Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    29-06-2020 18:10

General

  • Target

    fattura.jar

  • Size

    222KB

  • MD5

    9f4c61b914d5174226a6591f9e9a2a48

  • SHA1

    558fa0ea8e2ea1c3c6b618789a88081eebeeab4c

  • SHA256

    eb76c8ea9c1857530e537b318eeac0781f7bbc68ad9e0152bcb2db5a8af71d97

  • SHA512

    f433da3b79fdd9f135094fc546988f81f535793a01b3b73803d7ed5f9b6e6eaacc685ee50e73ff7e3c066deeab7208ff64b55e7a5bc704966f8820b6a8dd81fc

Score
8/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Blacklisted process makes network request 25 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Adds Run entry to start application 2 TTPs 6 IoCs
  • Drops startup file 2 IoCs

Processes

  • C:\Windows\system32\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\fattura.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:676
    • C:\Windows\system32\wscript.exe
      wscript C:\Users\Admin\bjzxzjbyqj.vbs
      2⤵
      • Suspicious use of WriteProcessMemory
      • Adds Run entry to start application
      PID:1036
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -Command "$humanRights = (get-itemproperty -path 'HKCU:\SOFTWARE\Microsoft\' -name 'turK3y').turK3y;$humanRights=$humanRights.replace('!&','m');$Abt = [Convert]::FromBase64String($humanRights);$Out = [System.Text.Encoding]::ASCII.GetString($Abt);new-itemproperty -path 'HKCU:\SOFTWARE\Microsoft' -name 'turK3y' -value $Out -propertytype multistring -force | out-null;"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:1376
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\tDHMhQUaqL.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        • Blacklisted process makes network request
        • Adds Run entry to start application
        • Drops startup file
        PID:1828
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -Command "$humanRights = (get-itemproperty -path 'HKCU:\SOFTWARE\Microsoft\' -name 'turK3y').turK3y;$humanRights=$humanRights.replace('!&','A');$Abt = [Convert]::FromBase64String($humanRights);$Out = [System.Text.Encoding]::ASCII.GetString($Abt);new-itemproperty -path 'HKCU:\SOFTWARE\Microsoft' -name 'turK3y' -value $Out -propertytype multistring -force | out-null;"
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious behavior: EnumeratesProcesses
          PID:1580
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c "C:\Program Files\Java\jre7\bin\javaw.exe" -version 2> C:\Users\Admin\AppData\Local\Temp\output.txt
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1848
        • C:\Program Files\Java\jre7\bin\javaw.exe
          "C:\Program Files\Java\jre7\bin\javaw.exe" -version
          4⤵
            PID:1892
        • C:\Program Files\Java\jre7\bin\javaw.exe
          "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\ntfsmgr.jar"
          3⤵
          • Suspicious behavior: GetForegroundWindowSpam
          PID:468

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
    • C:\Users\Admin\AppData\Local\Temp\output.txt
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
    • C:\Users\Admin\AppData\Roaming\ntfsmgr.jar
    • C:\Users\Admin\AppData\Roaming\tDHMhQUaqL.vbs
    • C:\Users\Admin\bjzxzjbyqj.vbs
    • memory/468-10-0x0000000000000000-mapping.dmp
    • memory/1036-1-0x0000000000000000-mapping.dmp
    • memory/1036-13-0x0000000002660000-0x0000000002664000-memory.dmp
      Filesize

      16KB

    • memory/1376-3-0x0000000000000000-mapping.dmp
    • memory/1580-14-0x0000000000000000-mapping.dmp
    • memory/1828-4-0x0000000000000000-mapping.dmp
    • memory/1848-6-0x0000000000000000-mapping.dmp
    • memory/1892-7-0x0000000000000000-mapping.dmp