Overview
overview
7Static
static
1EzExploit/...rd.jar
windows7-x64
1EzExploit/...rd.jar
windows10-2004-x64
7EzExploit/...rd.bat
windows7-x64
1EzExploit/...rd.bat
windows10-2004-x64
7EzExploit/...rt.jar
windows7-x64
1EzExploit/...rt.jar
windows10-2004-x64
7EzExploit/...nd.jar
windows7-x64
1EzExploit/...nd.jar
windows10-2004-x64
7EzExploit/...st.jar
windows7-x64
1EzExploit/...st.jar
windows10-2004-x64
7EzExploit/...nd.jar
windows7-x64
1EzExploit/...nd.jar
windows10-2004-x64
7EzExploit/...er.jar
windows7-x64
1EzExploit/...er.jar
windows10-2004-x64
7EzExploit/...ml.jar
windows7-x64
1EzExploit/...ml.jar
windows10-2004-x64
7EzExploit/...ix.jar
windows7-x64
1EzExploit/...ix.jar
windows10-2004-x64
7Analysis
-
max time kernel
203s -
max time network
209s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2023, 14:58
Static task
static1
Behavioral task
behavioral1
Sample
EzExploit/ezexploit_standard.jar
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
EzExploit/ezexploit_standard.jar
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
EzExploit/launch-standard.bat
Resource
win7-20231020-en
Behavioral task
behavioral4
Sample
EzExploit/launch-standard.bat
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
EzExploit/modules/cmd_alert.jar
Resource
win7-20231023-en
Behavioral task
behavioral6
Sample
EzExploit/modules/cmd_alert.jar
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
EzExploit/modules/cmd_find.jar
Resource
win7-20231020-en
Behavioral task
behavioral8
Sample
EzExploit/modules/cmd_find.jar
Resource
win10v2004-20231020-en
Behavioral task
behavioral9
Sample
EzExploit/modules/cmd_list.jar
Resource
win7-20231023-en
Behavioral task
behavioral10
Sample
EzExploit/modules/cmd_list.jar
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
EzExploit/modules/cmd_send.jar
Resource
win7-20231023-en
Behavioral task
behavioral12
Sample
EzExploit/modules/cmd_send.jar
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
EzExploit/modules/cmd_server.jar
Resource
win7-20231025-en
Behavioral task
behavioral14
Sample
EzExploit/modules/cmd_server.jar
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
EzExploit/modules/reconnect_yaml.jar
Resource
win7-20231020-en
Behavioral task
behavioral16
Sample
EzExploit/modules/reconnect_yaml.jar
Resource
win10v2004-20231020-en
Behavioral task
behavioral17
Sample
EzExploit/plugins/RconFix.jar
Resource
win7-20231020-en
Behavioral task
behavioral18
Sample
EzExploit/plugins/RconFix.jar
Resource
win10v2004-20231023-en
General
-
Target
EzExploit/modules/cmd_server.jar
-
Size
7KB
-
MD5
7390d87c1e8f52bc6fb77842b54c1a47
-
SHA1
61c8387e7cbbf83679362cca0f32b5f7613b3218
-
SHA256
70e7c33275ab86e2a79d40dc76153b8bb5a29d9c18bfeef8605d32cf8ca1af37
-
SHA512
442f2f28da32128828a2eac1e7659b9d44edd1fe54637f063c28c41b186b77b7786104a57de27e19140a38120b4123863bae314f1923efe9c2a03c3c5ef17b6f
-
SSDEEP
96:/6HNADjagGj/S0Q31hmVXLEboTx8AoMXsKhTGett8pxJWNPInGCeeWyzV+0GzWFw:/6aXaytFMwst8TJWkWyzvGzWq2S
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1392 icacls.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5072 wrote to memory of 1392 5072 java.exe 91 PID 5072 wrote to memory of 1392 5072 java.exe 91
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\EzExploit\modules\cmd_server.jar1⤵
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:1392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD501233684545453f6d583fd5478dc0ed6
SHA14ddf35634595556f78fe149145477cd370e8b389
SHA25641dfca6677b9a8946d8f561735b6d64c69f3f8881625cfec20f2ccf48c9f70c5
SHA512169c4ed437834ba93a44c817c9fed829321c2582757818209fd23c96316c79e7bedb61ac2a340f38efa00683435c7802696cada39831a196dd3c4384b4bb55c7