Analysis

  • max time kernel
    149s
  • max time network
    130s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    29-06-2020 18:11

General

  • Target

    IMG-29062020.jar

  • Size

    608KB

  • MD5

    e2fdebfb3346325ae26240e1c2e0319b

  • SHA1

    e2731770f57600dd347759523db864cf8fd68e7a

  • SHA256

    85b509c3352dde65b7dbd7c56207e2bcfe8245bf851132cbd61b93f4343077fc

  • SHA512

    4e0f30e6f8adb8b3fd7d1af9120907884d3447e1a6b41d8fac9d6fb5ad8b5e90a223474bda641f64a3f2cfecba06229e562b37e12a2f310d2d09db07a39475d7

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 62 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Adds Run entry to start application 2 TTPs 2 IoCs
  • AdWind

    A Java-based RAT family operated as malware-as-a-service.

  • Drops file in System32 directory 4 IoCs

Processes

  • C:\ProgramData\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\IMG-29062020.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3104
    • C:\Windows\SYSTEM32\wscript.exe
      wscript C:\Users\Admin\xdssilkvar.js
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3816
      • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
        "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\szwjsw.txt"
        3⤵
        • Suspicious use of WriteProcessMemory
        • Suspicious use of SetWindowsHookEx
        • Drops file in System32 directory
        PID:3928
        • C:\Program Files\Java\jre1.8.0_66\bin\java.exe
          "C:\Program Files\Java\jre1.8.0_66\bin\java.exe" -jar C:\Users\Admin\AppData\Local\Temp\_0.5500043542587664535895544992704730.class
          4⤵
          • Suspicious use of WriteProcessMemory
          • Suspicious use of SetWindowsHookEx
          • Drops file in System32 directory
          PID:3496
          • C:\Windows\SYSTEM32\cmd.exe
            cmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive9102361154719635456.vbs
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3036
            • C:\Windows\system32\cscript.exe
              cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive9102361154719635456.vbs
              6⤵
                PID:3868
            • C:\Windows\SYSTEM32\cmd.exe
              cmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive3332808210308483435.vbs
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:416
              • C:\Windows\system32\cscript.exe
                cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive3332808210308483435.vbs
                6⤵
                  PID:804
              • C:\Windows\SYSTEM32\xcopy.exe
                xcopy "C:\Program Files\Java\jre1.8.0_66" "C:\Users\Admin\AppData\Roaming\Oracle\" /e
                5⤵
                  PID:1672
                • C:\Windows\SYSTEM32\cmd.exe
                  cmd.exe
                  5⤵
                    PID:1592
                • C:\Windows\SYSTEM32\cmd.exe
                  cmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive8900040432391221653.vbs
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3820
                  • C:\Windows\system32\cscript.exe
                    cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive8900040432391221653.vbs
                    5⤵
                      PID:3832
                  • C:\Windows\SYSTEM32\cmd.exe
                    cmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive6111636188304267445.vbs
                    4⤵
                    • Suspicious use of WriteProcessMemory
                    PID:540
                    • C:\Windows\system32\cscript.exe
                      cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive6111636188304267445.vbs
                      5⤵
                        PID:396
                    • C:\Windows\SYSTEM32\xcopy.exe
                      xcopy "C:\Program Files\Java\jre1.8.0_66" "C:\Users\Admin\AppData\Roaming\Oracle\" /e
                      4⤵
                        PID:1356
                      • C:\Windows\SYSTEM32\cmd.exe
                        cmd.exe
                        4⤵
                          PID:1692
                        • C:\Windows\SYSTEM32\reg.exe
                          reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v oLiRcQboziP /t REG_EXPAND_SZ /d "\"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe\" -jar \"C:\Users\Admin\XtfbYFSllUG\HSlpmBTQGBC.ckIzMd\"" /f
                          4⤵
                          • Modifies registry key
                          • Adds Run entry to start application
