Analysis
-
max time kernel
149s -
max time network
130s -
platform
windows10_x64 -
resource
win10 -
submitted
29-06-2020 18:11
Static task
static1
Behavioral task
behavioral1
Sample
IMG-29062020.jar
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
IMG-29062020.jar
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
IMG-29062020.jar
-
Size
608KB
-
MD5
e2fdebfb3346325ae26240e1c2e0319b
-
SHA1
e2731770f57600dd347759523db864cf8fd68e7a
-
SHA256
85b509c3352dde65b7dbd7c56207e2bcfe8245bf851132cbd61b93f4343077fc
-
SHA512
4e0f30e6f8adb8b3fd7d1af9120907884d3447e1a6b41d8fac9d6fb5ad8b5e90a223474bda641f64a3f2cfecba06229e562b37e12a2f310d2d09db07a39475d7
Score
10/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 62 IoCs
Processes:
java.exewscript.exejavaw.exejava.execmd.execmd.execmd.execmd.exejavaw.execmd.execmd.exejava.execmd.execmd.exedescription pid process target process PID 3104 wrote to memory of 3816 3104 java.exe wscript.exe PID 3104 wrote to memory of 3816 3104 java.exe wscript.exe PID 3816 wrote to memory of 3928 3816 wscript.exe javaw.exe PID 3816 wrote to memory of 3928 3816 wscript.exe javaw.exe PID 3928 wrote to memory of 3496 3928 javaw.exe java.exe PID 3928 wrote to memory of 3496 3928 javaw.exe java.exe PID 3928 wrote to memory of 3820 3928 javaw.exe cmd.exe PID 3928 wrote to memory of 3820 3928 javaw.exe cmd.exe PID 3496 wrote to memory of 3036 3496 java.exe cmd.exe PID 3496 wrote to memory of 3036 3496 java.exe cmd.exe PID 3820 wrote to memory of 3832 3820 cmd.exe cscript.exe PID 3820 wrote to memory of 3832 3820 cmd.exe cscript.exe PID 3036 wrote to memory of 3868 3036 cmd.exe cscript.exe PID 3036 wrote to memory of 3868 3036 cmd.exe cscript.exe PID 3496 wrote to memory of 416 3496 java.exe cmd.exe PID 3496 wrote to memory of 416 3496 java.exe cmd.exe PID 3928 wrote to memory of 540 3928 javaw.exe cmd.exe PID 3928 wrote to memory of 540 3928 javaw.exe cmd.exe PID 416 wrote to memory of 804 416 cmd.exe cscript.exe PID 416 wrote to memory of 804 416 cmd.exe cscript.exe PID 540 wrote to memory of 396 540 cmd.exe cscript.exe PID 540 wrote to memory of 396 540 cmd.exe cscript.exe PID 3496 wrote to memory of 1672 3496 java.exe xcopy.exe PID 3496 wrote to memory of 1672 3496 java.exe xcopy.exe PID 3928 wrote to memory of 1356 3928 javaw.exe xcopy.exe PID 3928 wrote to memory of 1356 3928 javaw.exe xcopy.exe PID 3928 wrote to memory of 1692 3928 javaw.exe cmd.exe PID 3928 wrote to memory of 1692 3928 javaw.exe cmd.exe PID 3496 wrote to memory of 1592 3496 java.exe cmd.exe PID 3496 wrote to memory of 1592 3496 java.exe cmd.exe PID 3928 wrote to memory of 2448 3928 javaw.exe reg.exe PID 3928 wrote to memory of 2448 3928 javaw.exe reg.exe PID 3928 wrote to memory of 2560 3928 javaw.exe attrib.exe PID 3928 wrote to memory of 2560 3928 javaw.exe attrib.exe PID 3928 wrote to memory of 2720 3928 javaw.exe attrib.exe PID 3928 wrote to memory of 2720 3928 javaw.exe attrib.exe PID 3928 wrote to memory of 3172 3928 javaw.exe javaw.exe PID 3928 wrote to memory of 3172 3928 javaw.exe javaw.exe PID 3172 wrote to memory of 3964 3172 javaw.exe java.exe PID 3172 wrote to memory of 3964 3172 javaw.exe java.exe PID 3172 wrote to memory of 848 3172 javaw.exe cmd.exe PID 3172 wrote to memory of 848 3172 javaw.exe cmd.exe PID 848 wrote to memory of 1052 848 cmd.exe cscript.exe PID 848 wrote to memory of 1052 848 cmd.exe cscript.exe PID 3172 wrote to memory of 1580 3172 javaw.exe cmd.exe PID 3172 wrote to memory of 1580 3172 javaw.exe cmd.exe PID 1580 wrote to memory