Analysis

  • max time kernel
    152s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    05-02-2022 18:48

General

  • Target

    invoice 837001.jar

  • Size

    5KB

  • MD5

    2290ca0172c7e5d2f4fa99ab4546c569

  • SHA1

    87a97ef2c7c8b202146b370be396b0f09412ec9f

  • SHA256

    fbee6ba15c3a034b99b5e92524c7dfb1ee2aad1a0ce4a4f9df87eeb85f9d3e21

  • SHA512

    4b88d19f62b6a8fdc3857b79eb78531d762f98a619ec41426fcb4ee455e5425ad21898f3b2d07c3289168acdd9643c1dd8f5858db4bf7b341f8b7c519ecf52d6

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 12 IoCs
  • Drops file in Windows directory 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 47 IoCs

Processes

  • C:\ProgramData\Oracle\Java\javapath\java.exe
    java -jar "C:\Users\Admin\AppData\Local\Temp\invoice 837001.jar"
    1⤵
    • Drops file in Program Files directory
    PID:396
  • C:\Windows\system32\MusNotifyIcon.exe
    %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
    1⤵
    • Checks processor information in registry
    PID:432
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    PID:1940

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/396-131-0x0000000002B60000-0x0000000011C60000-memory.dmp
    Filesize

    241.0MB

  • memory/396-132-0x0000000001160000-0x0000000001161000-memory.dmp
    Filesize

    4KB

  • memory/396-149-0x0000000001160000-0x0000000001161000-memory.dmp
    Filesize

    4KB

  • memory/396-160-0x0000000002B60000-0x0000000011C60000-memory.dmp
    Filesize

    241.0MB