                          PID:2448
                        • C:\Windows\SYSTEM32\attrib.exe
                          attrib +h "C:\Users\Admin\XtfbYFSllUG\*.*"
                          4⤵
                          • Views/modifies file attributes
                          PID:2560
                        • C:\Windows\SYSTEM32\attrib.exe
                          attrib +h "C:\Users\Admin\XtfbYFSllUG"
                          4⤵
                          • Views/modifies file attributes
                          PID:2720
                        • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
                          "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar C:\Users\Admin\XtfbYFSllUG\HSlpmBTQGBC.ckIzMd
                          4⤵
                          • Suspicious use of WriteProcessMemory
                          • Loads dropped DLL
                          • Suspicious use of SetWindowsHookEx
                          • Drops file in System32 directory
                          PID:3172
                          • C:\Program Files\Java\jre1.8.0_66\bin\java.exe
                            "C:\Program Files\Java\jre1.8.0_66\bin\java.exe" -jar C:\Users\Admin\AppData\Local\Temp\_0.64827634505706045298261972483566453.class
                            5⤵
                            • Suspicious use of WriteProcessMemory
                            • Suspicious use of SetWindowsHookEx
                            • Drops file in System32 directory
                            PID:3964
                            • C:\Windows\SYSTEM32\cmd.exe
                              cmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive1449502388640580975.vbs
                              6⤵
                              • Suspicious use of WriteProcessMemory
                              PID:2144
                              • C:\Windows\system32\cscript.exe
                                cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive1449502388640580975.vbs
                                7⤵
                                  PID:2684
                              • C:\Windows\SYSTEM32\cmd.exe
                                cmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive4710925469300568618.vbs
                                6⤵
                                • Suspicious use of WriteProcessMemory
                                PID:3500
                                • C:\Windows\system32\cscript.exe
                                  cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive4710925469300568618.vbs
                                  7⤵
                                    PID:3820
                                • C:\Windows\SYSTEM32\cmd.exe
                                  cmd.exe
                                  6⤵
                                    PID:1760
                                • C:\Windows\SYSTEM32\cmd.exe
                                  cmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive5550640236244372157.vbs
                                  5⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:848
                                  • C:\Windows\system32\cscript.exe
                                    cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive5550640236244372157.vbs
                                    6⤵
                                      PID:1052
                                  • C:\Windows\SYSTEM32\cmd.exe
                                    cmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive7735343372693442479.vbs
                                    5⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:1580
                                    • C:\Windows\system32\cscript.exe
                                      cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive7735343372693442479.vbs
                                      6⤵
                                        PID:1576
                                    • C:\Windows\SYSTEM32\cmd.exe
                                      cmd.exe
                                      5⤵
                                        PID:3912
                                      • C:\Windows\System32\Wbem\WMIC.exe
                                        WMIC /Node:localhost /Namespace:\\root\cimv2 Path Win32_PnpSignedDriver Get /Format:List
                                        5⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:884

