Analysis
-
max time kernel
151s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-es -
resource tags
arch:x64arch:x86image:win10v2004-20230221-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
24-03-2023 20:31
Static task
static1
Behavioral task
behavioral1
Sample
jre-8u361-windows-x64.exe
Resource
win10-20230220-es
Behavioral task
behavioral2
Sample
jre-8u361-windows-x64.exe
Resource
win10v2004-20230221-es
General
-
Target
jre-8u361-windows-x64.exe
-
Size
62.1MB
-
MD5
e70de386ebc763932a181fc37a2ad042
-
SHA1
18e76e452b289ae2fc167667b55a81b11ec2693f
-
SHA256
419328f3a2325b1dc27f710abd73e232e9deac47915b4dba61a697b925b5b83d
-
SHA512
a45cb9c665a867042d0d52f085d095ac774c3f9b10febd858b26d2c899f7c2b5024586156ec572be384b226a8efc44d6757bbbc920843ce58119345bea155a0d
-
SSDEEP
1572864:UYXYUrHHqj4AY8QOl+Kx1RwayO59accVL9NJ9fM4X:UYXYUrHqxl+KxzwayFTVL99l
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
jre-8u361-windows-x64.exepid process 688 jre-8u361-windows-x64.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
jre-8u361-windows-x64.exepid process 688 jre-8u361-windows-x64.exe 688 jre-8u361-windows-x64.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
jre-8u361-windows-x64.exedescription pid process target process PID 4420 wrote to memory of 688 4420 jre-8u361-windows-x64.exe jre-8u361-windows-x64.exe PID 4420 wrote to memory of 688 4420 jre-8u361-windows-x64.exe jre-8u361-windows-x64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\jre-8u361-windows-x64.exe"C:\Users\Admin\AppData\Local\Temp\jre-8u361-windows-x64.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\jds240564109.tmp\jre-8u361-windows-x64.exe"C:\Users\Admin\AppData\Local\Temp\jds240564109.tmp\jre-8u361-windows-x64.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\jre1.8.0_361\Java3BillDevices.pngFilesize
11KB
MD5b3c9f084b052e95aa3014e492d16bfa6
SHA10e33962b2191e7b1a5d85102cdf3c74fcd1254e4
SHA256a68ddd67f6fcb0bbf1defa0778ee543e92c1074c442197ab623f733cc6285948
SHA51206f51ac2962a0ec5f05ad6c90a2ba85b851d1fa2f0c079dc264fe930316cead959f68f6e34ff591b131867b482c266ac42400b06385dae712637ff0a90f902d4
-
C:\Users\Admin\AppData\Local\Temp\jds240564109.tmp\jre-8u361-windows-x64.exeFilesize
61.7MB
MD5e920cf3e63612868ed4b6cd9612bae77
SHA1ef64fb46f8e955430d6fbd3778ff03e4c1f0e1b0
SHA256a45104f8bf9a356b538f74aec9c7d25b92bef2d8e97cc27ed6d7232294a8ed82
SHA512b02af44d9a87e06b0309e842d550b54b92575ba36a3ea74184bba40d4665751d91c8547ddd9c1c009d413f56829f7fcc604592ba51118c916cd1e039930571b2
-
C:\Users\Admin\AppData\Local\Temp\jds240564109.tmp\jre-8u361-windows-x64.exeFilesize
61.7MB
MD5e920cf3e63612868ed4b6cd9612bae77
SHA1ef64fb46f8e955430d6fbd3778ff03e4c1f0e1b0
SHA256a45104f8bf9a356b538f74aec9c7d25b92bef2d8e97cc27ed6d7232294a8ed82
SHA512b02af44d9a87e06b0309e842d550b54b92575ba36a3ea74184bba40d4665751d91c8547ddd9c1c009d413f56829f7fcc604592ba51118c916cd1e039930571b2
-
C:\Users\Admin\AppData\Local\Temp\jusched.logFilesize
267KB
MD5926c4b9f82b1a380493274d61cd9f190
SHA15470727bbba2cc691d939f274b48cf37d6d07fba
SHA256731188e5702c5b6862df3e74b7fea90fb4e3f81d8ab258e3cd8c4d712eeb34d3
SHA512f632a8843a9289da008879242e8b4adcd060ef2fa34da2d1ebc3b447394cfd5866abe5e9b2ba17361f32ef9bff76f0698e904ca7c46463d85dcb517c49a722ac
-
C:\Users\Admin\AppData\Local\Temp\jusched.logFilesize
267KB
MD5809e373a2231c4b32179d7c8f70ca318
SHA17f7a1ff7afac8661f23b29f07c5213bc04b6024f
SHA25667e6b400e7b314092465de296bd834f3c878bd84309688a0dc7e6e6e1f3505ce
SHA51282c46497cd8be957041439f16cb3163dacf1451e23ceb699496b8b79610955aab136f056275fe992e68ffa8e69599748651320594f3cf09b6f46d374102e15de
-
memory/688-244-0x0000029085E80000-0x00000290874F7000-memory.dmpFilesize
22.5MB
-
memory/688-254-0x0000029085E80000-0x00000290874F7000-memory.dmpFilesize
22.5MB
-
memory/688-256-0x0000029085E80000-0x00000290874F7000-memory.dmpFilesize
22.5MB