Analysis

  • max time kernel
    109s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-12-2023 00:38

General

  • Target

    LEDAMA VPN NO ADDTIME/LEDAMA VPN SOCKS/gradlew.bat

  • Size

    2KB

  • MD5

    0ea6d812cf51675a8503fe23ae178996

  • SHA1

    8751d7831ca6cd1cad48e1475a79596b54b48994

  • SHA256

    f4f428c5626b3d90cef3bd4e7fd3ad3ea5760442db8c09d586b5bfe031dbe5e3

  • SHA512

    ea052888a8e361670cd7051c6313fc838f579a54288ed391361954f413df699c119236e7371149939045cd3aef48458d4991beed579e3cc1230e3bee1273de8f

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\LEDAMA VPN NO ADDTIME\LEDAMA VPN SOCKS\gradlew.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4528
    • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
      java.exe -version
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3728
      • C:\Windows\system32\icacls.exe
        C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
        3⤵
        • Modifies file permissions
        PID:4488
    • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
      "java.exe" "-Dorg.gradle.appname=gradlew" -classpath "C:\Users\Admin\AppData\Local\Temp\LEDAMA VPN NO ADDTIME\LEDAMA VPN SOCKS\\gradle\wrapper\gradle-wrapper.jar" org.gradle.wrapper.GradleWrapperMain
      2⤵
      • Drops file in Program Files directory
      PID:4816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    5778d857d048ce6ec3c27f7091415cdc

    SHA1

    8e1f5211e7081a473fe0f4e5aba321ce8085148d

    SHA256

    365ed67a2fcf1295ccb6e44a9382250ee15b30039eb920f08b9d91bced6afaf9

    SHA512

    f48aaf0ea6579a940fbe2a437469770a21224f2b665cc2e40b4240c136b7c8b8b53742b0522178e7b384c935ced9e16939a44e4a5452160bea975d42b7bd0aab

  • memory/3728-4-0x000001D3B0970000-0x000001D3B1970000-memory.dmp

    Filesize

    16.0MB

  • memory/3728-12-0x000001D3AF130000-0x000001D3AF131000-memory.dmp

    Filesize

    4KB

  • memory/4816-34-0x000002AEA4750000-0x000002AEA5750000-memory.dmp

    Filesize

    16.0MB

  • memory/4816-26-0x000002AEA4730000-0x000002AEA4731000-memory.dmp

    Filesize

    4KB

  • memory/4816-24-0x000002AEA4750000-0x000002AEA5750000-memory.dmp

    Filesize

    16.0MB

  • memory/4816-25-0x000002AEA4730000-0x000002AEA4731000-memory.dmp

    Filesize

    4KB

  • memory/4816-38-0x000002AEA49E0000-0x000002AEA49F0000-memory.dmp

    Filesize

    64KB

  • memory/4816-40-0x000002AEA49D0000-0x000002AEA49E0000-memory.dmp

    Filesize

    64KB

  • memory/4816-39-0x000002AEA49F0000-0x000002AEA4A00000-memory.dmp

    Filesize

    64KB

  • memory/4816-41-0x000002AEA4A00000-0x000002AEA4A10000-memory.dmp

    Filesize

    64KB

  • memory/4816-42-0x000002AEA4A10000-0x000002AEA4A20000-memory.dmp

    Filesize

    64KB

  • memory/4816-43-0x000002AEA4A20000-0x000002AEA4A30000-memory.dmp

    Filesize

    64KB

  • memory/4816-44-0x000002AEA4750000-0x000002AEA5750000-memory.dmp

    Filesize

    16.0MB