Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:33
Static task
static1
Behavioral task
behavioral1
Sample
19f47299d5b09f3c578f1c84ac4f5c40034b4a3dfd4785f6d5933f384df4f968.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
19f47299d5b09f3c578f1c84ac4f5c40034b4a3dfd4785f6d5933f384df4f968.exe
Resource
win10v2004-20221111-en
General
-
Target
19f47299d5b09f3c578f1c84ac4f5c40034b4a3dfd4785f6d5933f384df4f968.exe
-
Size
348KB
-
MD5
320d82953590b619917bea3c2f7494f2
-
SHA1
0b3be052878cfa4aff1578f3d92ab7669004352c
-
SHA256
19f47299d5b09f3c578f1c84ac4f5c40034b4a3dfd4785f6d5933f384df4f968
-
SHA512
9f305fdb517d6f475f5f912dd4a2266b88ef3e9b88483fb92cb7501f893d043b77f34372aa3e464b7ca1b10f2b7e6898760874e297f7abee0bde535a16ec023e
-
SSDEEP
6144:CnHLU1FaVNCJzt4ljFfKAVC1ES7eNg2QeXb6AtfaQX3ovF5iFuZQuy8t:CnHLtGztC0AVGVyxQeXbD3novXvZQuy0
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid process 1800 attrib.exe 1056 attrib.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
reg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Javaw = "\"C:\\Program Files\\Java\\jre7\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\Javaw (TM)\\Javaw.a9b\"" reg.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Javaw = "\"C:\\Program Files\\Java\\jre7\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\Javaw (TM)\\Javaw.a9b\"" reg.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
javaw.exeattrib.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Javaw (TM)\Desktop.ini javaw.exe File opened for modification C:\Users\Admin\AppData\Roaming\Javaw (TM)\Desktop.ini attrib.exe -
Drops file in Windows directory 4 IoCs
Processes:
javaw.exejavaw.exedescription ioc process File created C:\Windows\tem javaw.exe File opened for modification C:\Windows\tem javaw.exe File created C:\Windows\tem javaw.exe File opened for modification C:\Windows\tem javaw.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
javaw.exejavaw.exepid process 972 javaw.exe 1704 javaw.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
19f47299d5b09f3c578f1c84ac4f5c40034b4a3dfd4785f6d5933f384df4f968.exejavaw.exejavaw.exedescription pid process target process PID 1368 wrote to memory of 972 1368 19f47299d5b09f3c578f1c84ac4f5c40034b4a3dfd4785f6d5933f384df4f968.exe javaw.exe PID 1368 wrote to memory of 972 1368 19f47299d5b09f3c578f1c84ac4f5c40034b4a3dfd4785f6d5933f384df4f968.exe javaw.exe PID 1368 wrote to memory of 972 1368 19f47299d5b09f3c578f1c84ac4f5c40034b4a3dfd4785f6d5933f384df4f968.exe javaw.exe PID 1368 wrote to memory of 972 1368 19f47299d5b09f3c578f1c84ac4f5c40034b4a3dfd4785f6d5933f384df4f968.exe javaw.exe PID 972 wrote to memory of 1764 972 javaw.exe reg.exe PID 972 wrote to memory of 1764 972 javaw.exe reg.exe PID 972 wrote to memory of 1764 972 javaw.exe reg.exe PID 972 wrote to memory of 1800 972 javaw.exe attrib.exe PID 972 wrote to memory of 1800 972 javaw.exe attrib.exe PID 972 wrote to memory of 1800 972 javaw.exe attrib.exe PID 972 wrote to memory of 1056 972 javaw.exe attrib.exe PID 972 wrote to memory of 1056 972 javaw.exe attrib.exe PID 972 wrote to memory of 1056 972 javaw.exe attrib.exe PID 972 wrote to memory of 1704 972 javaw.exe javaw.exe PID 972 wrote to memory of 1704 972 javaw.exe javaw.exe PID 972 wrote to memory of 1704 972 javaw.exe javaw.exe PID 1704 wrote to memory of 1964 1704 javaw.exe reg.exe PID 1704 wrote to memory of 1964 1704 javaw.exe reg.exe PID 1704 wrote to memory of 1964 1704 javaw.exe reg.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 1800 attrib.exe 1056 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\19f47299d5b09f3c578f1c84ac4f5c40034b4a3dfd4785f6d5933f384df4f968.exe"C:\Users\Admin\AppData\Local\Temp\19f47299d5b09f3c578f1c84ac4f5c40034b4a3dfd4785f6d5933f384df4f968.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\19f47299d5b09f3c578f1c84ac4f5c40034b4a3dfd4785f6d5933f384df4f968.exe"2⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Javaw /t REG_SZ /d "\"C:\Program Files\Java\jre7\bin\javaw.exe\" -jar \"C:\Users\Admin\AppData\Roaming\Javaw (TM)\Javaw.a9b\"" /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:1764 -
C:\Windows\system32\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Roaming\Javaw (TM)\*.*"3⤵
- Sets file to hidden
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:1800 -
C:\Windows\system32\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Roaming\Javaw (TM)"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1056 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\Javaw (TM)\Javaw.a9b"3⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Javaw /t REG_SZ /d "\"C:\Program Files\Java\jre7\bin\javaw.exe\" -jar \"C:\Users\Admin\AppData\Roaming\Javaw (TM)\Javaw.a9b\"" /f4⤵
- Adds Run key to start application
- Modifies registry key
PID:1964
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63B
MD5e783bdd20a976eaeaae1ff4624487420
SHA1c2a44fab9df00b3e11582546b16612333c2f9286
SHA2562f65fa9c7ed712f493782abf91467f869419a2f8b5adf23b44019c08190fa3f3
SHA5128c883678e4625ef44f4885b8c6d7485196774f9cb0b9eee7dd18711749bcae474163df9965effcd13ecd1a33cd7265010c152f8504d6013e4f4d85d68a901a80
-
Filesize
348KB
MD5320d82953590b619917bea3c2f7494f2
SHA10b3be052878cfa4aff1578f3d92ab7669004352c
SHA25619f47299d5b09f3c578f1c84ac4f5c40034b4a3dfd4785f6d5933f384df4f968
SHA5129f305fdb517d6f475f5f912dd4a2266b88ef3e9b88483fb92cb7501f893d043b77f34372aa3e464b7ca1b10f2b7e6898760874e297f7abee0bde535a16ec023e