Analysis

  • max time kernel
    195s
  • max time network
    226s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2023, 01:08

General

  • Target

    0f3dd1651102ede8e5701ecdf1d7dbacbcb559b9fec5115295539b18c17b6221.jar

  • Size

    184KB

  • MD5

    1e0b1b66ed579403b6953b326a6112be

  • SHA1

    2e3e96ebbb3d9bab1ecab68bf8220dafa9aa7c7b

  • SHA256

    0f3dd1651102ede8e5701ecdf1d7dbacbcb559b9fec5115295539b18c17b6221

  • SHA512

    8bb490ca1c7e7c74ba0aa55e86ae80522d3ac66bd135cee4875dcea39daee79a9bd9f57d7dcd9da9a5d5855612c5e6c3af8432470947c9089f2f3c8db014a1fa

  • SSDEEP

    3072:XITVQMNnfAxP0k6w8H+9DzTHJQ/2kBu6gMlyXT0bS/vRFCrf9C3gH51DAYTaFEvt:uBnIl0k6/EKekB7pbAZFCrfBHYYTIeVn

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\0f3dd1651102ede8e5701ecdf1d7dbacbcb559b9fec5115295539b18c17b6221.jar
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4280
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:2780
    • C:\Windows\System32\Wbem\wmic.exe
      wmic CPU get ProcessorId
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:780
    • C:\Windows\System32\Wbem\wmic.exe
      wmic bios get serialnumber
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4092
    • C:\Windows\System32\Wbem\wmic.exe
      wmic csproduct get name
      2⤵
        PID:3092
      • C:\Windows\System32\Wbem\wmic.exe
        wmic csproduct get UUID
        2⤵
          PID:872

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

        Filesize

        46B

        MD5

        2d06ea1c5c6e02b6b316fdae8cd7bd4c

        SHA1

        08fbb9fc85e234f9d51004317bbea0128e588361

        SHA256

        c96f0a6016aaeb33d4d91f7363bbcbc176eda454ccf5a27c83169f3d2e4d692a

        SHA512

        cab237281009df7c04f744305d139938529e35e2b6e4af9aa72ca9b3acc81f81e2aa4c978365b8bb8136875b688aca55994ad0b3d93baf4af6829c8d4ed7ad6e

      • memory/4280-4-0x00000200C8A00000-0x00000200C9A00000-memory.dmp

        Filesize

        16.0MB

      • memory/4280-12-0x00000200C89E0000-0x00000200C89E1000-memory.dmp

        Filesize

        4KB

      • memory/4280-16-0x00000200C89E0000-0x00000200C89E1000-memory.dmp

        Filesize

        4KB

      • memory/4280-18-0x00000200C8A00000-0x00000200C9A00000-memory.dmp

        Filesize

        16.0MB

      • memory/4280-24-0x00000200C89E0000-0x00000200C89E1000-memory.dmp

        Filesize

        4KB