Analysis
-
max time kernel
15s -
max time network
14s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
05-06-2022 12:13
Static task
static1
Behavioral task
behavioral1
Sample
Notification.jar
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Notification.jar
Resource
win10v2004-20220414-en
General
-
Target
Notification.jar
-
Size
157KB
-
MD5
8035ca2a6a358805d67efd00e2738626
-
SHA1
233d40497d566d0480aadea37a6e3062234a17fc
-
SHA256
51fb9721d665f58eb5c41cc4a2a75b112f505b18321e532dac33a3139770c207
-
SHA512
a31fc4df88a9511d1c558877fbb2aa31e15ab1566a5f031f737ea0a49a917721d8e86f213290230eefa058ade3ad2f88491c3bfb306a2e0a4221a6f91ede26e6
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2736 wrote to memory of 4420 2736 java.exe 82 PID 2736 wrote to memory of 4420 2736 java.exe 82
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\Notification.jar1⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar C:\Users\Admin\AppData\Local\Temp\ed8a9804.tmp2⤵PID:4420
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50B
MD5dbfe07f0b6896d652a745ac344d4edc0
SHA111242118e29f07637f1dc3d297d1522dda82fee0
SHA2562854b81bd61fc440520ae649c5e877fc7163df95cda39e3f692a81dacdb08433
SHA512aaf321d0b29991907ffb668b729604f4658fc3eed498e41d0cecdce36e444ddcc052baf9404aa303d6ba7b82222395ab36a3631c66124ad69e20bc96d16740ac
-
Filesize
157KB
MD58035ca2a6a358805d67efd00e2738626
SHA1233d40497d566d0480aadea37a6e3062234a17fc
SHA25651fb9721d665f58eb5c41cc4a2a75b112f505b18321e532dac33a3139770c207
SHA512a31fc4df88a9511d1c558877fbb2aa31e15ab1566a5f031f737ea0a49a917721d8e86f213290230eefa058ade3ad2f88491c3bfb306a2e0a4221a6f91ede26e6