Analysis

  • max time kernel
    120s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    30-07-2021 15:25

General

  • Target

    6db4bb653b7dc11b7cda176c18697d9b2a758b2e1de9b83e3804dce2fbc8ba97.jar

  • Size

    650KB

  • MD5

    a4a5060b5ecca405641bb1f3ac0052fd

  • SHA1

    0a304bae725613656099f5f8399a41ad6c1c744f

  • SHA256

    6db4bb653b7dc11b7cda176c18697d9b2a758b2e1de9b83e3804dce2fbc8ba97

  • SHA512

    2048da4b0cfcddaeb19eccd3a06bd28f1360eeb3106b095c16d38cf5170a05a3bf9ff6fa13a660db3ba878bebffb4a240ef13edc3afc10ec34140a964ba79010

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\6db4bb653b7dc11b7cda176c18697d9b2a758b2e1de9b83e3804dce2fbc8ba97.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1104
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1104 -s 148
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:1172

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1104-60-0x000007FEFBC81000-0x000007FEFBC83000-memory.dmp

    Filesize

    8KB

  • memory/1172-63-0x0000000002300000-0x0000000002301000-memory.dmp

    Filesize

    4KB