Overview
overview
10Static
static
10Jarvas-mai...bi.exe
windows7-x64
3Jarvas-mai...bi.exe
windows10-2004-x64
3Jarvas-main/gorm.exe
windows7-x64
10Jarvas-main/gorm.exe
windows10-2004-x64
10Jarvas-main/hook.ps1
windows7-x64
3Jarvas-main/hook.ps1
windows10-2004-x64
8Jarvas-mai...ion.js
windows7-x64
3Jarvas-mai...ion.js
windows10-2004-x64
3Jarvas-main/pwer.ps1
windows7-x64
3Jarvas-main/pwer.ps1
windows10-2004-x64
8Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
15/03/2025, 03:01
Behavioral task
behavioral1
Sample
Jarvas-main/Cqqjbi.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Jarvas-main/Cqqjbi.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
Jarvas-main/gorm.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Jarvas-main/gorm.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral5
Sample
Jarvas-main/hook.ps1
Resource
win7-20250207-en
Behavioral task
behavioral6
Sample
Jarvas-main/hook.ps1
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
Jarvas-main/injection.js
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Jarvas-main/injection.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
Jarvas-main/pwer.ps1
Resource
win7-20241010-en
General
-
Target
Jarvas-main/hook.ps1
-
Size
952B
-
MD5
e979804043a21c7ad61caf42cb1aca09
-
SHA1
0dd7c61250f4b8376ef53296e1ac2e9020277f0d
-
SHA256
aa0b85d331e09570ca1523f674c7f69dc7e6f1ea2019530c4316bf48d4496261
-
SHA512
e0d9e6bcedfacc47a80c1403068baf3c5c29126652c5f683bb3b52a34f3f061a9d89d76b9a10b1da72e623e3a140ddc1781fe34372d1b492f1050756beb9aaea
Malware Config
Signatures
-
pid Process 2532 powershell.exe -
Runs .reg file with regedit 1 IoCs
pid Process 2808 regedit.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2532 powershell.exe 2532 powershell.exe 2532 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2532 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2808 2532 powershell.exe 32 PID 2532 wrote to memory of 2808 2532 powershell.exe 32 PID 2532 wrote to memory of 2808 2532 powershell.exe 32
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Jarvas-main\hook.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\regedit.exe"C:\Windows\regedit.exe" /s C:\Users\Public\17399.reg2⤵
- Runs .reg file with regedit
PID:2808
-