Analysis
-
max time kernel
132s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 07:25
Static task
static1
Behavioral task
behavioral1
Sample
96636e5bcd4cd79a7f594c4ce1a95270b0892f7b53ad0eae8221e50c02e98aaa.jar
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
96636e5bcd4cd79a7f594c4ce1a95270b0892f7b53ad0eae8221e50c02e98aaa.jar
Resource
win10v2004-20220812-en
General
-
Target
96636e5bcd4cd79a7f594c4ce1a95270b0892f7b53ad0eae8221e50c02e98aaa.jar
-
Size
315KB
-
MD5
da86ebc58406c0e5f462e5a1ae16f861
-
SHA1
c4f437cff14b052b0deb707887ea09c9e68383f6
-
SHA256
96636e5bcd4cd79a7f594c4ce1a95270b0892f7b53ad0eae8221e50c02e98aaa
-
SHA512
523e542dffa2dca34dff8b85beb4554250539f31f20e345308945f10b7aa1a0f4104da3604b1529ffe745ad672e57456d2651f47a37c8ac5c4cda3d35ccaf2fd
-
SSDEEP
6144:unNXtwg3rsWNqvXuQCocAUpZxlAbtaoiOlUd9USANf/0BqcpzrzR0/+LM7dL+M:und3rsWNqBCocAUvxyagNXUqclZ0/iQj
Malware Config
Extracted
pony
http://ghoesi.tk/scala/gate.php
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
asdqw83349861051483817720Jamesss.exeasdqw83349861051483817720Jamesss.exepid process 944 asdqw83349861051483817720Jamesss.exe 1448 asdqw83349861051483817720Jamesss.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid process 1808 attrib.exe 580 attrib.exe -
Loads dropped DLL 1 IoCs
Processes:
asdqw83349861051483817720Jamesss.exepid process 944 asdqw83349861051483817720Jamesss.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
reg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FlUYHJ7y3x = "\"C:\\Program Files\\Java\\jre7\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\ie0BjxAPXD\\OYmREFT1Hb.VwA\"" reg.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FlUYHJ7y3x = "\"C:\\Program Files\\Java\\jre7\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\ie0BjxAPXD\\OYmREFT1Hb.VwA\"" reg.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
javaw.exeattrib.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\ie0BjxAPXD\Desktop.ini javaw.exe File opened for modification C:\Users\Admin\AppData\Roaming\ie0BjxAPXD\Desktop.ini attrib.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
asdqw83349861051483817720Jamesss.exedescription pid process target process PID 944 set thread context of 1448 944 asdqw83349861051483817720Jamesss.exe asdqw83349861051483817720Jamesss.exe -
Drops file in Windows directory 4 IoCs
Processes:
javaw.exejavaw.exedescription ioc process File created C:\Windows\tem javaw.exe File opened for modification C:\Windows\tem javaw.exe File created C:\Windows\tem javaw.exe File opened for modification C:\Windows\tem javaw.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
asdqw83349861051483817720Jamesss.exepid process 944 asdqw83349861051483817720Jamesss.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
asdqw83349861051483817720Jamesss.exedescription pid process Token: SeDebugPrivilege 944 asdqw83349861051483817720Jamesss.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
java.exejavaw.exejavaw.exepid process 1044 java.exe 1160 javaw.exe 828 javaw.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
java.execmd.exejavaw.exeasdqw83349861051483817720Jamesss.exejavaw.exedescription pid process target process PID 1044 wrote to memory of 924 1044 java.exe cmd.exe PID 1044 wrote to memory of 924 1044 java.exe cmd.exe PID 1044 wrote to memory of 924 1044 java.exe cmd.exe PID 1044 wrote to memory of 1160 1044 java.exe javaw.exe PID 1044 wrote to memory of 1160 1044 java.exe javaw.exe PID 1044 wrote to memory of 1160 1044 java.exe javaw.exe PID 924 wrote to memory of 944 924 cmd.exe asdqw83349861051483817720Jamesss.exe PID 924 wrote to memory of 944 924 cmd.exe asdqw83349861051483817720Jamesss.exe PID 924 wrote to memory of 944 924 cmd.exe asdqw83349861051483817720Jamesss.exe PID 924 wrote to memory of 944 924 cmd.exe asdqw83349861051483817720Jamesss.exe PID 1160 wrote to memory of 1712 1160 javaw.exe reg.exe PID 