Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
17-06-2021 09:37
Static task
static1
Behavioral task
behavioral1
Sample
Shipment Details & AWB.jar
Resource
win7v20210410
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Shipment Details & AWB.jar
Resource
win10v20210408
0 signatures
0 seconds
General
-
Target
Shipment Details & AWB.jar
-
Size
332KB
-
MD5
a4d00a4bb116788bf744eb99fdd8c705
-
SHA1
727219cfb38b427d660742cc3a6396a9d6ad2d16
-
SHA256
609bb0d31076f8b0ea511a367bf560f998eb8641c6b542cf56a8d30174eb3a3f
-
SHA512
b59343da967f9d0648aa9342d7599156026469eebf74114603160a9c5838826d69fa13c47f02ad245649e931a7193b98ac3de214407d00ac9ad937ea685b8d86
Score
7/10
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Shipment Details & AWB.jar java.exe -
Loads dropped DLL 1 IoCs
pid Process 800 java.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Shipment Details & AWB.jar = "C:\\Users\\Admin\\AppData\\Roaming\\Shipment Details & AWB.jar" REG.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 196 REG.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 800 java.exe 800 java.exe 800 java.exe 800 java.exe 800 java.exe 800 java.exe 800 java.exe 800 java.exe 800 java.exe 800 java.exe 800 java.exe 800 java.exe 800 java.exe 800 java.exe 800 java.exe 800 java.exe 800 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 800 wrote to memory of 196 800 java.exe 76 PID 800 wrote to memory of 196 800 java.exe 76 PID 800 wrote to memory of 3796 800 java.exe 78 PID 800 wrote to memory of 3796 800 java.exe 78 PID 800 wrote to memory of 2288 800 java.exe 79 PID 800 wrote to memory of 2288 800 java.exe 79 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 3796 attrib.exe 2288 attrib.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\Shipment Details & AWB.jar"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\SYSTEM32\REG.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "Shipment Details & AWB.jar" /d "C:\Users\Admin\AppData\Roaming\Shipment Details & AWB.jar" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:196
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Shipment Details & AWB.jar2⤵
- Views/modifies file attributes
PID:3796
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Shipment Details & AWB.jar2⤵
- Views/modifies file attributes
PID:2288
-