Analysis
-
max time kernel
146s -
max time network
136s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
20-04-2021 09:03
Static task
static1
Behavioral task
behavioral1
Sample
5.jar
Resource
win7v20210408
Behavioral task
behavioral2
Sample
5.jar
Resource
win10v20210408
General
-
Target
5.jar
-
Size
630KB
-
MD5
085dc6e275b50f45fc1e7973d44af68e
-
SHA1
94cc43999b1104829fa0ddf16710fcc65f221731
-
SHA256
7c7d68c4590327e3c3b7ca47d8d1b6b6554a07940e4a7dadeb65534babd5d866
-
SHA512
188b37b6ae96d27e29377da18da4faabc0bceeeb82baf53b9e0fbcf99d02a14b5ddbd8220d2a5fb762d5b0bbea474587c75ee572f8673f46eb343dae0ea17905
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings wscript.exe -
Runs .reg file with regedit 1 IoCs
Processes:
regedit.exepid process 4272 regedit.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
java.exejavaw.exepid process 1068 java.exe 648 javaw.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
java.exewscript.exejavaw.exedescription pid process target process PID 4652 wrote to memory of 2204 4652 java.exe wscript.exe PID 4652 wrote to memory of 2204 4652 java.exe wscript.exe PID 2204 wrote to memory of 4272 2204 wscript.exe regedit.exe PID 2204 wrote to memory of 4272 2204 wscript.exe regedit.exe PID 2204 wrote to memory of 648 2204 wscript.exe javaw.exe PID 2204 wrote to memory of 648 2204 wscript.exe javaw.exe PID 648 wrote to memory of 1068 648 javaw.exe java.exe PID 648 wrote to memory of 1068 648 javaw.exe java.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\5.jar1⤵
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SYSTEM32\wscript.exewscript C:\Users\Admin\zfbgeiosgd.js2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\regedit.exe"regedit.exe" "C:\Users\Admin\AppData\Local\Temp\ebgeaegdbdecaedfebace.reg"3⤵
- Runs .reg file with regedit
PID:4272
-
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\lsugqiiuk.txt"3⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Program Files\Java\jre1.8.0_66\bin\java.exe"C:\Program Files\Java\jre1.8.0_66\bin\java.exe" -jar C:\Users\Admin\AppData\Local\Temp\_0.89725917730115055505510968248455488.class4⤵
- Suspicious use of SetWindowsHookEx
PID:1068
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
c868e98aa4da559da14c7dabbef4cdb1
SHA15b9c81de9bd98c44d9429c75ef4a7e1a21ad2ca7
SHA2564b5478636190ecbe5b514cb0b21c3068f846203514dfa259310fdad04f91fe59
SHA512bcbe2466aa63c9395368afb56f40864d9616068bb895834f07055d27c83f8825f9295e5e46f4697dce63c4336708620eeb6c4a19962ea191f7f2924a14b657a9
-
MD5
3d884905a875add212ce954d0a2b329d
SHA190d9c062218b37670493c504b5f9bc0ebdca27c3
SHA256c61cdee9bf71523f065e1d78535ab34ca75b479d7ff7e0dcacf20c19ed5386e0
SHA51269cbc9eb1426c71ea21f7fee9b7e0e8e9170c4e97d3770cfdaa8de118eea7c7b7e6a0bfdd97513b7c4973d49366d2a842b9642c550b8b7c95b6b835107eba5a2
-
MD5
781fb531354d6f291f1ccab48da6d39f
SHA19ce4518ebcb5be6d1f0b5477fa00c26860fe9a68
SHA25697d585b6aff62fb4e43e7e6a5f816dcd7a14be11a88b109a9ba9e8cd4c456eb9
SHA5123e6630f5feb4a3eb1dac7e9125ce14b1a2a45d7415cf44cea42bc51b2a9aa37169ee4a4c36c888c8f2696e7d6e298e2ad7b2f4c22868aaa5948210eb7db220d8
-
MD5
0e5411d7ecba9a435afda71c6c39d8fd
SHA12d6812052bf7be1b5e213e1d813ae39faa07284c
SHA256cb68d50df5817e51ec5b2f72893dc4c749bf3504519107e0a78dda84d55f09e2
SHA512903ac6e5c8a12607af267b54bcbbedfa5542c5b4f7ea289ab7c6a32a424d5b846ae406d830cb4ad48e2b46f92c504163c0856af8c3e09685a8855f39f616ddb1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1594587808-2047097707-2163810515-1000\83aa4cc77f591dfc2374580bbd95f6ba_cc51e87d-bda7-4ef7-80cf-c431fec6b805
MD5c8366ae350e7019aefc9d1e6e6a498c6
SHA15731d8a3e6568a5f2dfbbc87e3db9637df280b61
SHA25611e6aca8e682c046c83b721eeb5c72c5ef03cb5936c60df6f4993511ddc61238
SHA51233c980d5a638bfc791de291ebf4b6d263b384247ab27f261a54025108f2f85374b579a026e545f81395736dd40fa4696f2163ca17640dd47f1c42bc9971b18cd
-
MD5
5386ab97e1f8e6d079eba23149de7e47
SHA1341fe0494f31c6af8cf7690fa02dacd1c21907f2
SHA25685011ef9bc53b6d692e1e4cea0ba0a99dce82a53f3b0710c34b042a335150bb4
SHA512db4d391a2b49adedcba61a077a795a3f5c14441fdd76a6848df2c0a1a505178097ae1facdef2de844dbd826b7b20d767131e1b963bb6f273a7f4eed31ec570d3
-
MD5
a5011c0d79c897d84526c43e6c48c5c5
SHA151c4825a5ae17ffffae32dee5b7cf42b51cf20a2
SHA256094ddd437277579bf1c6d593ce40012222d8cea094159081cb9d8dc28a928b5a
SHA51277a6ab5890d2890241cd1fd2ae6316aee8458387ff4ad04f88c3407a386c8639199d32119b88b92f85b94bc4a05d8a9bdcb97a2bf2e8b3089a2c9aeb839cd5e8