Analysis

  • max time kernel
    142s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 15:49

General

  • Target

    83874db257e7139addb01ab4b00cabbd2fb4e153363c4e5ef247822d6b94a0b1.jar

  • Size

    48KB

  • MD5

    2f8d204b747ed971a8bc8927b2e0898c

  • SHA1

    80eea800f0f8c48a45531b6f82af86398b99324d

  • SHA256

    83874db257e7139addb01ab4b00cabbd2fb4e153363c4e5ef247822d6b94a0b1

  • SHA512

    8d0ca67a421a4ce3cfb0e16397a2f1645aef72a26c21d676577fe98252df108da4cdcfd72d3345f13acb0bb8324a3ac1d52f451db84ccb0c29bf0c320c175a85

  • SSDEEP

    768:QLslteTZtLLRmcPSRE/amQ2eVkzI9tncxN0FPkA7CmiOU5hEjODuE8IphzItSeHj:Q6UPLFmcPwkehVkDxN01q3hIauKatS4j

Score
8/10

Malware Config

Signatures

  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Windows\system32\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\83874db257e7139addb01ab4b00cabbd2fb4e153363c4e5ef247822d6b94a0b1.jar
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1836
    • C:\Windows\system32\reg.exe
      reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v FgEYmxupx6 /t REG_SZ /d "\"C:\Program Files\Java\jre7\bin\javaw.exe\" -jar \"C:\Users\Admin\AppData\Roaming\y2fXsUb6Fo\m3RH1CkVxc.4tD\"" /f
      2⤵
      • Adds Run key to start application
      • Modifies registry key
      PID:1628
    • C:\Windows\system32\attrib.exe
      attrib +s +h +r "C:\Users\Admin\AppData\Roaming\y2fXsUb6Fo\*.*"
      2⤵
      • Sets file to hidden
      • Drops desktop.ini file(s)
      • Views/modifies file attributes
      PID:1372
    • C:\Windows\system32\attrib.exe
      attrib +s +h +r "C:\Users\Admin\AppData\Roaming\y2fXsUb6Fo"
      2⤵
      • Sets file to hidden
      • Views/modifies file attributes
      PID:1804
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\y2fXsUb6Fo\m3RH1CkVxc.4tD"
      2⤵
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:784
      • C:\Windows\system32\reg.exe
        reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v FgEYmxupx6 /t REG_SZ /d "\"C:\Program Files\Java\jre7\bin\javaw.exe\" -jar \"C:\Users\Admin\AppData\Roaming\y2fXsUb6Fo\m3RH1CkVxc.4tD\"" /f
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:1936

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\y2fXsUb6Fo\Desktop.ini

    Filesize

    63B

    MD5

    e783bdd20a976eaeaae1ff4624487420

    SHA1

    c2a44fab9df00b3e11582546b16612333c2f9286

    SHA256

    2f65fa9c7ed712f493782abf91467f869419a2f8b5adf23b44019c08190fa3f3

    SHA512

    8c883678e4625ef44f4885b8c6d7485196774f9cb0b9eee7dd18711749bcae474163df9965effcd13ecd1a33cd7265010c152f8504d6013e4f4d85d68a901a80

  • C:\Users\Admin\AppData\Roaming\y2fXsUb6Fo\m3RH1CkVxc.4tD

    Filesize

    48KB

    MD5

    2f8d204b747ed971a8bc8927b2e0898c

    SHA1

    80eea800f0f8c48a45531b6f82af86398b99324d

    SHA256

    83874db257e7139addb01ab4b00cabbd2fb4e153363c4e5ef247822d6b94a0b1

    SHA512

    8d0ca67a421a4ce3cfb0e16397a2f1645aef72a26c21d676577fe98252df108da4cdcfd72d3345f13acb0bb8324a3ac1d52f451db84ccb0c29bf0c320c175a85

  • memory/784-70-0x0000000000000000-mapping.dmp

  • memory/784-81-0x0000000002170000-0x0000000005170000-memory.dmp

    Filesize

    48.0MB

  • memory/784-83-0x0000000002170000-0x0000000005170000-memory.dmp

    Filesize

    48.0MB

  • memory/1372-66-0x0000000000000000-mapping.dmp

  • memory/1628-65-0x0000000000000000-mapping.dmp

  • memory/1804-67-0x0000000000000000-mapping.dmp

  • memory/1836-54-0x000007FEFB6A1000-0x000007FEFB6A3000-memory.dmp

    Filesize

    8KB

  • memory/1836-64-0x00000000022F0000-0x00000000052F0000-memory.dmp

    Filesize

    48.0MB

  • memory/1936-82-0x0000000000000000-mapping.dmp