Analysis

  • max time kernel
    239s
  • max time network
    275s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 01:08

General

  • Target

    0f3dd1651102ede8e5701ecdf1d7dbacbcb559b9fec5115295539b18c17b6221.jar

  • Size

    184KB

  • MD5

    1e0b1b66ed579403b6953b326a6112be

  • SHA1

    2e3e96ebbb3d9bab1ecab68bf8220dafa9aa7c7b

  • SHA256

    0f3dd1651102ede8e5701ecdf1d7dbacbcb559b9fec5115295539b18c17b6221

  • SHA512

    8bb490ca1c7e7c74ba0aa55e86ae80522d3ac66bd135cee4875dcea39daee79a9bd9f57d7dcd9da9a5d5855612c5e6c3af8432470947c9089f2f3c8db014a1fa

  • SSDEEP

    3072:XITVQMNnfAxP0k6w8H+9DzTHJQ/2kBu6gMlyXT0bS/vRFCrf9C3gH51DAYTaFEvt:uBnIl0k6/EKekB7pbAZFCrfBHYYTIeVn

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\0f3dd1651102ede8e5701ecdf1d7dbacbcb559b9fec5115295539b18c17b6221.jar
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Windows\System32\Wbem\wmic.exe
      wmic CPU get ProcessorId
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2344
    • C:\Windows\System32\Wbem\wmic.exe
      wmic bios get serialnumber
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1676
    • C:\Windows\System32\Wbem\wmic.exe
      wmic csproduct get name
      2⤵
        PID:1804
      • C:\Windows\System32\Wbem\wmic.exe
        wmic csproduct get UUID
        2⤵
          PID:2276

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1696-4-0x00000000020F0000-0x00000000050F0000-memory.dmp

              Filesize

              48.0MB

            • memory/1696-10-0x0000000000130000-0x0000000000131000-memory.dmp

              Filesize

              4KB

            • memory/1696-12-0x00000000020F0000-0x00000000050F0000-memory.dmp

              Filesize

              48.0MB

            • memory/1696-19-0x0000000000130000-0x0000000000131000-memory.dmp

              Filesize

              4KB

            • memory/1696-39-0x0000000000130000-0x0000000000131000-memory.dmp

              Filesize

              4KB

            • memory/1696-48-0x0000000000130000-0x0000000000131000-memory.dmp

              Filesize

              4KB

            • memory/1696-49-0x0000000000130000-0x0000000000131000-memory.dmp

              Filesize

              4KB