Analysis
-
max time kernel
134s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 07:03
Static task
static1
Behavioral task
behavioral1
Sample
AWB NO - 3806763435.jar
Resource
win7-20221111-en
General
-
Target
AWB NO - 3806763435.jar
-
Size
135KB
-
MD5
f3ea82bc0cc2257700a03772803f33ba
-
SHA1
4a3b8f5db62c2b8da10c12f303c793d4c906154c
-
SHA256
637d0ad48e3a475f7b025f1c9fe9baf21644f56e8cb80191b442cadb4fdd9ca6
-
SHA512
09a18567c0955b0a0a8e626d5bd8e7fd92229276cd750a07788a14ad8ab9ff86a1f86e6e601e49bac1ba5f0c3c6cb70aa56eb18381fee0557c760c5f7949c798
-
SSDEEP
3072:mf6XMlidasMjimQsBqUDt/Gsz8DSXyKlQwy:mf6XKisgmQsB5tlBXyKlQwy
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
Processes:
WScript.exeflow pid process 5 1820 WScript.exe 14 1820 WScript.exe 15 1820 WScript.exe -
Drops startup file 2 IoCs
Processes:
WScript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UbAiBlUvAZ.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UbAiBlUvAZ.js WScript.exe -
Drops file in Program Files directory 1 IoCs
Processes:
javaw.exedescription ioc process File created C:\Program Files\Java\jre7\ziljthuck.txt javaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
java.exewscript.exejavaw.exedescription pid process target process PID 1212 wrote to memory of 932 1212 java.exe wscript.exe PID 1212 wrote to memory of 932 1212 java.exe wscript.exe PID 1212 wrote to memory of 932 1212 java.exe wscript.exe PID 932 wrote to memory of 1820 932 wscript.exe WScript.exe PID 932 wrote to memory of 1820 932 wscript.exe WScript.exe PID 932 wrote to memory of 1820 932 wscript.exe WScript.exe PID 932 wrote to memory of 1712 932 wscript.exe javaw.exe PID 932 wrote to memory of 1712 932 wscript.exe javaw.exe PID 932 wrote to memory of 1712 932 wscript.exe javaw.exe PID 1712 wrote to memory of 524 1712 javaw.exe java.exe PID 1712 wrote to memory of 524 1712 javaw.exe java.exe PID 1712 wrote to memory of 524 1712 javaw.exe java.exe
Processes
-
C:\Windows\system32\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\AWB NO - 3806763435.jar"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wscript.exewscript C:\Users\Admin\fcttazxkll.js2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\UbAiBlUvAZ.js"3⤵
- Blocklisted process makes network request
- Drops startup file
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\ziljthuck.txt"3⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Java\jre7\bin\java.exe"C:\Program Files\Java\jre7\bin\java.exe" -jar "C:\Program Files\Java\jre7\ziljthuck.txt"4⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Java\jre7\ziljthuck.txtFilesize
91KB
MD53bbdbc10682111317bef9f19b6dbb95e
SHA1135efb10366e837601e01cec75999662abb87a80
SHA2569045fd0a805e07c7e6367fb3cb62f8121964056894cee3b56f6f85feddce92f7
SHA512858f62f75d3eb1c4f7fbef9c92cd10e26e5326484e5557a7e1a6bb140413470c2364b0f44383a166e3517d1d759775c17baa46560bf13768850cf3b1573b1170
-
C:\Users\Admin\AppData\Roaming\UbAiBlUvAZ.jsFilesize
23KB
MD5c53fc2f411c2a1b4742db917bd10708f
SHA1d34fcd46c30ab1d8d6b21535f63f420f536154a6
SHA256d2aefa366d202443a0250d5bc93802230486b3990dce7c12b419be570818c67a
SHA5127aee8c96b0c7c4c974b1be1379ab1d8a10a3f444cd36d68c6684ac2a540ec15210ea247d3f04be7e4251d0e4da1cff14503406b5778f6cae310fbcac283663ae
-
C:\Users\Admin\AppData\Roaming\ziljthuck.txtFilesize
91KB
MD53bbdbc10682111317bef9f19b6dbb95e
SHA1135efb10366e837601e01cec75999662abb87a80
SHA2569045fd0a805e07c7e6367fb3cb62f8121964056894cee3b56f6f85feddce92f7
SHA512858f62f75d3eb1c4f7fbef9c92cd10e26e5326484e5557a7e1a6bb140413470c2364b0f44383a166e3517d1d759775c17baa46560bf13768850cf3b1573b1170
-
C:\Users\Admin\fcttazxkll.jsFilesize
240KB
MD5acad0bd0c33f21939a775ce90b38d4e2
SHA15b3c2c7723b4bbc3185be8a74d1cde81a60fa1a1
SHA256168c84c8a36ea84c39cc8380447d4c81227f924ed80bcaa432f34116a87b63ab
SHA5129e8572be372134639e9ddf88c832cd17d7a03882e3389bedd1a32845851ad189edb26354f06cf563a2d8101b4eb31426a7566e4ab3cc798b78a6869b525368b4
-
memory/524-86-0x0000000000000000-mapping.dmp
-
memory/524-97-0x00000000021E0000-0x00000000051E0000-memory.dmpFilesize
48.0MB
-
memory/524-99-0x00000000021E0000-0x00000000051E0000-memory.dmpFilesize
48.0MB
-
memory/932-64-0x0000000000000000-mapping.dmp
-
memory/1212-54-0x000007FEFB751000-0x000007FEFB753000-memory.dmpFilesize
8KB
-
memory/1212-65-0x0000000002180000-0x0000000005180000-memory.dmpFilesize
48.0MB
-
memory/1712-70-0x0000000000000000-mapping.dmp
-
memory/1712-80-0x0000000002360000-0x0000000005360000-memory.dmpFilesize
48.0MB
-
memory/1712-85-0x0000000002360000-0x0000000005360000-memory.dmpFilesize
48.0MB
-
memory/1820-69-0x0000000000000000-mapping.dmp