Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2023 06:53
Static task
static1
Behavioral task
behavioral1
Sample
nun.jar
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
nun.jar
Resource
win10v2004-20230703-en
General
-
Target
nun.jar
-
Size
49KB
-
MD5
1ec26b2e83ccbffc6a8552d92d99a0da
-
SHA1
0158ee62d67584fcf1fe3d9665325762fbb1ee6e
-
SHA256
f3980210a51b33547b4fec31f77458036247dfcd12baca421eedc6bd4761aecf
-
SHA512
43d04bb614e170d3eda83d1783dbc58148b863e0c98cb10293c7a31bcae92ebdf55ad1a583336fbd005390d6fca13370f7a64a8b4a266f0d2aad53119aa01ff9
-
SSDEEP
768:BMoaNhfb2Ru7DBIJ/NxkRs8FmVyx468Bx7d+niXvh5913LQ5ip3+QEsZLHJ+x37M:EbyatImEZYENbQixEs5HJOI
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 4968 attrib.exe 4200 attrib.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\java = "\"C:\\Program Files\\Java\\jre1.8.0_66\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\java\\java.jar.7BW\"" reg.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\java\Desktop.ini java.exe File opened for modification C:\Users\Admin\AppData\Roaming\java\Desktop.ini attrib.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\tem java.exe File opened for modification C:\Windows\tem java.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4924 reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2868 java.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2868 wrote to memory of 4924 2868 java.exe 86 PID 2868 wrote to memory of 4924 2868 java.exe 86 PID 2868 wrote to memory of 4200 2868 java.exe 91 PID 2868 wrote to memory of 4200 2868 java.exe 91 PID 2868 wrote to memory of 4968 2868 java.exe 88 PID 2868 wrote to memory of 4968 2868 java.exe 88 PID 2868 wrote to memory of 3644 2868 java.exe 92 PID 2868 wrote to memory of 3644 2868 java.exe 92 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4968 attrib.exe 4200 attrib.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\nun.jar1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SYSTEM32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v java /t REG_SZ /d "\"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe\" -jar \"C:\Users\Admin\AppData\Roaming\java\java.jar.7BW\"" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:4924
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Roaming\java"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4968
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Roaming\java\*.*"2⤵
- Sets file to hidden
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:4200
-
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\java\java.jar.7BW"2⤵PID:3644
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50B
MD519bed309c80dc83c7191edd43b188a63
SHA1b9322570e06c1a4f2410a09e24647650b1cf0de9
SHA256786eb73a1882a97ddc299c1099a99391363658478f7c02d949b2d687f2e59f4b
SHA512c3c63e0505fe04341caa010f03f5f3cacf81d0c8e82efbb0a08e255d40b0ca41c2a393a12a937bef504504b2ad611cd0ffc3b2f6a4a9e649db0819d4aed4a02e
-
Filesize
63B
MD5e783bdd20a976eaeaae1ff4624487420
SHA1c2a44fab9df00b3e11582546b16612333c2f9286
SHA2562f65fa9c7ed712f493782abf91467f869419a2f8b5adf23b44019c08190fa3f3
SHA5128c883678e4625ef44f4885b8c6d7485196774f9cb0b9eee7dd18711749bcae474163df9965effcd13ecd1a33cd7265010c152f8504d6013e4f4d85d68a901a80
-
Filesize
49KB
MD51ec26b2e83ccbffc6a8552d92d99a0da
SHA10158ee62d67584fcf1fe3d9665325762fbb1ee6e
SHA256f3980210a51b33547b4fec31f77458036247dfcd12baca421eedc6bd4761aecf
SHA51243d04bb614e170d3eda83d1783dbc58148b863e0c98cb10293c7a31bcae92ebdf55ad1a583336fbd005390d6fca13370f7a64a8b4a266f0d2aad53119aa01ff9
-
Filesize
13B
MD5cd61a17f454b8234367d1337e5959ca1
SHA1e8706ecb1785b14788469b191e1820edd737d69a
SHA2560c239d2563df602a6194d06e1c3ea5e18040698c27d415ff46d9914e76809f8e
SHA5120daeafd251ccc7366ccf886832e0fb8eb29d897c8078c84e4ca6c84fda86985b7f7720e66311639b17b90df51f1020307fcaf7aa3722cd6f95bca3d0ca599af5