Resubmissions

18/10/2024, 19:59

241018-yqwp8axejn 7

18/10/2024, 19:55

241018-ynenxsvgjb 1

18/10/2024, 19:55

241018-ym477axcqj 7

12/10/2023, 23:22

231012-3cqdhaeh6t 10

Analysis

  • max time kernel
    139s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 23:22

General

  • Target

    Installer.jar

  • Size

    18.4MB

  • MD5

    eaf63a5d5730fcf1c8cc5cf27354e911

  • SHA1

    f22c4b0a9c608ec00b6b84cabe434a240063e642

  • SHA256

    f51e4d9f7907dd07ee264439433e0051c5136712cbbb0cc5a81be3b7023df585

  • SHA512

    2dca09810b38664f23ca89d72f24e632d5c74874b4d9d0174dce86c30126ee1296a281da768b228840f0160ddb331e48591799799cadbf5a02d294e914a09a80

  • SSDEEP

    393216:p6aRouWO9ojV8LJxXlReGOHsxoU+REFJAHYyjFRyHJpy/LAfIiMYX/rQ:PRQ+oqdxVReGksiJL4CFcH2EX/s

Score
10/10

Malware Config

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\ProgramData\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\Installer.jar
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2428

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\flatlaf.temp\flatlaf-windows-x86_64-5104082779000.dll

          Filesize

          21KB

          MD5

          4ca3290a99adadde557930cd481d7539

          SHA1

          26034442a76131dd3d37c8f28b6e9bebc7c1fe7c

          SHA256

          dd130c68dc36bcedbe51a6b8ec3b3358a460d45952f6280e12331f48850b6b3b

          SHA512

          9341c60f92dd3f89f82555055924bdae6fcce1e4cd13a7dde5129ebdce04bae377292237a2ed6c3e7623b242e82b01c7ed1717af4d7db8ca473e9fd7b7b190d5

        • memory/2428-48-0x0000000002EE0000-0x0000000003EE0000-memory.dmp

          Filesize

          16.0MB

        • memory/2428-72-0x0000000002EE0000-0x0000000003EE0000-memory.dmp

          Filesize

          16.0MB

        • memory/2428-35-0x0000000002EE0000-0x0000000003EE0000-memory.dmp

          Filesize

          16.0MB

        • memory/2428-36-0x0000000001100000-0x0000000001101000-memory.dmp

          Filesize

          4KB

        • memory/2428-39-0x0000000001100000-0x0000000001101000-memory.dmp

          Filesize

          4KB

        • memory/2428-4-0x0000000002EE0000-0x0000000003EE0000-memory.dmp

          Filesize

          16.0MB

        • memory/2428-62-0x0000000002EE0000-0x0000000003EE0000-memory.dmp

          Filesize

          16.0MB

        • memory/2428-14-0x0000000001100000-0x0000000001101000-memory.dmp

          Filesize

          4KB

        • memory/2428-82-0x0000000002EE0000-0x0000000003EE0000-memory.dmp

          Filesize

          16.0MB

        • memory/2428-83-0x0000000002EE0000-0x0000000003EE0000-memory.dmp

          Filesize

          16.0MB

        • memory/2428-84-0x0000000002EE0000-0x0000000003EE0000-memory.dmp

          Filesize

          16.0MB

        • memory/2428-85-0x0000000002EE0000-0x0000000003EE0000-memory.dmp

          Filesize

          16.0MB

        • memory/2428-86-0x0000000002EE0000-0x0000000003EE0000-memory.dmp

          Filesize

          16.0MB

        • memory/2428-87-0x0000000002EE0000-0x0000000003EE0000-memory.dmp

          Filesize

          16.0MB