of 1576 1580 cmd.exe cscript.exe PID 1580 wrote to memory of 1576 1580 cmd.exe cscript.exe PID 3964 wrote to memory of 2144 3964 java.exe cmd.exe PID 3964 wrote to memory of 2144 3964 java.exe cmd.exe PID 2144 wrote to memory of 2684 2144 cmd.exe cscript.exe PID 2144 wrote to memory of 2684 2144 cmd.exe cscript.exe PID 3172 wrote to memory of 3912 3172 javaw.exe cmd.exe PID 3172 wrote to memory of 3912 3172 javaw.exe cmd.exe PID 3964 wrote to memory of 3500 3964 java.exe cmd.exe PID 3964 wrote to memory of 3500 3964 java.exe cmd.exe PID 3500 wrote to memory of 3820 3500 cmd.exe cscript.exe PID 3500 wrote to memory of 3820 3500 cmd.exe cscript.exe PID 3964 wrote to memory of 1760 3964 java.exe cmd.exe PID 3964 wrote to memory of 1760 3964 java.exe cmd.exe PID 3172 wrote to memory of 884 3172 javaw.exe WMIC.exe PID 3172 wrote to memory of 884 3172 javaw.exe WMIC.exe -
Loads dropped DLL 1 IoCs
Processes:
javaw.exepid process 3172 javaw.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
Processes:
WMIC.exedescription pid process Token: SeIncreaseQuotaPrivilege 884 WMIC.exe Token: SeSecurityPrivilege 884 WMIC.exe Token: SeTakeOwnershipPrivilege 884 WMIC.exe Token: SeLoadDriverPrivilege 884 WMIC.exe Token: SeSystemProfilePrivilege 884 WMIC.exe Token: SeSystemtimePrivilege 884 WMIC.exe Token: SeProfSingleProcessPrivilege 884 WMIC.exe Token: SeIncBasePriorityPrivilege 884 WMIC.exe Token: SeCreatePagefilePrivilege 884 WMIC.exe Token: SeBackupPrivilege 884 WMIC.exe Token: SeRestorePrivilege 884 WMIC.exe Token: SeShutdownPrivilege 884 WMIC.exe Token: SeDebugPrivilege 884 WMIC.exe Token: SeSystemEnvironmentPrivilege 884 WMIC.exe Token: SeRemoteShutdownPrivilege 884 WMIC.exe Token: SeUndockPrivilege 884 WMIC.exe Token: SeManageVolumePrivilege 884 WMIC.exe Token: 33 884 WMIC.exe Token: 34 884 WMIC.exe Token: 35 884 WMIC.exe Token: 36 884 WMIC.exe Token: SeIncreaseQuotaPrivilege 884 WMIC.exe Token: SeSecurityPrivilege 884 WMIC.exe Token: SeTakeOwnershipPrivilege 884 WMIC.exe Token: SeLoadDriverPrivilege 884 WMIC.exe Token: SeSystemProfilePrivilege 884 WMIC.exe Token: SeSystemtimePrivilege 884 WMIC.exe Token: SeProfSingleProcessPrivilege 884 WMIC.exe Token: SeIncBasePriorityPrivilege 884 WMIC.exe Token: SeCreatePagefilePrivilege 884 WMIC.exe Token: SeBackupPrivilege 884 WMIC.exe Token: SeRestorePrivilege 884 WMIC.exe Token: SeShutdownPrivilege 884 WMIC.exe Token: SeDebugPrivilege 884 WMIC.exe Token: SeSystemEnvironmentPrivilege 884 WMIC.exe Token: SeRemoteShutdownPrivilege 884 WMIC.exe Token: SeUndockPrivilege 884 WMIC.exe Token: SeManageVolumePrivilege 884 WMIC.exe Token: 33 884 WMIC.exe Token: 34 884 WMIC.exe Token: 35 884 WMIC.exe Token: 36 884 WMIC.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 2560 attrib.exe 2720 attrib.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
javaw.exejava.exejavaw.exejava.exepid process 3928 javaw.exe 3496 java.exe 3172 javaw.exe 3964 java.exe -
Adds Run entry to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\oLiRcQboziP = "\"C:\\Program Files\\Java\\jre1.8.0_66\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\XtfbYFSllUG\\HSlpmBTQGBC.ckIzMd\"" reg.exe -
Drops file in System32 directory 4 IoCs
Processes:
javaw.exejava.exejavaw.exejava.exedescription ioc process File opened for modification C:\Windows\System32\test.txt javaw.exe File opened for modification C:\Windows\System32\test.txt java.exe File created C:\Windows\System32\test.txt javaw.exe File opened for modification C:\Windows\System32\test.txt java.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\IMG-29062020.jar1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\wscript.exewscript C:\Users\Admin\xdssilkvar.js2⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\szwjsw.txt"3⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetWindowsHookEx
