Analysis

  • max time kernel
    122s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    18/08/2021, 10:00

General

  • Target

    Shipment Details.jar

  • Size

    332KB

  • MD5

    2502c807c3327021f622fd468781f85d

  • SHA1

    47d237b21f15e64bd56f0eff1fe3df549f355ae2

  • SHA256

    2870e91faf799f431115adfd00bc8a7573f197c29b57d3f7e3f6f85eee28928b

  • SHA512

    1a097a75053cc5bb0cc1896fdc0a7713b97048a909d0baf10f496334e5dcce6a0cbd3a65d1992039125eaa4944ab40c8587ac91c4924824452ba0a95dc394c14

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\java.exe
    java -jar "C:\Users\Admin\AppData\Local\Temp\Shipment Details.jar"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1856
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1856 -s 148
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:1972

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1856-60-0x000007FEFBAB1000-0x000007FEFBAB3000-memory.dmp

    Filesize

    8KB

  • memory/1972-63-0x0000000001D70000-0x0000000001D71000-memory.dmp

    Filesize

    4KB