Analysis
-
max time kernel
80s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2023, 02:06
Static task
static1
Behavioral task
behavioral1
Sample
a72a19876fe62af12f42761471cdef68417e52e97153c4acc2cc80b60ef789d5.jar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a72a19876fe62af12f42761471cdef68417e52e97153c4acc2cc80b60ef789d5.jar
Resource
win10v2004-20230221-en
General
-
Target
a72a19876fe62af12f42761471cdef68417e52e97153c4acc2cc80b60ef789d5.jar
-
Size
742KB
-
MD5
c83fc7cc981ab7ae63f695407f79fd38
-
SHA1
bc85afadf667ab21c48354686013010e8b41f544
-
SHA256
a72a19876fe62af12f42761471cdef68417e52e97153c4acc2cc80b60ef789d5
-
SHA512
20a2cf45c105b11b833aa12e042e6e5295803deb9d52e22ada4084173eaaa0c0c91918b778ff1cc5c50102149f1a72959fd9cf8e28ca4ad25971d5764cd1c223
-
SSDEEP
12288:gRvrLJvZLl+YBVeUYz4rVSmp/zX9HpMSJgKsH/F7oowuzth/gADat1qEFmmqV:oLJvZHBVelc9dDbGVloath5D6qqmpV
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4428 wrote to memory of 2408 4428 java.exe 85 PID 4428 wrote to memory of 2408 4428 java.exe 85
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\a72a19876fe62af12f42761471cdef68417e52e97153c4acc2cc80b60ef789d5.jar1⤵
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\null2⤵PID:2408
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
463B
MD504b97973b91178f7ced6e372ddbf5d52
SHA1e6646d1762cfd8856ec13a17609f027e84fe7d20
SHA256f44a8b5ba87af902681a05341d76c5dcbe079e67b6d7c5fe5848db1da82d4240
SHA5125da82015a04fc89f5f742e80c1d61568db645b512aae7baf4766b4620b1733f73df9c9b3c62dafe22bc703ea33d758b132a53d168d4b9251dbc5c8149e9c773f