Overview
overview
3Static
static
1jar-infect...er.zip
windows7-x64
1jar-infect...er.zip
windows10-2004-x64
1jar-infect...ib.dll
windows7-x64
1jar-infect...ib.dll
windows10-2004-x64
1jar-infect...er.exe
windows7-x64
1jar-infect...er.exe
windows10-2004-x64
1jar-infect...config
windows7-x64
3jar-infect...config
windows10-2004-x64
3jar-infect...ll.dll
windows7-x64
1jar-infect...ll.dll
windows10-2004-x64
1jar-infect...ck.dll
windows7-x64
1jar-infect...ck.dll
windows10-2004-x64
1jar-infect...rs.dll
windows7-x64
1jar-infect...rs.dll
windows10-2004-x64
1jar-infect...ry.dll
windows7-x64
1jar-infect...ry.dll
windows10-2004-x64
1jar-infect...rs.dll
windows7-x64
1jar-infect...rs.dll
windows10-2004-x64
1jar-infect...fe.dll
windows7-x64
1jar-infect...fe.dll
windows10-2004-x64
1jar-infect...ns.dll
windows7-x64
1jar-infect...ns.dll
windows10-2004-x64
1Analysis
-
max time kernel
107s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13/06/2023, 16:40
Static task
static1
Behavioral task
behavioral1
Sample
jar-infection-scanner.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
jar-infection-scanner.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
jar-infection-scanner/ICSharpCode.SharpZipLib.dll
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
jar-infection-scanner/ICSharpCode.SharpZipLib.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
jar-infection-scanner/JarInfectionScanner.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
jar-infection-scanner/JarInfectionScanner.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
jar-infection-scanner/JarInfectionScanner.exe.config
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
jar-infection-scanner/JarInfectionScanner.exe.config
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
jar-infection-scanner/Microsoft.WindowsAPICodePack.Shell.dll
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
jar-infection-scanner/Microsoft.WindowsAPICodePack.Shell.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral11
Sample
jar-infection-scanner/Microsoft.WindowsAPICodePack.dll
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
jar-infection-scanner/Microsoft.WindowsAPICodePack.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
jar-infection-scanner/System.Buffers.dll
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
jar-infection-scanner/System.Buffers.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
jar-infection-scanner/System.Memory.dll
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
jar-infection-scanner/System.Memory.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral17
Sample
jar-infection-scanner/System.Numerics.Vectors.dll
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
jar-infection-scanner/System.Numerics.Vectors.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
jar-infection-scanner/System.Runtime.CompilerServices.Unsafe.dll
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
jar-infection-scanner/System.Runtime.CompilerServices.Unsafe.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
jar-infection-scanner/System.Threading.Tasks.Extensions.dll
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
jar-infection-scanner/System.Threading.Tasks.Extensions.dll
Resource
win10v2004-20230220-en
General
-
Target
jar-infection-scanner/JarInfectionScanner.exe
-
Size
25KB
-
MD5
f953be311c44ef80366ec2acf8e2afdc
-
SHA1
215bc84d8d6d93b47e4c164d5eb9a65290f9a557
-
SHA256
94fbc2ed1a96f78ef82c8b452c2c445cb9d882eec2a8cdbe637595452e9e6980
-
SHA512
7a1be2551dfc0f3f82f3990607df12f6b796cd6ce16b53eb79e469bd5efc4b9bed674a5c16ff8ce65fb185264689d8471d5232ef8049e59f72b2581168926531
-
SSDEEP
384:asSxezDbi7bmT1xwjvdBmd5UEGLQP5fGfIYiPWsav8JN77hh3wJI8S:asSSSKRxdAGUgYiPz3hRwXS
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 709649e4159ed901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{07D2E831-0A09-11EE-A367-52C255710AF6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e43a4e8bd9fa6e41b1d885f37b7c604b000000000200000000001066000000010000200000007482a9292e6ddea55f1e0349c4de203985d82df329f2d1c075234e6bb7d52193000000000e8000000002000020000000133f9e65101e8187146f248c1d859855be1e30e6caed8dc358fa23b3ca1334d4200000000ae9deedcbbd450d8a2055f31790107fa1502650d78f8c9a1cacf5d8adee701840000000a781c368a8c2e999c19cb3b3305d012e4b9126cb2712b9c74851a365bf7fa42c63590856126334863eed26d9d13d43ac114cc276e8ce1b33b20699cf07f8692e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "393439415" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2024 iexplore.exe 2024 iexplore.exe 1140 IEXPLORE.EXE 1140 IEXPLORE.EXE 1140 IEXPLORE.EXE 1140 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2024 2012 JarInfectionScanner.exe 27 PID 2012 wrote to memory of 2024 2012 JarInfectionScanner.exe 27 PID 2012 wrote to memory of 2024 2012 JarInfectionScanner.exe 27 PID 2012 wrote to memory of 2024 2012 JarInfectionScanner.exe 27 PID 2024 wrote to memory of 1140 2024 iexplore.exe 29 PID 2024 wrote to memory of 1140 2024 iexplore.exe 29 PID 2024 wrote to memory of 1140 2024 iexplore.exe 29 PID 2024 wrote to memory of 1140 2024 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\jar-infection-scanner\JarInfectionScanner.exe"C:\Users\Admin\AppData\Local\Temp\jar-infection-scanner\JarInfectionScanner.