Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-07-2023 06:53

General

  • Target

    nun.jar

  • Size

    49KB

  • MD5

    1ec26b2e83ccbffc6a8552d92d99a0da

  • SHA1

    0158ee62d67584fcf1fe3d9665325762fbb1ee6e

  • SHA256

    f3980210a51b33547b4fec31f77458036247dfcd12baca421eedc6bd4761aecf

  • SHA512

    43d04bb614e170d3eda83d1783dbc58148b863e0c98cb10293c7a31bcae92ebdf55ad1a583336fbd005390d6fca13370f7a64a8b4a266f0d2aad53119aa01ff9

  • SSDEEP

    768:BMoaNhfb2Ru7DBIJ/NxkRs8FmVyx468Bx7d+niXvh5913LQ5ip3+QEsZLHJ+x37M:EbyatImEZYENbQixEs5HJOI

Score
8/10

Malware Config

Signatures

  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\ProgramData\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\nun.jar
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2868
    • C:\Windows\SYSTEM32\reg.exe
      reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v java /t REG_SZ /d "\"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe\" -jar \"C:\Users\Admin\AppData\Roaming\java\java.jar.7BW\"" /f
      2⤵
      • Adds Run key to start application
      • Modifies registry key
      PID:4924
    • C:\Windows\SYSTEM32\attrib.exe
      attrib +s +h +r "C:\Users\Admin\AppData\Roaming\java"
      2⤵
      • Sets file to hidden
      • Views/modifies file attributes
      PID:4968
    • C:\Windows\SYSTEM32\attrib.exe
      attrib +s +h +r "C:\Users\Admin\AppData\Roaming\java\*.*"
      2⤵
      • Sets file to hidden
      • Drops desktop.ini file(s)
      • Views/modifies file attributes
      PID:4200
    • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
      "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\java\java.jar.7BW"
      2⤵
        PID:3644

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\.oracle_jre_usage\90737d32e3aba4b.timestamp

      Filesize

      50B

      MD5

      19bed309c80dc83c7191edd43b188a63

      SHA1

      b9322570e06c1a4f2410a09e24647650b1cf0de9

      SHA256

      786eb73a1882a97ddc299c1099a99391363658478f7c02d949b2d687f2e59f4b

      SHA512

      c3c63e0505fe04341caa010f03f5f3cacf81d0c8e82efbb0a08e255d40b0ca41c2a393a12a937bef504504b2ad611cd0ffc3b2f6a4a9e649db0819d4aed4a02e

    • C:\Users\Admin\AppData\Roaming\java\Desktop.ini

      Filesize

      63B

      MD5

      e783bdd20a976eaeaae1ff4624487420

      SHA1

      c2a44fab9df00b3e11582546b16612333c2f9286

      SHA256

      2f65fa9c7ed712f493782abf91467f869419a2f8b5adf23b44019c08190fa3f3

      SHA512

      8c883678e4625ef44f4885b8c6d7485196774f9cb0b9eee7dd18711749bcae474163df9965effcd13ecd1a33cd7265010c152f8504d6013e4f4d85d68a901a80

    • C:\Users\Admin\AppData\Roaming\java\java.jar.7BW

      Filesize

      49KB

      MD5

      1ec26b2e83ccbffc6a8552d92d99a0da

      SHA1

      0158ee62d67584fcf1fe3d9665325762fbb1ee6e

      SHA256

      f3980210a51b33547b4fec31f77458036247dfcd12baca421eedc6bd4761aecf

      SHA512

      43d04bb614e170d3eda83d1783dbc58148b863e0c98cb10293c7a31bcae92ebdf55ad1a583336fbd005390d6fca13370f7a64a8b4a266f0d2aad53119aa01ff9

    • C:\Users\Admin\rE35z0zNJO.tmp

      Filesize

      13B

      MD5

      cd61a17f454b8234367d1337e5959ca1

      SHA1

      e8706ecb1785b14788469b191e1820edd737d69a

      SHA256

      0c239d2563df602a6194d06e1c3ea5e18040698c27d415ff46d9914e76809f8e

      SHA512

      0daeafd251ccc7366ccf886832e0fb8eb29d897c8078c84e4ca6c84fda86985b7f7720e66311639b17b90df51f1020307fcaf7aa3722cd6f95bca3d0ca599af5

    • memory/2868-143-0x0000000002960000-0x0000000002961000-memory.dmp

      Filesize

      4KB

    • memory/2868-154-0x0000000002960000-0x0000000002961000-memory.dmp

      Filesize

      4KB

    • memory/3644-168-0x0000000000C50000-0x0000000000C51000-memory.dmp

      Filesize

      4KB