Analysis
-
max time kernel
151s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 18:47
Static task
static1
Behavioral task
behavioral1
Sample
31000c9a6e90186c9929aa830be425f71460043b11b93101318deb7a51f4aff5.jar
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
31000c9a6e90186c9929aa830be425f71460043b11b93101318deb7a51f4aff5.jar
Resource
win10v2004-20221111-en
General
-
Target
31000c9a6e90186c9929aa830be425f71460043b11b93101318deb7a51f4aff5.jar
-
Size
1.5MB
-
MD5
dff517cbd7e11f407ce645473c6f7e38
-
SHA1
55a19171a7c097f6e6133110a6e4e848ea351581
-
SHA256
31000c9a6e90186c9929aa830be425f71460043b11b93101318deb7a51f4aff5
-
SHA512
22b47a53b12c02a0158886db64c8a30084846b16295cbeee5a103832532052987bdfc7bdf353b385ac0b134cd7ded039f5f539698194fea77dc359528afbc36d
-
SSDEEP
24576:c9Fb4I81RdzrU2ypQtkLdwGFjNh876o1qXmneXri1EkEUpKSC1TmaWYdNnMhpjy:cfb4I8bdvR5RGhN86YwoErUpKjiaW0EG
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\31000c9a6e90186c9929aa830be425f71460043b11b93101318deb7a51f4aff5.jar java.exe -
Loads dropped DLL 1 IoCs
pid Process 1388 java.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\31000c9a6e90186c9929aa830be425f71460043b11b93101318deb7a51f4aff5.jar = "C:\\Users\\Admin\\31000c9a6e90186c9929aa830be425f71460043b11b93101318deb7a51f4aff5.jar" REG.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1388 java.exe 1388 java.exe 1388 java.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1388 wrote to memory of 784 1388 java.exe 28 PID 1388 wrote to memory of 784 1388 java.exe 28 PID 1388 wrote to memory of 784 1388 java.exe 28
Processes
-
C:\Windows\system32\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\31000c9a6e90186c9929aa830be425f71460043b11b93101318deb7a51f4aff5.jar1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\system32\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "31000c9a6e90186c9929aa830be425f71460043b11b93101318deb7a51f4aff5.jar" /t REG_SZ /F /D "C:\Users\Admin\31000c9a6e90186c9929aa830be425f71460043b11b93101318deb7a51f4aff5.jar"2⤵
- Adds Run key to start application
PID:784
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD5d12501aaf90c14a87678c1199c332694
SHA147a09b3b92928d9076ad162d2f03f3426fe38095
SHA256fc23a64cc52f5b19e310a8d96b1fbfec981310359bda907f5931a53360485fbc
SHA512ee0cc22ba3c28fdf1cfd1721b466f8ccd0ac590ea37f7be77a8c7e8ed9aa7ee563921b2106e9ca05cd606706eaf17b4f835053104da4567b75f1f6ccb7e6ce94