Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2023 16:27
Static task
static1
Behavioral task
behavioral1
Sample
29b06867ace03648d98dd451e8a2c640.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
29b06867ace03648d98dd451e8a2c640.exe
Resource
win10v2004-20231127-en
General
-
Target
29b06867ace03648d98dd451e8a2c640.exe
-
Size
8.1MB
-
MD5
29b06867ace03648d98dd451e8a2c640
-
SHA1
197c7bf533d7ba48669debb64605a55be04212a4
-
SHA256
f84667c031fff8048abdef17457270ccc3e31b1d8fa4b10f44a5d1c6791339d3
-
SHA512
eb958922d27fbec33f3c77f03fc2cc008d9a8ee8f08a97834e0227aaec3a98134863a8f06601bf47b2b69a77b99cc9ba355998c7c4a2f2481fb26246058c4ed0
-
SSDEEP
196608:P9txAVsVB/Yv2Xsi4FXJXytpo/dRHzo+jLGxUMxpW0unD7dvMh:ltxAUwv28JXeoljMU10uDJvs
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1868 icacls.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1304 1744 29b06867ace03648d98dd451e8a2c640.exe 87 PID 1744 wrote to memory of 1304 1744 29b06867ace03648d98dd451e8a2c640.exe 87 PID 1304 wrote to memory of 1868 1304 javaw.exe 90 PID 1304 wrote to memory of 1868 1304 javaw.exe 90 PID 1304 wrote to memory of 1760 1304 javaw.exe 92 PID 1304 wrote to memory of 1760 1304 javaw.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\29b06867ace03648d98dd451e8a2c640.exe"C:\Users\Admin\AppData\Local\Temp\29b06867ace03648d98dd451e8a2c640.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\29b06867ace03648d98dd451e8a2c640.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:1868
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -Djdk.attach.allowAttachSelf -XX:+DisableAttachMechanism -Dlauncher.stacktrace=false -Dlauncher.dev=false -Dlauncher.debug=false -Xmx256M -cp C:\Users\Admin\AppData\Local\Temp\29b06867ace03648d98dd451e8a2c640.exe pro.gravit.launcher.koGtETOcHKAurJ3⤵PID:1760
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5c3cc279ac2e01494e5d730d005c7bab3
SHA1ec557d1beb31bd433322905c659988184813a2c9
SHA2568d3ba1d38290eb9a5906dc0174fc73b5b38a2123016198bd0a35dd1b5f33abc3
SHA51213fac0f319b41e70348a80eb35eae4fe40a957d149c26b602821a8aa8f367589c5e8f2365cb94209e3e40efdf12717ab2da2e4ffda61f62d31b537d0ee9488db