                              Network

                              MITRE ATT&CK Matrix ATT&CK v6

                              Persistence

                              Hidden Files and Directories

                              1
                              T1158

                              Registry Run Keys / Startup Folder

                              1
                              T1060

                              Defense Evasion

                              Modify Registry

                              2
                              T1112

                              Hidden Files and Directories

                              1
                              T1158

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\.oracle_jre_usage\90737d32e3aba4b.timestamp
                              • C:\Users\Admin\.oracle_jre_usage\90737d32e3aba4b.timestamp
                              • C:\Users\Admin\.oracle_jre_usage\90737d32e3aba4b.timestamp
                              • C:\Users\Admin\.oracle_jre_usage\90737d32e3aba4b.timestamp
                              • C:\Users\Admin\AppData\Local\Temp\Retrive1449502388640580975.vbs
                              • C:\Users\Admin\AppData\Local\Temp\Retrive3332808210308483435.vbs
                              • C:\Users\Admin\AppData\Local\Temp\Retrive4710925469300568618.vbs
                              • C:\Users\Admin\AppData\Local\Temp\Retrive5550640236244372157.vbs
                              • C:\Users\Admin\AppData\Local\Temp\Retrive6111636188304267445.vbs
                              • C:\Users\Admin\AppData\Local\Temp\Retrive7735343372693442479.vbs
                              • C:\Users\Admin\AppData\Local\Temp\Retrive8900040432391221653.vbs
                              • C:\Users\Admin\AppData\Local\Temp\Retrive9102361154719635456.vbs
                              • C:\Users\Admin\AppData\Local\Temp\_0.5500043542587664535895544992704730.class
                              • C:\Users\Admin\AppData\Local\Temp\_0.64827634505706045298261972483566453.class
                              • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2066881839-3229799743-3576549721-1000\83aa4cc77f591dfc2374580bbd95f6ba_664a9041-4ac4-46f3-b3dc-87db4d57890e
                              • C:\Users\Admin\AppData\Roaming\szwjsw.txt
                              • C:\Users\Admin\XtfbYFSllUG\HSlpmBTQGBC.ckIzMd
                              • C:\Users\Admin\XtfbYFSllUG\ID.txt
                              • C:\Users\Admin\fUTkALeaTxM\ID.txt
                              • C:\Users\Admin\xdssilkvar.js
                              • C:\Windows\System32\test.txt
                              • C:\Windows\System32\test.txt
                              • C:\Windows\System32\test.txt
                              • \Users\Admin\AppData\Local\Temp\Windows1536363767033249568.dll
                              • memory/396-37-0x0000000000000000-mapping.dmp
                              • memory/416-34-0x0000000000000000-mapping.dmp
                              • memory/540-35-0x0000000000000000-mapping.dmp
                              • memory/804-36-0x0000000000000000-mapping.dmp
                              • memory/848-67-0x0000000000000000-mapping.dmp
                              • memory/884-103-0x0000000000000000-mapping.dmp
                              • memory/1052-70-0x0000000000000000-mapping.dmp
                              • memory/1356-43-0x0000000000000000-mapping.dmp
                              • memory/1576-76-0x0000000000000000-mapping.dmp
                              • memory/1580-75-0x0000000000000000-mapping.dmp
                              • memory/1592-46-0x0000000000000000-mapping.dmp
                              • memory/1672-42-0x0000000000000000-mapping.dmp
                              • memory/1692-44-0x0000000000000000-mapping.dmp
                              • memory/1760-93-0x0000000000000000-mapping.dmp
                              • memory/2144-79-0x0000000000000000-mapping.dmp
                              • memory/2448-49-0x0000000000000000-mapping.dmp
                              • memory/2560-50-0x0000000000000000-mapping.dmp
                              • memory/2684-81-0x0000000000000000-mapping.dmp
                              • memory/2720-51-0x0000000000000000-mapping.dmp
                              • memory/3036-25-0x0000000000000000-mapping.dmp
                              • memory/3172-52-0x0000000000000000-mapping.dmp
                              • memory/3496-7-0x0000000000000000-mapping.dmp
                              • memory/3500-88-0x0000000000000000-mapping.dmp
                              • memory/3816-1-0x0000000000000000-mapping.dmp
                              • memory/3820-89-0x0000000000000000-mapping.dmp
                              • memory/3820-24-0x0000000000000000-mapping.dmp
                              • memory/3832-28-0x0000000000000000-mapping.dmp
                              • memory/3868-32-0x0000026EA9A70000-0x0000026EA9A74000-memory.dmp
                                Filesize

                                16KB

                              • memory/3868-29-0x0000000000000000-mapping.dmp
                              • memory/3912-84-0x0000000000000000-mapping.dmp
                              • memory/3928-3-0x0000000000000000-mapping.dmp
                              • memory/3964-57-0x0000000000000000-mapping.dmp