Analysis
-
max time kernel
9s -
max time network
89s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-06-2022 10:03
Static task
static1
Behavioral task
behavioral1
Sample
justificante.jar
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
justificante.jar
Resource
win10v2004-20220414-en
General
-
Target
justificante.jar
-
Size
647KB
-
MD5
f2862159a6e80713e03cf09ad149b4e3
-
SHA1
740f32542b8e53908e02f3db0234736648085236
-
SHA256
2b4db73f2e681b7f7d5b0b4cee46453428c4dd3c9c94070ef8840fc73a54d58a
-
SHA512
8c62ee4181f42f66004dd15317842d9bd56fbceecd6628a7146c0774605bc6ba157f5028eb4900618f38d0308304252081eabf21a419a8befb7c03774b9318a6
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000_Classes\Local Settings wscript.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
java.exewscript.exedescription pid process target process PID 5012 wrote to memory of 4876 5012 java.exe wscript.exe PID 5012 wrote to memory of 4876 5012 java.exe wscript.exe PID 4876 wrote to memory of 2660 4876 wscript.exe WScript.exe PID 4876 wrote to memory of 2660 4876 wscript.exe WScript.exe PID 4876 wrote to memory of 868 4876 wscript.exe javaw.exe PID 4876 wrote to memory of 868 4876 wscript.exe javaw.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\justificante.jar1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\wscript.exewscript C:\Users\Admin\oddlcjbdnx.js2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\tKNFBZAbcx.js"3⤵
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\eshehdqwc.txt"3⤵
-
C:\Program Files\Java\jre1.8.0_66\bin\java.exe"C:\Program Files\Java\jre1.8.0_66\bin\java.exe" -jar C:\Users\Admin\AppData\Local\Temp\_0.72709693629456055531469728943655516.class4⤵
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive731692836177338778.vbs5⤵
-
C:\Windows\system32\cscript.execscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive731692836177338778.vbs6⤵
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive5516255629706292180.vbs5⤵
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive3956977541534481935.vbs4⤵
-
C:\Windows\system32\cscript.execscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive3956977541534481935.vbs5⤵
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive2094860766618857276.vbs4⤵
-
C:\Windows\system32\cscript.execscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive2094860766618857276.vbs5⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\.oracle_jre_usage\90737d32e3aba4b.timestampFilesize
50B
MD5ce84ec52a35038955b1cfbc0a034de70
SHA18305644ac0e0fa479c7f5b2120b2fc373fc65dc9
SHA2569bf73301b0863587f35dfe124165e2f4406310819e1b38fb8c981aa3f4bd74f6
SHA51261c1f1e74baacd95a952a28880a2228a482cfeff37f95b70739af5ff2728dc58d98d7834d14eac5401d39d1faf21ab7061c5cc32c390cfa6df2de270405f075c
-
C:\Users\Admin\.oracle_jre_usage\90737d32e3aba4b.timestampFilesize
50B
MD5ea3706cda12b4b363227751cc0676662
SHA1fbac2a19c15616c8797eddf1711712ecfc88f689
SHA256688a0c69e39742bbe3219f8d6ba7e5db709ff50a70982bfa0755d907672c9efa
SHA5128d74293acdb00f780c2d962d43219f1211a5c32e39a4fc4e2b53142bd835e88846c3e315429ac9beb23f7877a141da385a26d1f802d7bcffa5f4f834fbf8e62e
-
C:\Users\Admin\AppData\Local\Temp\Retrive3956977541534481935.vbsFilesize
276B
MD53bdfd33017806b85949b6faa7d4b98e4
SHA1f92844fee69ef98db6e68931adfaa9a0a0f8ce66
SHA2569da575dd2d5b7c1e9bab8b51a16cde457b3371c6dcdb0537356cf1497fa868f6
