Analysis

  • max time kernel
    30s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 01:30

General

  • Target

    EsdeathInstaller.exe

  • Size

    576KB

  • MD5

    af762058f41e3c89fe0f035559ddb9af

  • SHA1

    eb26f514e8adbd1354f7ecf567b49730033a4135

  • SHA256

    857da60a511069ef042d3c0e3a3ebe99823311ef164ec62972ca1396818284e3

  • SHA512

    070dcdf7d67f6ee9a71d47b72c7fa85e9161c6505c877336f5a2797b1a84ca0805d87857013b8e103b8c7b6406d6765c5d664053d0f4faf4788cb712087f5fa7

  • SSDEEP

    12288:GdrswPR83Ckao6J33TRYRLG4g1KGzV0s11v:GdIwZ83BCJHTORLGT1KgVlZ

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\EsdeathInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\EsdeathInstaller.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Program Files\Java\jre-1.8\bin\javaw.exe
      "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\EsdeathInstaller.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4232
      • C:\Windows\system32\icacls.exe
        C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
        3⤵
        • Modifies file permissions
        PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    8a6e180bc885055745f71085e8cf268a

    SHA1

    e330522de9ae39fe05927ade8139d028221319b8

    SHA256

    0351aa47c5a6ea34cdeb67173734104b08cc5e651ef47b83f18a3843b57d3682

    SHA512

    c050d427e7beb630ae4ff6008ef8cd187b3608cc0e2e42e5befe2f357c9df6afe37c4adceaece0d891c73065e703ecffb244e238cdb66682d0f4c871be61dad9

  • memory/2208-10-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/4232-29-0x000001458C940000-0x000001458D940000-memory.dmp

    Filesize

    16.0MB

  • memory/4232-13-0x000001458B300000-0x000001458B301000-memory.dmp

    Filesize

    4KB

  • memory/4232-18-0x000001458C940000-0x000001458D940000-memory.dmp

    Filesize

    16.0MB

  • memory/4232-21-0x000001458B300000-0x000001458B301000-memory.dmp

    Filesize

    4KB

  • memory/4232-26-0x000001458B300000-0x000001458B301000-memory.dmp

    Filesize

    4KB

  • memory/4232-27-0x000001458B300000-0x000001458B301000-memory.dmp

    Filesize

    4KB

  • memory/4232-4-0x000001458C940000-0x000001458D940000-memory.dmp

    Filesize

    16.0MB

  • memory/4232-47-0x000001458B300000-0x000001458B301000-memory.dmp

    Filesize

    4KB

  • memory/4232-48-0x000001458C940000-0x000001458D940000-memory.dmp

    Filesize

    16.0MB

  • memory/4232-52-0x000001458C940000-0x000001458D940000-memory.dmp

    Filesize

    16.0MB

  • memory/4232-57-0x000001458C940000-0x000001458D940000-memory.dmp

    Filesize

    16.0MB

  • memory/4232-61-0x000001458B300000-0x000001458B301000-memory.dmp

    Filesize

    4KB

  • memory/4232-63-0x000001458B300000-0x000001458B301000-memory.dmp

    Filesize

    4KB

  • memory/4232-86-0x000001458B300000-0x000001458B301000-memory.dmp

    Filesize

    4KB