Analysis
-
max time kernel
134s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 23:26
Static task
static1
Behavioral task
behavioral1
Sample
1ff5d4043006f53ec59238df7a8b162c.jar
Resource
win7-20231129-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
1ff5d4043006f53ec59238df7a8b162c.jar
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
1ff5d4043006f53ec59238df7a8b162c.jar
-
Size
2KB
-
MD5
1ff5d4043006f53ec59238df7a8b162c
-
SHA1
ca30ac91c614668f3d20273b1260ba96f7b3c909
-
SHA256
597acb2001b122d317e1865030557cd3c61dbc9c5ae853b2c4515e399bb79816
-
SHA512
5e6493638fe2e2bc6f93c28b8163cfdf4b9e1265f99d98ff0a68743cd48e311430fa577ba563a915524d021f0e2488a7f0871edcdf2de72403d20f41a0b083c2
Score
7/10
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 5020 icacls.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4228 wrote to memory of 5020 4228 java.exe 92 PID 4228 wrote to memory of 5020 4228 java.exe 92
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\1ff5d4043006f53ec59238df7a8b162c.jar1⤵
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:5020
-