Analysis
-
max time kernel
11s -
max time network
135s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
22-04-2021 05:56
Static task
static1
Behavioral task
behavioral1
Sample
PO#5200668.jar
Resource
win7v20210408
Behavioral task
behavioral2
Sample
PO#5200668.jar
Resource
win10v20210410
General
-
Target
PO#5200668.jar
-
Size
175KB
-
MD5
3ad760b40ee49e61becff81d532ac85e
-
SHA1
1a876cf8130ece99630865cd70810f3dd5166679
-
SHA256
46a4cab8778211dc9bc824b607741cd03c8fdb799a8e90d106efc22f57b06281
-
SHA512
d7fdee20687ce29d41b1620c8afa2e94c4f8f40c049542148942bbf2ac05646f045bd0cce1a64999e1ef4ff3d6ff99bab4819db76b35df8c65f648089ca9b5ff
Malware Config
Signatures
-
Drops file in Program Files directory 12 IoCs
Processes:
javaw.exedescription ioc process File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\dll\jvm.pdb javaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
java.exewscript.exedescription pid process target process PID 3948 wrote to memory of 2340 3948 java.exe wscript.exe PID 3948 wrote to memory of 2340 3948 java.exe wscript.exe PID 2340 wrote to memory of 3944 2340 wscript.exe javaw.exe PID 2340 wrote to memory of 3944 2340 wscript.exe javaw.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\PO#5200668.jar1⤵
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SYSTEM32\wscript.exewscript C:\Users\Admin\vpjwxgdblj.js2⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\lmrhzukher.txt"3⤵
- Drops file in Program Files directory
PID:3944
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
2c71e90bca1c329837a79fe3aad0ceaa
SHA1ef6e1c20b845552f0bc935ae4a5aa2c4624d6d4f
SHA256166f79d0a36cef802e7def27ef9678f4f543f2b2a542bed8fbf99c0cb2d834c1
SHA512f9f16c7ac434ff5956e3445853aff7e41544fd2fa64e0132b1a17fd34b12b264c202a69d8e1eaab89750291eeb6e480d831dccedb06aa46063eb487204c10c57
-
MD5
c33235baef599c49bd6fa9020f528ec5
SHA1ad9743c9322d4aef8690c47b7c311e5290e287a6
SHA256f3a96713037135119cc21ee6a5be2b0dc91647e238e8a31a1f2d8ed96da1abb7
SHA51213467e597e03b7255caae6427787264caf93cd1067e40eb81081592aa33305a0160d4cb7fd550bab002ee10da9a4aa63175eccf039b0c32390f9aec43fffc777
-
MD5
5e8270b67440e1b89173cffd00d83eeb
SHA1f6a4813914e80bb14df5c44554f1ee7a8bed78db
SHA256daa4d87d858855984ffbe54cf74518dd3a850bad761974ca9a46693d0d672770
SHA512b17e576cd3b0b43fa8f7facac3b842e366df7d0686825dbd85cd7203503e50ac9660a800fc0a68472832d294bb5272e70c394572adecd265e4037e11141610d1