Analysis
-
max time kernel
169s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 17:08
Static task
static1
Behavioral task
behavioral1
Sample
1c3b271f968b45773005a216c6505f23066f4b54f2c3c7b3b000a83cdf20f041.jar
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1c3b271f968b45773005a216c6505f23066f4b54f2c3c7b3b000a83cdf20f041.jar
Resource
win10v2004-20220812-en
General
-
Target
1c3b271f968b45773005a216c6505f23066f4b54f2c3c7b3b000a83cdf20f041.jar
-
Size
4.1MB
-
MD5
ec976b857d9e92c111868d9049c425e4
-
SHA1
c32760f9e7d37a800de227416744565403f4c70e
-
SHA256
1c3b271f968b45773005a216c6505f23066f4b54f2c3c7b3b000a83cdf20f041
-
SHA512
83d1c2061520580e96dee497ecf6a3c9c8af0ae88fe6157d203fddd43d5f4cacd1507d78e6f41b32570e03e1eee80e193826cb8c0f54c0643d686c9b494c065d
-
SSDEEP
98304:cHZztJVudVKkGxbbPsGQA9037qhLqbVe1pxmo6W9pTIgbyRsS:cHZzcXnGtb7XOmcVvnsIgO2S
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Taskmgr.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Taskmgr.exe\debugger = "svchost.exe" regedit.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 696 attrib.exe 576 attrib.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Javaw = "\"C:\\Program Files\\Java\\jre7\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\Java TM\\Java.txt\"" reg.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Javaw = "\"C:\\Program Files\\Java\\jre7\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\Java TM\\Java.txt\"" reg.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Run reg.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Java TM\Desktop.ini javaw.exe File opened for modification C:\Users\Admin\AppData\Roaming\Java TM\Desktop.ini attrib.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\tem.txt javaw.exe File opened for modification C:\Windows\tem.txt javaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 4 IoCs
pid Process 676 reg.exe 580 reg.exe 1984 reg.exe 888 reg.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1516 regedit.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 1912 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 848 java.exe 1952 javaw.exe 1912 AcroRd32.exe 1912 AcroRd32.exe 1912 AcroRd32.exe 1912 AcroRd32.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 848 wrote to memory of 1952 848 java.exe 28 PID 848 wrote to memory of 1952 848 java.exe 28 PID 848 wrote to memory of 1952 848 java.exe 28 PID 848 wrote to memory of 1036 848 java.exe 29 PID 848 wrote to memory of 1036 848 java.exe 29 PID 848 wrote to memory of 1036 848 java.exe 29 PID 1036 wrote to memory of 1912 1036 cmd.exe 30 PID 1036 wrote to memory of 1912 1036 cmd.exe 30 PID 1036 wrote to memory of 1912 1036 cmd.exe 30 PID 1036 wrote to memory of 1912 1036 cmd.exe 30 PID 1952 wrote to memory of 676 1952 javaw.exe 31 PID 1952 wrote to memory of 676 1952 javaw.exe 31 PID 1952 wrote to memory of 676 1952 javaw.exe 31 PID 1952 wrote to memory of 580 1952 javaw.exe 32 PID 1952 wrote to memory of 580 1952 javaw.exe 32 PID 1952 wrote to memory of 580 1952 javaw.exe 32 PID 1952 wrote to memory of 696 1952 javaw.exe 33 PID 1952 wrote to memory of 696 1952 javaw.exe 33 PID 1952 wrote to memory of 696 1952 javaw.exe 33 PID 1952 wrote to memory of 576 1952 javaw.exe 35 PID 1952 wrote to memory of 576 1952 javaw.exe 35 PID 1952 wrote to memory of 576 1952 javaw.exe 35 PID 1952 wrote to memory of 1188 1952 javaw.exe 39 PID 1952 wrote to memory of 1188 1952 javaw.exe 39 PID 1952 wrote to memory of 1188 1952 javaw.exe 39 PID 1692 wrote to memory of 1516 1692 cmd.exe 46 PID 1692 wrote to memory of 1516 1692 cmd.exe 46 PID 1692 wrote to memory of 1516 1692 cmd.exe 46 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 696 attrib.exe 576 attrib.exe
