Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-11-2020 18:11
Static task
static1
Behavioral task
behavioral1
Sample
02_extracted.jar
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
02_extracted.jar
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
02_extracted.jar
-
Size
83KB
-
MD5
9250c46915d7fc36a5605a3756447dec
-
SHA1
b33288cc02bf24008488b14e648943a214265067
-
SHA256
43e480eaff9c6da18d3c042231ed82f0a09a7adb3301311c159941e75a105a2c
-
SHA512
093e64939119d1d742428379ec05460a00c6b4d96c4e8fcb425bcd752cacfd18a394fe7d04671fd9f131beb89a41e9e0517d1238430820e5347e271a1090dc05
Score
10/10
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\02_extracted.jar java.exe -
Loads dropped DLL 3 IoCs
pid Process 3448 java.exe 1200 java.exe 2592 java.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\02_extracted = "\"C:\\Program Files\\Java\\jre1.8.0_66\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\02_extracted.jar\"" java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\02_extracted = "\"C:\\Program Files\\Java\\jre1.8.0_66\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\02_extracted.jar\"" java.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\plugins = "\"C:\\Program Files\\Java\\jre1.8.0_66\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\plugins.jar\" mp" java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\plugins = "\"C:\\Program Files\\Java\\jre1.8.0_66\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\plugins.jar\" mp" java.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 ip-api.com -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3232 WMIC.exe Token: SeSecurityPrivilege 3232 WMIC.exe Token: SeTakeOwnershipPrivilege 3232 WMIC.exe Token: SeLoadDriverPrivilege 3232 WMIC.exe Token: SeSystemProfilePrivilege 3232 WMIC.exe Token: SeSystemtimePrivilege 3232 WMIC.exe Token: SeProfSingleProcessPrivilege 3232 WMIC.exe Token: SeIncBasePriorityPrivilege 3232 WMIC.exe Token: SeCreatePagefilePrivilege 3232 WMIC.exe Token: SeBackupPrivilege 3232 WMIC.exe Token: SeRestorePrivilege 3232 WMIC.exe Token: SeShutdownPrivilege 3232 WMIC.exe Token: SeDebugPrivilege 3232 WMIC.exe Token: SeSystemEnvironmentPrivilege 3232 WMIC.exe Token: SeRemoteShutdownPrivilege 3232 WMIC.exe Token: SeUndockPrivilege 3232 WMIC.exe Token: SeManageVolumePrivilege 3232 WMIC.exe Token: 33 3232 WMIC.exe Token: 34 3232 WMIC.exe Token: 35 3232 WMIC.exe Token: 36 3232 WMIC.exe Token: SeIncreaseQuotaPrivilege 3232 WMIC.exe Token: SeSecurityPrivilege 3232 WMIC.exe Token: SeTakeOwnershipPrivilege 3232 WMIC.exe Token: SeLoadDriverPrivilege 3232 WMIC.exe Token: SeSystemProfilePrivilege 3232 WMIC.exe Token: SeSystemtimePrivilege 3232 WMIC.exe Token: SeProfSingleProcessPrivilege 3232 WMIC.exe Token: SeIncBasePriorityPrivilege 3232 WMIC.exe Token: SeCreatePagefilePrivilege 3232 WMIC.exe Token: SeBackupPrivilege 3232 WMIC.exe Token: SeRestorePrivilege 3232 WMIC.exe Token: SeShutdownPrivilege 3232 WMIC.exe Token: SeDebugPrivilege 3232 WMIC.exe Token: SeSystemEnvironmentPrivilege 3232 WMIC.exe Token: SeRemoteShutdownPrivilege 3232 WMIC.exe Token: SeUndockPrivilege 3232 WMIC.exe Token: SeManageVolumePrivilege 3232 WMIC.exe Token: 33 3232 WMIC.exe Token: 34 3232 WMIC.exe Token: 35 3232 WMIC.exe Token: 36 3232 WMIC.exe Token: SeIncreaseQuotaPrivilege 1328 WMIC.exe Token: SeSecurityPrivilege 1328 WMIC.exe Token: SeTakeOwnershipPrivilege 1328 WMIC.exe Token: SeLoadDriverPrivilege 1328 WMIC.exe Token: SeSystemProfilePrivilege 1328 WMIC.exe Token: SeSystemtimePrivilege 1328 WMIC.exe Token: SeProfSingleProcessPrivilege 1328 WMIC.exe Token: SeIncBasePriorityPrivilege 1328 WMIC.exe Token: SeCreatePagefilePrivilege 1328 WMIC.exe Token: SeBackupPrivilege 1328 WMIC.exe Token: SeRestorePrivilege 1328 WMIC.exe Token: SeShutdownPrivilege 1328 WMIC.exe Token: SeDebugPrivilege 1328 WMIC.exe Token: SeSystemEnvironmentPrivilege 1328 WMIC.exe Token: SeRemoteShutdownPrivilege 1328 WMIC.exe Token: SeUndockPrivilege 1328 WMIC.exe Token: SeManageVolumePrivilege 1328 WMIC.exe Token: 33 1328 WMIC.exe Token: 34 1328 WMIC.exe Token: 35 1328 WMIC.exe Token: 36 1328 WMIC.exe Token: SeIncreaseQuotaPrivilege 1328 WMIC.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1036 wrote to memory of 3448 1036 java.exe 77 PID 1036 wrote to memory of 3448 1036 java.exe 77 PID 3448 wrote to memory of 1200 3448 java.exe 82 PID 3448 wrote to memory of 1200 3448 java.exe 82 PID 1200 wrote to memory of 2592 1200 java.exe 84 PID 1200 wrote to memory of 2592 1200 java.exe 84 PID 1200 wrote to memory of 512 1200 java.exe 86 PID 1200 wrote to memory of 512 1200 java.exe 86 PID 512 wrote to memory of 3232 512 cmd.exe 88 PID 512 wrote to memory of 3232 512 cmd.exe 88 PID 1200 wrote to memory of 2080 1200 java.exe 90 PID 1200 wrote to memory of 2080 1200 java.exe 90 PID 2080 wrote to memory of 1328 2080 cmd.exe 92 PID 2080 wrote to memory of 1328 2080 cmd.exe 92 PID 1200 wrote to memory of 876 1200 java.exe 93 PID 1200 wrote to memory of 876 1200 java.exe 93 PID 876 wrote to memory of 3400 876 cmd.exe 95 PID 876 wrote to memory of 3400 876 cmd.exe 95 PID 1200 wrote to memory of 1512 1200 java.exe 96 PID 1200 wrote to memory of 1512 1200 java.exe 96 PID 1512 wrote to memory of 1856 1512 cmd.exe 98 PID 1512 wrote to memory of 1856 1512 cmd.exe 98
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\02_extracted.jar1⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Program Files\Java\jre1.8.0_66\bin\java.exe"C:\Program Files\Java\jre1.8.0_66\bin\java.exe" -jar "C:\Users\Admin\02_extracted.jar"2⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Program Files\Java\jre1.8.0_66\bin\java.exe"C:\Program Files\Java\jre1.8.0_66\bin\java.exe" -jar "C:\Users\Admin\AppData\Roaming\02_extracted.jar"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Program Files\Java\jre1.8.0_66\bin\java.exe"C:\Program Files\Java\jre1.8.0_66\bin\java.exe" -jar "C:\Users\Admin\AppData\Roaming\plugins.jar" mp4⤵
- Loads dropped DLL
- Adds Run key to start application
PID:2592
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list"4⤵
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\System32\Wbem\WMIC.exewmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list5⤵
- Suspicious use of AdjustPrivilegeToken
PID:3232
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list"4⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\System32\Wbem\WMIC.exewmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1328
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list"4⤵
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\System32\Wbem\WMIC.exewmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list5⤵PID:3400
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "wmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list"4⤵
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\System32\Wbem\WMIC.exewmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list5⤵PID:1856
-
-
-
-