Analysis

  • max time kernel
    34s
  • max time network
    36s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220715-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220715-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-07-2022 14:08

General

  • Target

    51e6ef0dc6e53caa9f6f7ed6f98d4b522405a5a3bc574a1ab6ff8f5de1558683.jar

  • Size

    630KB

  • MD5

    378d49919d2723b97da3490678395bbd

  • SHA1

    d79ad5d8f62d04edcf5f91f648c7584b92751575

  • SHA256

    51e6ef0dc6e53caa9f6f7ed6f98d4b522405a5a3bc574a1ab6ff8f5de1558683

  • SHA512

    04be34cc8f95fd7e0b8acd0d4cf86f3089ad2beb27644de769e1fa6c834b404b5f997ca35041455a5e07ded36344383990debc10dc53e18bbe27414c204fd15e

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\ProgramData\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\51e6ef0dc6e53caa9f6f7ed6f98d4b522405a5a3bc574a1ab6ff8f5de1558683.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5040
    • C:\Program Files\Java\jre1.8.0_66\bin\java.exe
      "C:\Program Files\Java\jre1.8.0_66\bin\java.exe" -jar C:\Users\Admin\AppData\Local\Temp\_0.80919161516416568543722786064420484.class
      2⤵
        PID:5096

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\.oracle_jre_usage\90737d32e3aba4b.timestamp

      Filesize

      50B

      MD5

      33ec08dcae229813a3949f9fdf42566c

      SHA1

      b5101411a140b320059f6f0f29b1b5cde691ed36

      SHA256

      89958d77d75c86ad3bf722f64eab2375dd274d466e572397e53de7d6818e7006

      SHA512

      c23c31ebc3e86f171336b4385fe9f15812b8bc2daebdbb03c455c6d606b29f942493a46c6e6e83ae708aef8121535347e90fab92db5e3f963bdb69806da276c4

    • C:\Users\Admin\AppData\Local\Temp\_0.80919161516416568543722786064420484.class

      Filesize

      241KB

      MD5

      781fb531354d6f291f1ccab48da6d39f

      SHA1

      9ce4518ebcb5be6d1f0b5477fa00c26860fe9a68

      SHA256

      97d585b6aff62fb4e43e7e6a5f816dcd7a14be11a88b109a9ba9e8cd4c456eb9

      SHA512

      3e6630f5feb4a3eb1dac7e9125ce14b1a2a45d7415cf44cea42bc51b2a9aa37169ee4a4c36c888c8f2696e7d6e298e2ad7b2f4c22868aaa5948210eb7db220d8

    • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2280897447-3291712302-3137480060-1000\83aa4cc77f591dfc2374580bbd95f6ba_3d049c10-cbb3-490e-9ef6-6d595e43011b

      Filesize

      45B

      MD5

      c8366ae350e7019aefc9d1e6e6a498c6

      SHA1

      5731d8a3e6568a5f2dfbbc87e3db9637df280b61

      SHA256

      11e6aca8e682c046c83b721eeb5c72c5ef03cb5936c60df6f4993511ddc61238

      SHA512

      33c980d5a638bfc791de291ebf4b6d263b384247ab27f261a54025108f2f85374b579a026e545f81395736dd40fa4696f2163ca17640dd47f1c42bc9971b18cd

    • memory/5040-134-0x0000000003030000-0x0000000004030000-memory.dmp

      Filesize

      16.0MB

    • memory/5040-149-0x0000000003030000-0x0000000004030000-memory.dmp

      Filesize

      16.0MB

    • memory/5040-156-0x0000000003030000-0x0000000004030000-memory.dmp

      Filesize

      16.0MB

    • memory/5040-163-0x0000000003030000-0x0000000004030000-memory.dmp

      Filesize

      16.0MB

    • memory/5040-173-0x0000000003030000-0x0000000004030000-memory.dmp

      Filesize

      16.0MB

    • memory/5040-175-0x0000000003030000-0x0000000004030000-memory.dmp

      Filesize

      16.0MB

    • memory/5096-146-0x0000000000000000-mapping.dmp