Analysis
-
max time kernel
155s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 07:01
Static task
static1
Behavioral task
behavioral1
Sample
b0f76db0b5074a60ea9ccd877b5d76d26e21e2f337ff1eccadddad472ba47346.jar
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
b0f76db0b5074a60ea9ccd877b5d76d26e21e2f337ff1eccadddad472ba47346.jar
Resource
win10v2004-20220414-en
General
-
Target
b0f76db0b5074a60ea9ccd877b5d76d26e21e2f337ff1eccadddad472ba47346.jar
-
Size
219KB
-
MD5
e2a04c764d82b5e2796e30c39cc65826
-
SHA1
57860e7b23857661fecf4be15d0b8fd2b6e3070a
-
SHA256
b0f76db0b5074a60ea9ccd877b5d76d26e21e2f337ff1eccadddad472ba47346
-
SHA512
d45206cb4a6d96690c4ff2587b7d62bcacbdcfeae66e97e9b3e41fbf174e2179f5d70b06aff046d10359956d0d08703bf460fa344da8e7e6a7d6ea0f73fb729d
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\J180295edf54:U41646d696e_s = "\"C:\\Program Files\\Java\\jre1.8.0_66\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\.6961235255699827262.jar\"" reg.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
java.exejava.exedescription pid process target process PID 3108 wrote to memory of 2836 3108 java.exe java.exe PID 3108 wrote to memory of 2836 3108 java.exe java.exe PID 2836 wrote to memory of 3476 2836 java.exe reg.exe PID 2836 wrote to memory of 3476 2836 java.exe reg.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\b0f76db0b5074a60ea9ccd877b5d76d26e21e2f337ff1eccadddad472ba47346.jar1⤵
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Program Files\Java\jre1.8.0_66\bin\java.exe"C:\Program Files\Java\jre1.8.0_66\bin\java.exe" -jar C:\Users\Admin\.6961235255699827262.jar2⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SYSTEM32\reg.exereg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v J180295edf54:U41646d696e_s /t REG_SZ /d "\"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe\" -jar \"C:\Users\Admin\.6961235255699827262.jar\""3⤵
- Adds Run key to start application
PID:3476
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219KB
MD5e2a04c764d82b5e2796e30c39cc65826
SHA157860e7b23857661fecf4be15d0b8fd2b6e3070a
SHA256b0f76db0b5074a60ea9ccd877b5d76d26e21e2f337ff1eccadddad472ba47346
SHA512d45206cb4a6d96690c4ff2587b7d62bcacbdcfeae66e97e9b3e41fbf174e2179f5d70b06aff046d10359956d0d08703bf460fa344da8e7e6a7d6ea0f73fb729d
-
Filesize
50B
MD5cef22f8d23630c88b9e8f1817b441044
SHA16ab1260c51b0d5ab891eae438ba0e127ee6738a1
SHA256cfe58b96be5fabb4d3279c465fcebf16a9160c3534acf84387f05a5d0b20ec9e
SHA512cfba6c5981db677d2f871c3607ba1860ff8fda5a73656b7b3d0868a935793725b5e9a29b6bc7a3f9855f16a66d4309db0d49df81948de4e9c459c107b4e84c02