Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04/08/2023, 20:26
Static task
static1
Behavioral task
behavioral1
Sample
8a7b6e1078e87eebef513db2b1d6752bac43598ffbff8d2e12073d46716499fc.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8a7b6e1078e87eebef513db2b1d6752bac43598ffbff8d2e12073d46716499fc.exe
Resource
win10v2004-20230703-en
General
-
Target
8a7b6e1078e87eebef513db2b1d6752bac43598ffbff8d2e12073d46716499fc.exe
-
Size
311KB
-
MD5
150f9ebe5454f1de342868d5f159b6f4
-
SHA1
a2f2ffa04a43a31c6691448a714f30c07713f6c2
-
SHA256
8a7b6e1078e87eebef513db2b1d6752bac43598ffbff8d2e12073d46716499fc
-
SHA512
9d3bdb0898065ee91060b3ae1fc57c6674d8f979fa041660a3f9326084f1bd3eff6caf062382187bb88d8672729dd85aa01b551d462b54b44d77b0eb3bd2b159
-
SSDEEP
6144:EOYGXaPNxdgSdcq2pVZPOJHAbKeT+tMXYOT:oGqN/XdctpVtkOT+tFOT
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ java.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ java.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4820 java.exe 4820 java.exe 4820 java.exe 4820 java.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2792 wrote to memory of 5084 2792 8a7b6e1078e87eebef513db2b1d6752bac43598ffbff8d2e12073d46716499fc.exe 86 PID 2792 wrote to memory of 5084 2792 8a7b6e1078e87eebef513db2b1d6752bac43598ffbff8d2e12073d46716499fc.exe 86 PID 2792 wrote to memory of 5084 2792 8a7b6e1078e87eebef513db2b1d6752bac43598ffbff8d2e12073d46716499fc.exe 86 PID 5084 wrote to memory of 4820 5084 cmd.exe 89 PID 5084 wrote to memory of 4820 5084 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a7b6e1078e87eebef513db2b1d6752bac43598ffbff8d2e12073d46716499fc.exe"C:\Users\Admin\AppData\Local\Temp\8a7b6e1078e87eebef513db2b1d6752bac43598ffbff8d2e12073d46716499fc.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\start.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar ./APP.jar3⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4820
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5f44a42c52a8e5af31777f7295460f880
SHA14838b1309366b91e7f0cbc7c467eab5ac2e9efea
SHA2564687f6d1b7d2a04bdb28c9c69bb7e2abed0cf1937dfc8da42bcc7ac7e3098739
SHA5124bf206321685f29cb109b67ee0d4cc9929fbf5fbc061b0fdd17d74310a687225c7ae5bb78e39a17a7cc807d153278e412480c1f1e8c3a22740d4a061b2e3249b
-
Filesize
395B
MD5b7c2b427e0a9e7168d7ea478e2bf84fb
SHA13835db21d67d8dd2914c3bbc1443715bd77d2775
SHA256d87e63e73406230945c6876c58e0ddc3009968a351e464acc95d1f7e6cc007d7
SHA5126fc321f4e04e2cb606f319198c36c9ba26c28a6642e6ceafcf3b261230bd199321ee212f4719126f9b5d8699b519caa99e48f8173262de6c5f2dc6823dd3fb84