Processes
-
C:\Windows\system32\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\1c3b271f968b45773005a216c6505f23066f4b54f2c3c7b3b000a83cdf20f041.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\asdqw629754719231483017013.jar"2⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Javaw /t REG_SZ /d "\"C:\Program Files\Java\jre7\bin\javaw.exe\" -jar \"C:\Users\Admin\AppData\Roaming\Java TM\Java.txt\"" /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:676
-
-
C:\Windows\system32\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Javaw /f3⤵
- Modifies registry key
PID:580
-
-
C:\Windows\system32\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Roaming\Java TM\*.*"3⤵
- Sets file to hidden
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:696
-
-
C:\Windows\system32\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Roaming\Java TM"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:576
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\Java TM\Java.txt"3⤵PID:1188
-
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Javaw /t REG_SZ /d "\"C:\Program Files\Java\jre7\bin\javaw.exe\" -jar \"C:\Users\Admin\AppData\Roaming\Java TM\Java.txt\"" /f4⤵
- Adds Run key to start application
- Modifies registry key
PID:1984
-
-
C:\Windows\system32\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Javaw /f4⤵
- Modifies registry key
PID:888
-
-
C:\Windows\system32\cmd.execmd.exe /c regedit /s C:\Users\Admin\AppData\Local\Temp\TaskNetworkGathor7114091144738536518.reg4⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\regedit.exeregedit /s C:\Users\Admin\AppData\Local\Temp\TaskNetworkGathor7114091144738536518.reg5⤵
- Sets file execution options in registry
- Runs .reg file with regedit
PID:1516
-
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\asdqw24373473647141030381payment_reminder.pdf2⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\asdqw24373473647141030381payment_reminder.pdf"3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:1912
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5a21d2a19a4c66cce8e4d7975604dfac7
SHA1ce77aa7b9f3af5f091c0fa18ae18f310bd89df85
SHA256634dafa7a5591d5425b4fa4e46d71f429aba805972b605f8576df57241901eaf
SHA512b5d72080e52af8706a04e7fdebc34d46a6713848330566a3f441fc1d84f13da036a082dd08c6a2dfc3154d1780a7f81afd6461c554aee8dae15ffc1eef7ad161
-
Filesize
47KB
MD56f705ddb7b6e05abaa659642c569d7ed
SHA153227c1b29ed8290263fc9bdccaaf7a03ec6aba2
SHA2564f2aefa4c0b242741f3d32f65969e595859fadb8929f95e9c1195daef8172fa0
SHA5128ae341008fde4f9d08b8884b993e7ddbda6821099668d932385649b00c30b24cc934637389f7b70615b6a5a0e3614185da4c3049b7f5a7fb18858b158f31a065
-
Filesize
63B
MD5e783bdd20a976eaeaae1ff4624487420
SHA1c2a44fab9df00b3e11582546b16612333c2f9286
SHA2562f65fa9c7ed712f493782abf91467f869419a2f8b5adf23b44019c08190fa3f3
SHA5128c883678e4625ef44f4885b8c6d7485196774f9cb0b9eee7dd18711749bcae474163df9965effcd13ecd1a33cd7265010c152f8504d6013e4f4d85d68a901a80
-
Filesize
47KB
MD56f705ddb7b6e05abaa659642c569d7ed
SHA153227c1b29ed8290263fc9bdccaaf7a03ec6aba2
SHA2564f2aefa4c0b242741f3d32f65969e595859fadb8929f95e9c1195daef8172fa0
SHA5128ae341008fde4f9d08b8884b993e7ddbda6821099668d932385649b00c30b24cc934637389f7b70615b6a5a0e3614185da4c3049b7f5a7fb18858b158f31a065