1160 wrote to memory of 1712 1160 javaw.exe reg.exe PID 1160 wrote to memory of 1712 1160 javaw.exe reg.exe PID 1160 wrote to memory of 1808 1160 javaw.exe attrib.exe PID 1160 wrote to memory of 1808 1160 javaw.exe attrib.exe PID 1160 wrote to memory of 1808 1160 javaw.exe attrib.exe PID 1160 wrote to memory of 580 1160 javaw.exe attrib.exe PID 1160 wrote to memory of 580 1160 javaw.exe attrib.exe PID 1160 wrote to memory of 580 1160 javaw.exe attrib.exe PID 1160 wrote to memory of 828 1160 javaw.exe javaw.exe PID 1160 wrote to memory of 828 1160 javaw.exe javaw.exe PID 1160 wrote to memory of 828 1160 javaw.exe javaw.exe PID 944 wrote to memory of 1448 944 asdqw83349861051483817720Jamesss.exe asdqw83349861051483817720Jamesss.exe PID 944 wrote to memory of 1448 944 asdqw83349861051483817720Jamesss.exe asdqw83349861051483817720Jamesss.exe PID 944 wrote to memory of 1448 944 asdqw83349861051483817720Jamesss.exe asdqw83349861051483817720Jamesss.exe PID 944 wrote to memory of 1448 944 asdqw83349861051483817720Jamesss.exe asdqw83349861051483817720Jamesss.exe PID 944 wrote to memory of 1448 944 asdqw83349861051483817720Jamesss.exe asdqw83349861051483817720Jamesss.exe PID 944 wrote to memory of 1448 944 asdqw83349861051483817720Jamesss.exe asdqw83349861051483817720Jamesss.exe PID 944 wrote to memory of 1448 944 asdqw83349861051483817720Jamesss.exe asdqw83349861051483817720Jamesss.exe PID 944 wrote to memory of 1448 944 asdqw83349861051483817720Jamesss.exe asdqw83349861051483817720Jamesss.exe PID 944 wrote to memory of 1448 944 asdqw83349861051483817720Jamesss.exe asdqw83349861051483817720Jamesss.exe PID 828 wrote to memory of 996 828 javaw.exe reg.exe PID 828 wrote to memory of 996 828 javaw.exe reg.exe PID 828 wrote to memory of 996 828 javaw.exe reg.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 1808 attrib.exe 580 attrib.exe
Processes
-
C:\Windows\system32\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\96636e5bcd4cd79a7f594c4ce1a95270b0892f7b53ad0eae8221e50c02e98aaa.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\system32\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\asdqw83349861051483817720Jamesss.exe2⤵
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Local\Temp\asdqw83349861051483817720Jamesss.exeC:\Users\Admin\AppData\Local\Temp\asdqw83349861051483817720Jamesss.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\asdqw83349861051483817720Jamesss.exe"C:\Users\Admin\AppData\Local\Temp\asdqw83349861051483817720Jamesss.exe"4⤵
- Executes dropped EXE
PID:1448 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\asdqw66524409487039364261List.jar"2⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v FlUYHJ7y3x /t REG_SZ /d "\"C:\Program Files\Java\jre7\bin\javaw.exe\" -jar \"C:\Users\Admin\AppData\Roaming\ie0BjxAPXD\OYmREFT1Hb.VwA\"" /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:1712 -
C:\Windows\system32\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Roaming\ie0BjxAPXD\*.*"3⤵
- Sets file to hidden
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:1808 -
C:\Windows\system32\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Roaming\ie0BjxAPXD"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:580 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\ie0BjxAPXD\OYmREFT1Hb.VwA"3⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v FlUYHJ7y3x /t REG_SZ /d "\"C:\Program Files\Java\jre7\bin\javaw.exe\" -jar \"C:\Users\Admin\AppData\Roaming\ie0BjxAPXD\OYmREFT1Hb.VwA\"" /f4⤵
- Adds Run key to start application
- Modifies registry key
PID:996
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\asdqw66524409487039364261List.jarFilesize
97KB
MD5d5adb5e6f16786fb8e87f4ba6ca59311
SHA11078e0a3637412550770acafcaaa9a70b37bbc53
SHA256f9549ed3c45c8e5c305883fd79052437e0ab666c2b8c0c96f1781f71dcd64085
SHA51275259756e11eb2a3a3b646e9daebc18ff21db5e323878b1e65566d945513fa66eb56f59433cd26b8e4647a577612cadfa4f376bf5d2e651341fc208ad99448c8
