Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
18-06-2021 13:07
Static task
static1
Behavioral task
behavioral1
Sample
COMPANY PURCHASE ORDER AND PROFILE.jar
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
COMPANY PURCHASE ORDER AND PROFILE.jar
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
COMPANY PURCHASE ORDER AND PROFILE.jar
-
Size
155KB
-
MD5
8dc388ab159f029f318a518ccbc06d15
-
SHA1
01a684c3be778e73c9bd004968eaa9c3d4834dcf
-
SHA256
95dd45bc7d3ad79b65a248b429d37688a7fe7fa78fb470c060fc269b0586ad47
-
SHA512
19cc0e90045ddab19e90f435cb7f8c4593074cdd00917ddac7f13d1b6bc423922946fbebae5278cc07cf93f0b925508cc1b62fad0ee5c8ae3925ac2c43a5b36e
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
REG.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\Adobe Java bridge = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\AIR\\jre13v3bridge.jar" REG.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
java.exepid process 2208 java.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
java.exedescription pid process target process PID 2208 wrote to memory of 3984 2208 java.exe REG.exe PID 2208 wrote to memory of 3984 2208 java.exe REG.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\COMPANY PURCHASE ORDER AND PROFILE.jar"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SYSTEM32\REG.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Adobe Java bridge" /d "C:\Users\Admin\AppData\Roaming\Adobe\AIR\jre13v3bridge.jar"2⤵
- Adds Run key to start application
- Modifies registry key
PID:3984
-