- Drops file in System32 directory
-
C:\Program Files\Java\jre1.8.0_66\bin\java.exe"C:\Program Files\Java\jre1.8.0_66\bin\java.exe" -jar C:\Users\Admin\AppData\Local\Temp\_0.5500043542587664535895544992704730.class4⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetWindowsHookEx
- Drops file in System32 directory
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive9102361154719635456.vbs5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cscript.execscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive9102361154719635456.vbs6⤵
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive3332808210308483435.vbs5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cscript.execscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive3332808210308483435.vbs6⤵
-
C:\Windows\SYSTEM32\xcopy.exexcopy "C:\Program Files\Java\jre1.8.0_66" "C:\Users\Admin\AppData\Roaming\Oracle\" /e5⤵
-
C:\Windows\SYSTEM32\cmd.execmd.exe5⤵
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive8900040432391221653.vbs4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cscript.execscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive8900040432391221653.vbs5⤵
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive6111636188304267445.vbs4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cscript.execscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive6111636188304267445.vbs5⤵
-
C:\Windows\SYSTEM32\xcopy.exexcopy "C:\Program Files\Java\jre1.8.0_66" "C:\Users\Admin\AppData\Roaming\Oracle\" /e4⤵
-
C:\Windows\SYSTEM32\cmd.execmd.exe4⤵
-
C:\Windows\SYSTEM32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v oLiRcQboziP /t REG_EXPAND_SZ /d "\"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe\" -jar \"C:\Users\Admin\XtfbYFSllUG\HSlpmBTQGBC.ckIzMd\"" /f4⤵
- Modifies registry key
- Adds Run entry to start application
-
C:\Windows\SYSTEM32\attrib.exeattrib +h "C:\Users\Admin\XtfbYFSllUG\*.*"4⤵
- Views/modifies file attributes
-
C:\Windows\SYSTEM32\attrib.exeattrib +h "C:\Users\Admin\XtfbYFSllUG"4⤵
- Views/modifies file attributes
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar C:\Users\Admin\XtfbYFSllUG\HSlpmBTQGBC.ckIzMd4⤵
- Suspicious use of WriteProcessMemory
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Drops file in System32 directory
-
C:\Program Files\Java\jre1.8.0_66\bin\java.exe"C:\Program Files\Java\jre1.8.0_66\bin\java.exe" -jar C:\Users\Admin\AppData\Local\Temp\_0.64827634505706045298261972483566453.class5⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetWindowsHookEx
- Drops file in System32 directory
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive1449502388640580975.vbs6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cscript.execscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive1449502388640580975.vbs7⤵
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive4710925469300568618.vbs6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cscript.execscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive4710925469300568618.vbs7⤵
-
C:\Windows\SYSTEM32\cmd.execmd.exe6⤵
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive5550640236244372157.vbs5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cscript.execscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive5550640236244372157.vbs6⤵
