Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 02:14
Static task
static1
Behavioral task
behavioral1
Sample
24228bcfaf2e821c314a0b7bb40e5581.jar
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
24228bcfaf2e821c314a0b7bb40e5581.jar
Resource
win10v2004-20231215-en
General
-
Target
24228bcfaf2e821c314a0b7bb40e5581.jar
-
Size
124KB
-
MD5
24228bcfaf2e821c314a0b7bb40e5581
-
SHA1
0d3de7fcebbb431673f1bacb4ab785915cea6e04
-
SHA256
8f321e7441a406a616e4b163eab96ee15310e16c5af51c2b24213ccbeb1cca4d
-
SHA512
e7aee1d86500182fa82beba03b10b015e571819c3e585891fb896bcdaec600352d6852fa853b679781cd0d235bb05c215bcf2c6d3059fc3533f0e6b921917dd7
-
SSDEEP
3072:R64WZZTCCQj1crqrApp2V/KCpDPCQokQVsq:gZTCCccrwAGV/KCpDN/QVsq
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jTtxtIjlOc.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jTtxtIjlOc.js WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\jTtxtIjlOc.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2196 2268 java.exe 29 PID 2268 wrote to memory of 2196 2268 java.exe 29 PID 2268 wrote to memory of 2196 2268 java.exe 29 PID 2196 wrote to memory of 2772 2196 wscript.exe 30 PID 2196 wrote to memory of 2772 2196 wscript.exe 30 PID 2196 wrote to memory of 2772 2196 wscript.exe 30 PID 2196 wrote to memory of 2600 2196 wscript.exe 31 PID 2196 wrote to memory of 2600 2196 wscript.exe 31 PID 2196 wrote to memory of 2600 2196 wscript.exe 31
Processes
-
C:\Windows\system32\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\24228bcfaf2e821c314a0b7bb40e5581.jar1⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\system32\wscript.exewscript C:\Users\Admin\lwzsdrchkf.js2⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\jTtxtIjlOc.js"3⤵
- Drops startup file
- Adds Run key to start application
PID:2772
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\htlddwaoha.txt"3⤵PID:2600
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5468ec549c270898563a0d61e42a3bd17
SHA16bbd046226d2a87abd4e24d9831e029d97f5e0c7
SHA256ba97fd311dcae06ced279a1a5503252c7c0986a28e4168f0f96b4afcbcb7f79b
SHA512e9071cd00f5c12810e08655f9dedd740fa3052132467a1596056d986a505d980fde4a0bac0d9ff573b630fd0c5b4aeec05b878bd3d05c549e9745fe26dbc8039
-
Filesize
10KB
MD5aaf4029030e66fc5a1f728d1e45f506e
SHA1f8b00acf66797dac7e25faadbc7444faf15a225d
SHA2564de890877e6eea47f9667cc64c94493f81b63499fe9e5858a526da4617ded348
SHA512e708ee9596a830d180edd381c15a78efee06306ec23d6b2386fc666d1923ed3e61b6df9666ba0b70778048566dada9bd7bd9c551a4ffc555c46d7855a0e673c4
-
Filesize
199KB
MD54b263027057b16a083bb8e409b8dbced
SHA1f4c761417c146343db7d305f60a3b370669fe8e5
SHA256f251156124b27bd9de66f6cf4d17b234cae540a4737dfe95fb71602dfd738174
SHA51238b3be25c0dc3a9aafa995a565bc9588741e3178ebe64bb95a07e2e3000f9900ebde4f5a5543a2d8688e29907fb392705a12fd6f6dc264b94fdaa3f4a128ba5f