Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    18-06-2021 13:07

General

  • Target

    COMPANY PURCHASE ORDER AND PROFILE.jar

  • Size

    155KB

  • MD5

    8dc388ab159f029f318a518ccbc06d15

  • SHA1

    01a684c3be778e73c9bd004968eaa9c3d4834dcf

  • SHA256

    95dd45bc7d3ad79b65a248b429d37688a7fe7fa78fb470c060fc269b0586ad47

  • SHA512

    19cc0e90045ddab19e90f435cb7f8c4593074cdd00917ddac7f13d1b6bc423922946fbebae5278cc07cf93f0b925508cc1b62fad0ee5c8ae3925ac2c43a5b36e

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\ProgramData\Oracle\Java\javapath\java.exe
    java -jar "C:\Users\Admin\AppData\Local\Temp\COMPANY PURCHASE ORDER AND PROFILE.jar"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Windows\SYSTEM32\REG.exe
      REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Adobe Java bridge" /d "C:\Users\Admin\AppData\Roaming\Adobe\AIR\jre13v3bridge.jar"
      2⤵
      • Adds Run key to start application
      • Modifies registry key
      PID:3984

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2208-114-0x0000000002880000-0x0000000002AF0000-memory.dmp

    Filesize

    2.4MB

  • memory/2208-116-0x00000000023C0000-0x00000000023C1000-memory.dmp

    Filesize

    4KB

  • memory/2208-117-0x00000000023C0000-0x00000000023C1000-memory.dmp

    Filesize

    4KB

  • memory/3984-115-0x0000000000000000-mapping.dmp