windows7-x64
3Jarvas-mai...ion.js
windows10-2004-x64
3Jarvas-main/pwer.ps1
windows7-x64
3Jarvas-main/pwer.ps1
windows10-2004-x64
8Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/03/2025, 03:01
Behavioral task
behavioral1
Sample
Jarvas-main/Cqqjbi.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Jarvas-main/Cqqjbi.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
Jarvas-main/gorm.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Jarvas-main/gorm.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral5
Sample
Jarvas-main/hook.ps1
Resource
win7-20250207-en
Behavioral task
behavioral6
Sample
Jarvas-main/hook.ps1
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
Jarvas-main/injection.js
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Jarvas-main/injection.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
Jarvas-main/pwer.ps1
Resource
win7-20241010-en
General
-
Target
Jarvas-main/Cqqjbi.exe
-
Size
416KB
-
MD5
f0d8688ee72d2bda8dbc82563a9511fc
-
SHA1
99a2ef9db16fecaf7f07b32aa057ad612cc9d5a5
-
SHA256
f92b82665c20cc5e14ddef049054a1d20527ca1792257b7b55dfc8bdd1431777
-
SHA512
074ca9c6cf7eb4e7a0cd1fd89f8d0f902fa4e648d2de19dac3a158121194704ae33f390bfb2bff8cc20072dead667ea591db343e2678ba91e2e05c020b2e1a37
-
SSDEEP
3072:f5RZ0+rDnojLQehENzR/eWlw/TH+zDinbs4hnwILH0k2n7GD/tkZVF1D9G9qqCgk:f51DCQeSNzxtMSKUpqCAgGncXX/
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2636 2676 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cqqjbi.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2676 Cqqjbi.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2636 2676 Cqqjbi.exe 30 PID 2676 wrote to memory of 2636 2676 Cqqjbi.exe 30 PID 2676 wrote to memory of 2636 2676 Cqqjbi.exe 30 PID 2676 wrote to memory of 2636 2676 Cqqjbi.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Jarvas-main\Cqqjbi.exe"C:\Users\Admin\AppData\Local\Temp\Jarvas-main\Cqqjbi.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 10722⤵
- Program crash
PID:2636
-