Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:33
Static task
static1
Behavioral task
behavioral1
Sample
19f47299d5b09f3c578f1c84ac4f5c40034b4a3dfd4785f6d5933f384df4f968.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
19f47299d5b09f3c578f1c84ac4f5c40034b4a3dfd4785f6d5933f384df4f968.exe
Resource
win10v2004-20221111-en
General
-
Target
19f47299d5b09f3c578f1c84ac4f5c40034b4a3dfd4785f6d5933f384df4f968.exe
-
Size
348KB
-
MD5
320d82953590b619917bea3c2f7494f2
-
SHA1
0b3be052878cfa4aff1578f3d92ab7669004352c
-
SHA256
19f47299d5b09f3c578f1c84ac4f5c40034b4a3dfd4785f6d5933f384df4f968
-
SHA512
9f305fdb517d6f475f5f912dd4a2266b88ef3e9b88483fb92cb7501f893d043b77f34372aa3e464b7ca1b10f2b7e6898760874e297f7abee0bde535a16ec023e
-
SSDEEP
6144:CnHLU1FaVNCJzt4ljFfKAVC1ES7eNg2QeXb6AtfaQX3ovF5iFuZQuy8t:CnHLtGztC0AVGVyxQeXbD3novXvZQuy0
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid process 2476 attrib.exe 5112 attrib.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
reg.exereg.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Javaw = "\"C:\\Program Files\\Java\\jre1.8.0_66\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\Javaw (TM)\\Javaw.a9b\"" reg.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Javaw = "\"C:\\Program Files\\Java\\jre1.8.0_66\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\Javaw (TM)\\Javaw.a9b\"" reg.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Run reg.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
javaw.exeattrib.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Javaw (TM)\Desktop.ini javaw.exe File opened for modification C:\Users\Admin\AppData\Roaming\Javaw (TM)\Desktop.ini attrib.exe -
Drops file in Windows directory 4 IoCs
Processes:
javaw.exejavaw.exedescription ioc process File created C:\Windows\tem javaw.exe File opened for modification C:\Windows\tem javaw.exe File created C:\Windows\tem javaw.exe File opened for modification C:\Windows\tem javaw.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
javaw.exejavaw.exepid process 724 javaw.exe 1816 javaw.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
19f47299d5b09f3c578f1c84ac4f5c40034b4a3dfd4785f6d5933f384df4f968.exejavaw.exejavaw.exedescription pid process target process PID 2176 wrote to memory of 724 2176 19f47299d5b09f3c578f1c84ac4f5c40034b4a3dfd4785f6d5933f384df4f968.exe javaw.exe PID 2176 wrote to memory of 724 2176 19f47299d5b09f3c578f1c84ac4f5c40034b4a3dfd4785f6d5933f384df4f968.exe javaw.exe PID 724 wrote to memory of 804 724 javaw.exe reg.exe PID 724 wrote to memory of 804 724 javaw.exe reg.exe PID 724 wrote to memory of 2476 724 javaw.exe attrib.exe PID 724 wrote to memory of 2476 724 javaw.exe attrib.exe PID 724 wrote to memory of 5112 724 javaw.exe attrib.exe PID 724 wrote to memory of 5112 724 javaw.exe attrib.exe PID 724 wrote to memory of 1816 724 javaw.exe javaw.exe PID 724 wrote to memory of 1816 724 javaw.exe javaw.exe PID 1816 wrote to memory of 2056 1816 javaw.exe reg.exe PID 1816 wrote to memory of 2056 1816 javaw.exe reg.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 5112 attrib.exe 2476 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\19f47299d5b09f3c578f1c84ac4f5c40034b4a3dfd4785f6d5933f384df4f968.exe"C:\Users\Admin\AppData\Local\Temp\19f47299d5b09f3c578f1c84ac4f5c40034b4a3dfd4785f6d5933f384df4f968.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\19f47299d5b09f3c578f1c84ac4f5c40034b4a3dfd4785f6d5933f384df4f968.exe"2⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Windows\SYSTEM32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Javaw /t REG_SZ /d "\"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe\" -jar \"C:\Users\Admin\AppData\Roaming\Javaw (TM)\Javaw.a9b\"" /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:804 -
C:\Windows\SYSTEM32\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Roaming\Javaw (TM)\*.*"3⤵
- Sets file to hidden
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:2476 -
C:\Windows\SYSTEM32\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Roaming\Javaw (TM)"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:5112 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\Javaw (TM)\Javaw.a9b"3⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SYSTEM32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Javaw /t REG_SZ /d "\"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe\" -jar \"C:\Users\Admin\AppData\Roaming\Javaw (TM)\Javaw.a9b\"" /f4⤵
- Adds Run key to start application
- Modifies registry key
PID:2056
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50B
MD566c309ee80ed122f9681aca4623fe2eb
SHA11477ec6bd8b826b2e8c3c42ffb45c8aeadff9313
SHA256afddc3df4182d5a136f27971536391c76ae14d131b7f3907faf06256e7d65a85
SHA5124e4d8f907906f05401ecc06a345257ed161ee8f615087c31b3a52e445ab047e406ffe434c686a0d72e9113968420679ea473ac8ae75b06e81ca2c9a750dc2487
-
Filesize
63B
MD5e783bdd20a976eaeaae1ff4624487420
SHA1c2a44fab9df00b3e11582546b16612333c2f9286
SHA2562f65fa9c7ed712f493782abf91467f869419a2f8b5adf23b44019c08190fa3f3
SHA5128c883678e4625ef44f4885b8c6d7485196774f9cb0b9eee7dd18711749bcae474163df9965effcd13ecd1a33cd7265010c152f8504d6013e4f4d85d68a901a80
-
Filesize
348KB
MD5320d82953590b619917bea3c2f7494f2
SHA10b3be052878cfa4aff1578f3d92ab7669004352c
SHA25619f47299d5b09f3c578f1c84ac4f5c40034b4a3dfd4785f6d5933f384df4f968
SHA5129f305fdb517d6f475f5f912dd4a2266b88ef3e9b88483fb92cb7501f893d043b77f34372aa3e464b7ca1b10f2b7e6898760874e297f7abee0bde535a16ec023e