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive7735343372693442479.vbs5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cscript.execscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive7735343372693442479.vbs6⤵
-
C:\Windows\SYSTEM32\cmd.execmd.exe5⤵
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\cimv2 Path Win32_PnpSignedDriver Get /Format:List5⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\.oracle_jre_usage\90737d32e3aba4b.timestamp
-
C:\Users\Admin\.oracle_jre_usage\90737d32e3aba4b.timestamp
-
C:\Users\Admin\.oracle_jre_usage\90737d32e3aba4b.timestamp
-
C:\Users\Admin\.oracle_jre_usage\90737d32e3aba4b.timestamp
-
C:\Users\Admin\AppData\Local\Temp\Retrive1449502388640580975.vbs
-
C:\Users\Admin\AppData\Local\Temp\Retrive3332808210308483435.vbs
-
C:\Users\Admin\AppData\Local\Temp\Retrive4710925469300568618.vbs
-
C:\Users\Admin\AppData\Local\Temp\Retrive5550640236244372157.vbs
-
C:\Users\Admin\AppData\Local\Temp\Retrive6111636188304267445.vbs
-
C:\Users\Admin\AppData\Local\Temp\Retrive7735343372693442479.vbs
-
C:\Users\Admin\AppData\Local\Temp\Retrive8900040432391221653.vbs
-
C:\Users\Admin\AppData\Local\Temp\Retrive9102361154719635456.vbs
-
C:\Users\Admin\AppData\Local\Temp\_0.5500043542587664535895544992704730.class
-
C:\Users\Admin\AppData\Local\Temp\_0.64827634505706045298261972483566453.class
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2066881839-3229799743-3576549721-1000\83aa4cc77f591dfc2374580bbd95f6ba_664a9041-4ac4-46f3-b3dc-87db4d57890e
-
C:\Users\Admin\AppData\Roaming\szwjsw.txt
-
C:\Users\Admin\XtfbYFSllUG\HSlpmBTQGBC.ckIzMd
-
C:\Users\Admin\XtfbYFSllUG\ID.txt
-
C:\Users\Admin\fUTkALeaTxM\ID.txt
-
C:\Users\Admin\xdssilkvar.js
-
C:\Windows\System32\test.txt
-
C:\Windows\System32\test.txt
-
C:\Windows\System32\test.txt
-
\Users\Admin\AppData\Local\Temp\Windows1536363767033249568.dll
-
memory/396-37-0x0000000000000000-mapping.dmp
-
memory/416-34-0x0000000000000000-mapping.dmp
-
memory/540-35-0x0000000000000000-mapping.dmp
-
memory/804-36-0x0000000000000000-mapping.dmp
-
memory/848-67-0x0000000000000000-mapping.dmp
-
memory/884-103-0x0000000000000000-mapping.dmp
-
memory/1052-70-0x0000000000000000-mapping.dmp
-
memory/1356-43-0x0000000000000000-mapping.dmp
-
memory/1576-76-0x0000000000000000-mapping.dmp
-
memory/1580-75-0x0000000000000000-mapping.dmp
-
memory/1592-46-0x0000000000000000-mapping.dmp
-
memory/1672-42-0x0000000000000000-mapping.dmp
-
memory/1692-44-0x0000000000000000-mapping.dmp
-
memory/1760-93-0x0000000000000000-mapping.dmp
-
memory/2144-79-0x0000000000000000-mapping.dmp
-
memory/2448-49-0x0000000000000000-mapping.dmp
-
memory/2560-50-0x0000000000000000-mapping.dmp
-
memory/2684-81-0x0000000000000000-mapping.dmp
-
memory/2720-51-0x0000000000000000-mapping.dmp
-
memory/3036-25-0x0000000000000000-mapping.dmp
-
memory/3172-52-0x0000000000000000-mapping.dmp
-
memory/3496-7-0x0000000000000000-mapping.dmp
-
memory/3500-88-0x0000000000000000-mapping.dmp
-
memory/3816-1-0x0000000000000000-mapping.dmp
-
memory/3820-89-0x0000000000000000-mapping.dmp
-
memory/3820-24-0x0000000000000000-mapping.dmp
-
memory/3832-28-0x0000000000000000-mapping.dmp
-
memory/3868-32-0x0000026EA9A70000-0x0000026EA9A74000-memory.dmpFilesize
16KB
-
memory/3868-29-0x0000000000000000-mapping.dmp
-
memory/3912-84-0x0000000000000000-mapping.dmp
-
memory/3928-3-0x0000000000000000-mapping.dmp
-
memory/3964-57-0x0000000000000000-mapping.dmp