Analysis

  • max time kernel
    124s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    14-09-2021 08:31

General

  • Target

    SHIPMENT DOCUMENTS.jar

  • Size

    332KB

  • MD5

    65c3cc0c03c3be1fac74b6c7fa846801

  • SHA1

    6c785194041c5a2d5ff5444cdef574244d3964ab

  • SHA256

    553efc7a1819810c1337c58f3008191f8fffee5e67849372c90e23f52668c373

  • SHA512

    0845582eb599bb7cc9d0c240affd61db3775979f89b43e323cf998fa1d00c90320b096bcd304707566e58973652dd28ce695ecfe3f766a4417300495ab4ec6e7

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\java.exe
    java -jar "C:\Users\Admin\AppData\Local\Temp\SHIPMENT DOCUMENTS.jar"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1052
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1052 -s 148
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:1980

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1052-60-0x000007FEFB681000-0x000007FEFB683000-memory.dmp

    Filesize

    8KB

  • memory/1980-61-0x0000000000000000-mapping.dmp

  • memory/1980-63-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB