Analysis

  • max time kernel
    138s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/11/2023, 13:49

General

  • Target

    0db76162862a61844e1199c18a9df5545b953b4a69be19474e159c279b14165d.exe

  • Size

    317KB

  • MD5

    93be2c627c7779fa84d32657565437fa

  • SHA1

    9b649dac5778675db00edd2b764b9b275e7f0e24

  • SHA256

    0db76162862a61844e1199c18a9df5545b953b4a69be19474e159c279b14165d

  • SHA512

    f07fb2a3d908652cf239707cc885fc7c76093c96a4245c4587be3f0d7b08e9787494543cd7752b8eaef411428a651ef882bb47fc3d252cc191cac50898c2497a

  • SSDEEP

    6144:Pd+cR8SwOxSl2Yd82pqrnSzeIgNV1Nw2zflWgQulnhf0J1IVBRa1GCW:Pd+MpCVzqTMeIO31zCq8Ixa1nW

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0db76162862a61844e1199c18a9df5545b953b4a69be19474e159c279b14165d.exe
    "C:\Users\Admin\AppData\Local\Temp\0db76162862a61844e1199c18a9df5545b953b4a69be19474e159c279b14165d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3776
    • \??\c:\PROGRA~1\java\jre-1.8\bin\java.exe
      c:\PROGRA~1\java\jre-1.8\bin\java.exe -version
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:408
      • C:\Windows\system32\icacls.exe
        C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
        3⤵
        • Modifies file permissions
        PID:3128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    aa17c15e6629d02b2b333a0e9408a63d

    SHA1

    61b4d8ac08d0d01ab313828c60f4c9b037c36ea4

    SHA256

    99594966ffa2ae2622c8ebf4b97585ef5fd6d2d2ee8e277cf87e776a4e9a71ce

    SHA512

    a992d9ca2fe9a0ec5014f92b82b267a6cf8bd30d92dca0340569d37a6c3bba1a3334e21f896677d215fa08636563868749be351515fcae521e66b2d1d01be7fb

  • memory/408-2-0x00000164954E0000-0x00000164964E0000-memory.dmp

    Filesize

    16.0MB

  • memory/408-12-0x0000016493AB0000-0x0000016493AB1000-memory.dmp

    Filesize

    4KB

  • memory/3776-24-0x0000000002860000-0x0000000003860000-memory.dmp

    Filesize

    16.0MB

  • memory/3776-28-0x0000000002860000-0x0000000003860000-memory.dmp

    Filesize

    16.0MB