Analysis
-
max time kernel
83s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2023 18:54
Static task
static1
Behavioral task
behavioral1
Sample
receipt.pdf.jar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
receipt.pdf.jar
Resource
win10v2004-20230220-en
General
-
Target
receipt.pdf.jar
-
Size
669KB
-
MD5
976a2c3925351014acd416c553a321bb
-
SHA1
6c9b83fb2b500875261b6debec4038b20574903f
-
SHA256
fc8a8c40baef56b6f5005535f9c114beb9677da4ac69fc43e64fcd19fdc775b6
-
SHA512
f052160c4a4c6b14043ed90484ef6f0396a07945825ecaf1ba4a9d9d70e04da33c8cd39c6cdd5720a025c908016052d9452a3c4d5f59310bb43f3fda631dfe1d
-
SSDEEP
12288:JHwP4OQmR27s/+mNllHP/6jaR1z5oORVoyvjwHuLsjJVT+B:V7OQmR27m+GP/6jaRV5XoyvjZHB
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre1.8.0_66\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1680116074984.tmp" reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2600 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2600 wrote to memory of 2060 2600 java.exe 85 PID 2600 wrote to memory of 2060 2600 java.exe 85 PID 2600 wrote to memory of 212 2600 java.exe 87 PID 2600 wrote to memory of 212 2600 java.exe 87 PID 212 wrote to memory of 2380 212 cmd.exe 89 PID 212 wrote to memory of 2380 212 cmd.exe 89 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2060 attrib.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\receipt.pdf.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1680116074984.tmp2⤵
- Views/modifies file attributes
PID:2060
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1680116074984.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1680116074984.tmp" /f3⤵
- Adds Run key to start application
PID:2380
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
669KB
MD5976a2c3925351014acd416c553a321bb
SHA16c9b83fb2b500875261b6debec4038b20574903f
SHA256fc8a8c40baef56b6f5005535f9c114beb9677da4ac69fc43e64fcd19fdc775b6
SHA512f052160c4a4c6b14043ed90484ef6f0396a07945825ecaf1ba4a9d9d70e04da33c8cd39c6cdd5720a025c908016052d9452a3c4d5f59310bb43f3fda631dfe1d