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch&plcid=0x409&o1=.NETFramework,Version=v4.8&processName=JarInfectionScanner.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.02⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1140
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c1c153e7264201753d88078ac714318
SHA1c0ba2cb933806db782c8314af87f8f09d3cf1f25
SHA256c6e66fa28b49584743a475c58abacf3b208dd2768c70f3727b0e4833c8852973
SHA5123027861029e89d37c85290dfff5258039724bbb8d94e4e11d57f32d98e88c02c7bbd24c0044faa7366e7b2a961dbeede238be23932f9c9ae6088b0cbc1d60d8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be9b0e10dfe248ee563bc46d797451a8
SHA175a658ca9fb23e69e92f42769e71e102b99b9f4d
SHA2563b34b250e5c2a19b0d7885e2a017300eb46f0191eef41ed9bf20c39d61739e3a
SHA5125f554ce841b122072b4b67032bc92d8bc24ce5cafd1bced2ff0ce7ebf1dec191fb407f1c23782eb943e8c4c67ef68a300c3e0f085ea936afdf052699466d75de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591d5f2cb282c897dcdb4cce845bae49f
SHA1fae46421eb79aeae431aa83d18290073383a9c6a
SHA2560815e27ef9e7a61cefa0034b3ad91641a653a42e0601427031263953ad321bee
SHA512b9c0672943c5ba745599b8d64031ec0c43790d06dca06a3243c81dc1de7b0048838609c422ae35cc519fc279acbc0d1d9afd914e214bd9562f7d7cd3c9623cc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5883db7be2cefe6a129d49851fc66ea96
SHA1bc016b2af2296c54b5507dfc5753b0bf155e73ca
SHA256c8ab1c16ae624dc74fa6927089d926a09c1921debc79a0f67105938b56416f6a
SHA5125a22b61967002c86dccb893067b9bd4d7067dd91b4c5a60b9d060d8fa449228666857240a377c9c6596da2e13de142b173c8a74c36db45c012894c08b7ab257a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e75bad602bb5e8b4c06d1ee64b44a94a
SHA1b8b0efff3a4001197771736d2c73930fc262884f
SHA256c3f25a1f665d10156d910a8f3ecb3f09b3bb4726166007d90431c8c7cff9443d
SHA512212dcd33b44bbd92bec8ea6213b58dcbf2f41da447590327f8642df6ef26e39fdfca0b31b686af4520e00916347d9e415210f11cfb5cace144959cc61fc117f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540f1e2e42ae435f9eb7a590e345ce14f
SHA1cdc9586f7e9727f96aae65fdce02c381a55a46c8
SHA2564f81717d3d6173316ecc96064ecb9eb4451e5a75dcc035e4c4b6842356bc9aba
SHA512ff487a810bde4af79522b43c242f37382f1de80ed11362825688b2af942ea43ef9cc1f8c51be54bf48b765d8e1cba74717ca5f361dc1f49f7d984f21e65f21e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57eee74c29936da2f0b3a2027d7fa3db7
SHA1451fb81e1f6b29f47618b60ecd400ca54c4fcb1f
SHA256f804360c672920926041e631e25118d8df0817b7e98c9692f6ec4d1d4fce344c
SHA51257440f146d582928f91d483520ab2ff27270f004f6a50757235324d312eb0046d1d1d4be0871f3cc8dbad779b002d41a87259e5af822229c4fdb8f6c88429d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d5ea899f6f940a6b1ccefa1550776a2
SHA12fd4edd148874909fd7eb4a9e82f84412f461cd8
SHA25654b539c0185f6af881d6aecc253914a95b282f4701e260c4d5a81a834141bc41
SHA512c0322b4dd7a101798ee5eb2a5667aba9b48048d62016a5d1b3306c056c8a219a2666d38a3ea8cc160b6b161b268ac345e9a6ec3d6ac42d7271dd5f721c8fedd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5478c8d7d62e328644401d96a3ce24363
SHA157d9b8f7b57463f0bcb49ba24b088d8080b1a9bc
SHA256f36c11044b3af1ef7148e3426da4aa8b3f0bcddf3c800c60478fff1844bdd5aa
SHA512687d9c39ebef011382025450460d4706c57f07579669b5ec968e3b5cac6dca6a44d40ebfcdbc04266bc5506df8fd48bac3498bd2e1044a64248244d8c43ea2c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55788140e25d94e4ccb5d7deec2f0c4f5
SHA17955477cc85278a9d05a9b4ef4d84539326b7d48
SHA2565ce88e9567a2a32750458c489c41dc9a39f94c1b22dd91d0da863812062198a1
SHA512d114d9fdaa07bc24d02aa15df66ead429b76c66c72bc398e618ed42f69d12180e6a7d1ea1523748386272081d4f7e3d06fe64969d62feee9825692228bc7c061
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NMXH1C0L\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
600B
MD5db4d60f8b3f20eed24e44c73135fcf83
SHA13274da8ff4a88ec1947c75a664499b2c1d8d1107
SHA256a12ca7ba8abab1dcd8ec6a568d5815071a129e9222f93686a1cdd00e61997c01
SHA512de9489f4187d067fa2727c3bb7043bad1c0671b440495b8e7386a1f4a3b13079218a963ed78f59ccbb4613dccb37e88ef5ab8585bce2844e11d6b23b19606271