SHA512ae5e5686ae71edef53e71cd842cb6799e4383b9c238a5c361b81647efa128d2fedf3bf464997771b5b0c47a058fecae7829aeedcd098c80a11008581e5781429
-
C:\Users\Admin\AppData\Local\Temp\Retrive731692836177338778.vbsFilesize
276B
MD53bdfd33017806b85949b6faa7d4b98e4
SHA1f92844fee69ef98db6e68931adfaa9a0a0f8ce66
SHA2569da575dd2d5b7c1e9bab8b51a16cde457b3371c6dcdb0537356cf1497fa868f6
SHA512ae5e5686ae71edef53e71cd842cb6799e4383b9c238a5c361b81647efa128d2fedf3bf464997771b5b0c47a058fecae7829aeedcd098c80a11008581e5781429
-
C:\Users\Admin\AppData\Local\Temp\_0.72709693629456055531469728943655516.classFilesize
241KB
MD5781fb531354d6f291f1ccab48da6d39f
SHA19ce4518ebcb5be6d1f0b5477fa00c26860fe9a68
SHA25697d585b6aff62fb4e43e7e6a5f816dcd7a14be11a88b109a9ba9e8cd4c456eb9
SHA5123e6630f5feb4a3eb1dac7e9125ce14b1a2a45d7415cf44cea42bc51b2a9aa37169ee4a4c36c888c8f2696e7d6e298e2ad7b2f4c22868aaa5948210eb7db220d8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1809750270-3141839489-3074374771-1000\83aa4cc77f591dfc2374580bbd95f6ba_2c7a2658-1166-4e8e-b7f6-c01b4ff97801Filesize
45B
MD5c8366ae350e7019aefc9d1e6e6a498c6
SHA15731d8a3e6568a5f2dfbbc87e3db9637df280b61
SHA25611e6aca8e682c046c83b721eeb5c72c5ef03cb5936c60df6f4993511ddc61238
SHA51233c980d5a638bfc791de291ebf4b6d263b384247ab27f261a54025108f2f85374b579a026e545f81395736dd40fa4696f2163ca17640dd47f1c42bc9971b18cd
-
C:\Users\Admin\AppData\Roaming\eshehdqwc.txtFilesize
479KB
MD50af2ffb0e3a810f556a0eef909a5ecc7
SHA1641fe60bfa8569a0a13dc9279ea1cafb5cb912ad
SHA2569d05feba177ac6b9433f0a28bf9e6ba9828f1621f625f7ca80009a1cf5b5374b
SHA512883f01a0d0c2ed6ada0dd3d2b4548d01b54f6cf4fcfd6a39f9a61511147fefc4ea8ad4392873fd54e4d7c1c04adc01c94bf99447ddfcde925340ae4ea409b1c9
-
C:\Users\Admin\AppData\Roaming\tKNFBZAbcx.jsFilesize
30KB
MD5fa3fd06cbfb568048b94746fe7846ac6
SHA1242538e1e09cb9d5342441e981946a12d111860d
SHA256f827c5ccc625f33515de3e7019cca67c06066ebf460288b47c464002ef0390a1
SHA5125e4d960cc58256d4a9f94dbb2556d19aa362be0a4e26133f0a42e9392457f405a3d0c68235e1781a33dc625c03777b28970a6a10aea8e3a1ef7e92bf3cf7dab7
-
C:\Users\Admin\oddlcjbdnx.jsFilesize
969KB
MD506a575d37fb3ed9c959b6f5ee7d4794c
SHA1bad9d9875c3ea3e50bf0b111dc54fef104162afb
SHA256d7c9739a75f4218fd75acf6c86d04e55b5d5d618bd99ee3cd34b57e52e2de4b9
SHA512d686fc32aba72091387cb89a2ab9f1b8e31aad47085fea0f017e7a94a25dfef1ba5f064859333dfebfc405750077f893d06b53438f60d1cc0c4c7b32853fa289
-
memory/868-145-0x0000000000000000-mapping.dmp
-
memory/868-155-0x00000000032B0000-0x00000000042B0000-memory.dmpFilesize
16.0MB
-
memory/868-179-0x00000000032B0000-0x00000000042B0000-memory.dmpFilesize
16.0MB
-
memory/868-189-0x00000000032B0000-0x00000000042B0000-memory.dmpFilesize
16.0MB
-
memory/868-177-0x00000000032B0000-0x00000000042B0000-memory.dmpFilesize
16.0MB
-
memory/1780-198-0x0000000000000000-mapping.dmp
-
memory/2096-170-0x0000000002FC0000-0x0000000003FC0000-memory.dmpFilesize
16.0MB
-
memory/2096-158-0x0000000000000000-mapping.dmp
-
memory/2096-196-0x0000000002FC0000-0x0000000003FC0000-memory.dmpFilesize
16.0MB
-
memory/2660-143-0x0000000000000000-mapping.dmp
-
memory/3148-185-0x0000000000000000-mapping.dmp
-
memory/3568-195-0x0000000000000000-mapping.dmp
-
memory/4692-192-0x0000000000000000-mapping.dmp
-
memory/4712-190-0x0000000000000000-mapping.dmp
-
memory/4812-191-0x0000000000000000-mapping.dmp
-
memory/4876-140-0x0000000000000000-mapping.dmp
-
memory/4880-197-0x0000000000000000-mapping.dmp
-
memory/5012-134-0x0000000003020000-0x0000000004020000-memory.dmpFilesize
16.0MB