Overview
overview
10Static
static
10Jarvas-mai...bi.exe
windows7-x64
3Jarvas-mai...bi.exe
windows10-2004-x64
3Jarvas-main/gorm.exe
windows7-x64
10Jarvas-main/gorm.exe
windows10-2004-x64
10Jarvas-main/hook.ps1
windows7-x64
3Jarvas-main/hook.ps1
windows10-2004-x64
8Jarvas-mai...ion.js
windows7-x64
3Jarvas-mai...ion.js
windows10-2004-x64
3Jarvas-main/pwer.ps1
windows7-x64
3Jarvas-main/pwer.ps1
windows10-2004-x64
8Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
15/03/2025, 03:11
Behavioral task
behavioral1
Sample
Jarvas-main/Cqqjbi.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Jarvas-main/Cqqjbi.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
Jarvas-main/gorm.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Jarvas-main/gorm.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
Jarvas-main/hook.ps1
Resource
win7-20250207-en
Behavioral task
behavioral6
Sample
Jarvas-main/hook.ps1
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
Jarvas-main/injection.js
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
Jarvas-main/injection.js
Resource
win10v2004-20250313-en
Behavioral task
behavioral9
Sample
Jarvas-main/pwer.ps1
Resource
win7-20240903-en
General
-
Target
Jarvas-main/hook.ps1
-
Size
952B
-
MD5
e979804043a21c7ad61caf42cb1aca09
-
SHA1
0dd7c61250f4b8376ef53296e1ac2e9020277f0d
-
SHA256
aa0b85d331e09570ca1523f674c7f69dc7e6f1ea2019530c4316bf48d4496261
-
SHA512
e0d9e6bcedfacc47a80c1403068baf3c5c29126652c5f683bb3b52a34f3f061a9d89d76b9a10b1da72e623e3a140ddc1781fe34372d1b492f1050756beb9aaea
Malware Config
Signatures
-
pid Process 1900 powershell.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1944 regedit.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1900 powershell.exe 1900 powershell.exe 1900 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1900 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1900 wrote to memory of 1944 1900 powershell.exe 31 PID 1900 wrote to memory of 1944 1900 powershell.exe 31 PID 1900 wrote to memory of 1944 1900 powershell.exe 31
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Jarvas-main\hook.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\regedit.exe"C:\Windows\regedit.exe" /s C:\Users\Public\17399.reg2⤵
- Runs .reg file with regedit
PID:1944
-