Analysis
-
max time kernel
158s -
max time network
167s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01/10/2022, 23:46
Static task
static1
Behavioral task
behavioral1
Sample
7ce426f785c03e90964d0a41c44a1d2bebb9c965eb7d75a770ee7c6579d775ef.jar
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7ce426f785c03e90964d0a41c44a1d2bebb9c965eb7d75a770ee7c6579d775ef.jar
Resource
win10v2004-20220812-en
General
-
Target
7ce426f785c03e90964d0a41c44a1d2bebb9c965eb7d75a770ee7c6579d775ef.jar
-
Size
62KB
-
MD5
34bc92ecf73de24c406aa75802787907
-
SHA1
8e7814d5cb4ecc18688d777a736b5339ff2607af
-
SHA256
7ce426f785c03e90964d0a41c44a1d2bebb9c965eb7d75a770ee7c6579d775ef
-
SHA512
185bed965e3d1747172a0f7136640e1e5f6f29b02b1704bd724f712fb636599309c5d7cb8c7657574cb5d50874e80eb903fafd285d015cbec701846867d6678a
-
SSDEEP
1536:RSjeiFyw3yeF1rVIFFhkrPnQIno+H0RoMUZ:RSjeiFp1rvPnvwoH
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 596 attrib.exe 584 attrib.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Av9BGlFa5I = "\"C:\\Program Files\\Java\\jre7\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\pOk7A0fqoQ\\pE5o8.P1Q\"" reg.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Av9BGlFa5I = "\"C:\\Program Files\\Java\\jre7\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\pOk7A0fqoQ\\pE5o8.P1Q\"" reg.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\pOk7A0fqoQ\Desktop.ini java.exe File opened for modification C:\Users\Admin\AppData\Roaming\pOk7A0fqoQ\Desktop.ini attrib.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\tem java.exe File opened for modification C:\Windows\tem java.exe File created C:\Windows\tem javaw.exe File opened for modification C:\Windows\tem javaw.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 1288 reg.exe 1184 reg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1348 java.exe 1440 javaw.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1348 wrote to memory of 1288 1348 java.exe 28 PID 1348 wrote to memory of 1288 1348 java.exe 28 PID 1348 wrote to memory of 1288 1348 java.exe 28 PID 1348 wrote to memory of 596 1348 java.exe 29 PID 1348 wrote to memory of 596 1348 java.exe 29 PID 1348 wrote to memory of 596 1348 java.exe 29 PID 1348 wrote to memory of 584 1348 java.exe 30 PID 1348 wrote to memory of 584 1348 java.exe 30 PID 1348 wrote to memory of 584 1348 java.exe 30 PID 1348 wrote to memory of 1440 1348 java.exe 31 PID 1348 wrote to memory of 1440 1348 java.exe 31 PID 1348 wrote to memory of 1440 1348 java.exe 31 PID 1440 wrote to memory of 1184 1440 javaw.exe 32 PID 1440 wrote to memory of 1184 1440 javaw.exe 32 PID 1440 wrote to memory of 1184 1440 javaw.exe 32 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 596 attrib.exe 584 attrib.exe
Processes
-
C:\Windows\system32\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\7ce426f785c03e90964d0a41c44a1d2bebb9c965eb7d75a770ee7c6579d775ef.jar1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Av9BGlFa5I /t REG_SZ /d "\"C:\Program Files\Java\jre7\bin\javaw.exe\" -jar \"C:\Users\Admin\AppData\Roaming\pOk7A0fqoQ\pE5o8.P1Q\"" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:1288
-
-
C:\Windows\system32\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Roaming\pOk7A0fqoQ\*.*"2⤵
- Sets file to hidden
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:596
-
-
C:\Windows\system32\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Roaming\pOk7A0fqoQ"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:584
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\pOk7A0fqoQ\pE5o8.P1Q"2⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Av9BGlFa5I /t REG_SZ /d "\"C:\Program Files\Java\jre7\bin\javaw.exe\" -jar \"C:\Users\Admin\AppData\Roaming\pOk7A0fqoQ\pE5o8.P1Q\"" /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:1184
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63B
MD5e783bdd20a976eaeaae1ff4624487420
SHA1c2a44fab9df00b3e11582546b16612333c2f9286
SHA2562f65fa9c7ed712f493782abf91467f869419a2f8b5adf23b44019c08190fa3f3
SHA5128c883678e4625ef44f4885b8c6d7485196774f9cb0b9eee7dd18711749bcae474163df9965effcd13ecd1a33cd7265010c152f8504d6013e4f4d85d68a901a80
-
Filesize
62KB
MD534bc92ecf73de24c406aa75802787907
SHA18e7814d5cb4ecc18688d777a736b5339ff2607af
SHA2567ce426f785c03e90964d0a41c44a1d2bebb9c965eb7d75a770ee7c6579d775ef
SHA512185bed965e3d1747172a0f7136640e1e5f6f29b02b1704bd724f712fb636599309c5d7cb8c7657574cb5d50874e80eb903fafd285d015cbec701846867d6678a