-
C:\Users\Admin\AppData\Local\Temp\asdqw83349861051483817720Jamesss.exeFilesize
359KB
MD5770cfc8f837ede9ff7775ed9aee3c736
SHA19fb5c22f1972ee661b7c432a6ff0797cd3b007b3
SHA2565f7c788a387ee39a271554870a764feaeb19c80efc6935a38e3762b867ead0b8
SHA512e64efd8c2d4bf6fca5da6de2e2c6388f072c74a999b061da76a05cb8580c951d3e868345407d6a7056802c81965f7ae9201e0abd7aa32a6c2e050e31cc1d03f8
-
C:\Users\Admin\AppData\Local\Temp\asdqw83349861051483817720Jamesss.exeFilesize
359KB
MD5770cfc8f837ede9ff7775ed9aee3c736
SHA19fb5c22f1972ee661b7c432a6ff0797cd3b007b3
SHA2565f7c788a387ee39a271554870a764feaeb19c80efc6935a38e3762b867ead0b8
SHA512e64efd8c2d4bf6fca5da6de2e2c6388f072c74a999b061da76a05cb8580c951d3e868345407d6a7056802c81965f7ae9201e0abd7aa32a6c2e050e31cc1d03f8
-
C:\Users\Admin\AppData\Local\Temp\asdqw83349861051483817720Jamesss.exeFilesize
359KB
MD5770cfc8f837ede9ff7775ed9aee3c736
SHA19fb5c22f1972ee661b7c432a6ff0797cd3b007b3
SHA2565f7c788a387ee39a271554870a764feaeb19c80efc6935a38e3762b867ead0b8
SHA512e64efd8c2d4bf6fca5da6de2e2c6388f072c74a999b061da76a05cb8580c951d3e868345407d6a7056802c81965f7ae9201e0abd7aa32a6c2e050e31cc1d03f8
-
C:\Users\Admin\AppData\Roaming\ie0BjxAPXD\Desktop.iniFilesize
63B
MD5e783bdd20a976eaeaae1ff4624487420
SHA1c2a44fab9df00b3e11582546b16612333c2f9286
SHA2562f65fa9c7ed712f493782abf91467f869419a2f8b5adf23b44019c08190fa3f3
SHA5128c883678e4625ef44f4885b8c6d7485196774f9cb0b9eee7dd18711749bcae474163df9965effcd13ecd1a33cd7265010c152f8504d6013e4f4d85d68a901a80
-
C:\Users\Admin\AppData\Roaming\ie0BjxAPXD\OYmREFT1Hb.VwAFilesize
97KB
MD5d5adb5e6f16786fb8e87f4ba6ca59311
SHA11078e0a3637412550770acafcaaa9a70b37bbc53
SHA256f9549ed3c45c8e5c305883fd79052437e0ab666c2b8c0c96f1781f71dcd64085
SHA51275259756e11eb2a3a3b646e9daebc18ff21db5e323878b1e65566d945513fa66eb56f59433cd26b8e4647a577612cadfa4f376bf5d2e651341fc208ad99448c8
-
\Users\Admin\AppData\Local\Temp\asdqw83349861051483817720Jamesss.exeFilesize
359KB
MD5770cfc8f837ede9ff7775ed9aee3c736
SHA19fb5c22f1972ee661b7c432a6ff0797cd3b007b3
SHA2565f7c788a387ee39a271554870a764feaeb19c80efc6935a38e3762b867ead0b8
SHA512e64efd8c2d4bf6fca5da6de2e2c6388f072c74a999b061da76a05cb8580c951d3e868345407d6a7056802c81965f7ae9201e0abd7aa32a6c2e050e31cc1d03f8
-
memory/580-95-0x0000000000000000-mapping.dmp
-
memory/828-122-0x00000000022C0000-0x00000000052C0000-memory.dmpFilesize
48.0MB
-
memory/828-108-0x00000000022C0000-0x00000000052C0000-memory.dmpFilesize
48.0MB
-
memory/828-96-0x0000000000000000-mapping.dmp
-
memory/924-68-0x0000000000000000-mapping.dmp
-
memory/944-74-0x0000000000000000-mapping.dmp
-
memory/944-92-0x0000000074000000-0x00000000745AB000-memory.dmpFilesize
5.7MB
-
memory/944-89-0x0000000074000000-0x00000000745AB000-memory.dmpFilesize
5.7MB
-
memory/944-88-0x00000000756A1000-0x00000000756A3000-memory.dmpFilesize
8KB
-
memory/944-121-0x0000000074000000-0x00000000745AB000-memory.dmpFilesize
5.7MB
-
memory/996-123-0x0000000000000000-mapping.dmp
-
memory/1044-57-0x00000000020B0000-0x00000000050B0000-memory.dmpFilesize
48.0MB
-
memory/1044-54-0x000007FEFC181000-0x000007FEFC183000-memory.dmpFilesize
8KB
-
memory/1160-91-0x00000000021D0000-0x00000000051D0000-memory.dmpFilesize
48.0MB
-
memory/1160-87-0x00000000021D0000-0x00000000051D0000-memory.dmpFilesize
48.0MB
-
memory/1160-69-0x0000000000000000-mapping.dmp
-
memory/1448-110-0x00000000000C0000-0x00000000000D9000-memory.dmpFilesize
100KB
-
memory/1448-114-0x00000000000C0000-0x00000000000D9000-memory.dmpFilesize
100KB
-
memory/1448-117-0x000000000041043C-mapping.dmp
-
memory/1448-119-0x00000000000C0000-0x00000000000D9000-memory.dmpFilesize
100KB
-
memory/1448-113-0x00000000000C0000-0x00000000000D9000-memory.dmpFilesize
100KB
-
memory/1448-111-0x00000000000C0000-0x00000000000D9000-memory.dmpFilesize
100KB
-
memory/1712-93-0x0000000000000000-mapping.dmp
-
memory/1808-94-0x0000000000000000-mapping.dmp