Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:49
Static task
static1
Behavioral task
behavioral1
Sample
83874db257e7139addb01ab4b00cabbd2fb4e153363c4e5ef247822d6b94a0b1.jar
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
83874db257e7139addb01ab4b00cabbd2fb4e153363c4e5ef247822d6b94a0b1.jar
Resource
win10v2004-20221111-en
General
-
Target
83874db257e7139addb01ab4b00cabbd2fb4e153363c4e5ef247822d6b94a0b1.jar
-
Size
48KB
-
MD5
2f8d204b747ed971a8bc8927b2e0898c
-
SHA1
80eea800f0f8c48a45531b6f82af86398b99324d
-
SHA256
83874db257e7139addb01ab4b00cabbd2fb4e153363c4e5ef247822d6b94a0b1
-
SHA512
8d0ca67a421a4ce3cfb0e16397a2f1645aef72a26c21d676577fe98252df108da4cdcfd72d3345f13acb0bb8324a3ac1d52f451db84ccb0c29bf0c320c175a85
-
SSDEEP
768:QLslteTZtLLRmcPSRE/amQ2eVkzI9tncxN0FPkA7CmiOU5hEjODuE8IphzItSeHj:Q6UPLFmcPwkehVkDxN01q3hIauKatS4j
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid process 1372 attrib.exe 1804 attrib.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
reg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FgEYmxupx6 = "\"C:\\Program Files\\Java\\jre7\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\y2fXsUb6Fo\\m3RH1CkVxc.4tD\"" reg.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FgEYmxupx6 = "\"C:\\Program Files\\Java\\jre7\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\y2fXsUb6Fo\\m3RH1CkVxc.4tD\"" reg.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
java.exeattrib.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\y2fXsUb6Fo\Desktop.ini java.exe File opened for modification C:\Users\Admin\AppData\Roaming\y2fXsUb6Fo\Desktop.ini attrib.exe -
Drops file in Windows directory 4 IoCs
Processes:
java.exejavaw.exedescription ioc process File created C:\Windows\tem java.exe File opened for modification C:\Windows\tem java.exe File created C:\Windows\tem javaw.exe File opened for modification C:\Windows\tem javaw.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
java.exejavaw.exepid process 1836 java.exe 784 javaw.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
java.exejavaw.exedescription pid process target process PID 1836 wrote to memory of 1628 1836 java.exe reg.exe PID 1836 wrote to memory of 1628 1836 java.exe reg.exe PID 1836 wrote to memory of 1628 1836 java.exe reg.exe PID 1836 wrote to memory of 1372 1836 java.exe attrib.exe PID 1836 wrote to memory of 1372 1836 java.exe attrib.exe PID 1836 wrote to memory of 1372 1836 java.exe attrib.exe PID 1836 wrote to memory of 1804 1836 java.exe attrib.exe PID 1836 wrote to memory of 1804 1836 java.exe attrib.exe PID 1836 wrote to memory of 1804 1836 java.exe attrib.exe PID 1836 wrote to memory of 784 1836 java.exe javaw.exe PID 1836 wrote to memory of 784 1836 java.exe javaw.exe PID 1836 wrote to memory of 784 1836 java.exe javaw.exe PID 784 wrote to memory of 1936 784 javaw.exe reg.exe PID 784 wrote to memory of 1936 784 javaw.exe reg.exe PID 784 wrote to memory of 1936 784 javaw.exe reg.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 1372 attrib.exe 1804 attrib.exe
Processes
-
C:\Windows\system32\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\83874db257e7139addb01ab4b00cabbd2fb4e153363c4e5ef247822d6b94a0b1.jar1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v FgEYmxupx6 /t REG_SZ /d "\"C:\Program Files\Java\jre7\bin\javaw.exe\" -jar \"C:\Users\Admin\AppData\Roaming\y2fXsUb6Fo\m3RH1CkVxc.4tD\"" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:1628
-
-
C:\Windows\system32\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Roaming\y2fXsUb6Fo\*.*"2⤵
- Sets file to hidden
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:1372
-
-
C:\Windows\system32\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Roaming\y2fXsUb6Fo"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1804
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\y2fXsUb6Fo\m3RH1CkVxc.4tD"2⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v FgEYmxupx6 /t REG_SZ /d "\"C:\Program Files\Java\jre7\bin\javaw.exe\" -jar \"C:\Users\Admin\AppData\Roaming\y2fXsUb6Fo\m3RH1CkVxc.4tD\"" /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:1936
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63B
MD5e783bdd20a976eaeaae1ff4624487420
SHA1c2a44fab9df00b3e11582546b16612333c2f9286
SHA2562f65fa9c7ed712f493782abf91467f869419a2f8b5adf23b44019c08190fa3f3
SHA5128c883678e4625ef44f4885b8c6d7485196774f9cb0b9eee7dd18711749bcae474163df9965effcd13ecd1a33cd7265010c152f8504d6013e4f4d85d68a901a80
-
Filesize
48KB
MD52f8d204b747ed971a8bc8927b2e0898c
SHA180eea800f0f8c48a45531b6f82af86398b99324d
SHA25683874db257e7139addb01ab4b00cabbd2fb4e153363c4e5ef247822d6b94a0b1
SHA5128d0ca67a421a4ce3cfb0e16397a2f1645aef72a26c21d676577fe98252df108da4cdcfd72d3345f13acb0bb8324a3ac1d52f451db84ccb0c29bf0c320c175a85