Analysis

  • max time kernel
    13s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2023 14:19

General

  • Target

    3992d78012f9f2f7e1a59575e1859fe9.jar

  • Size

    148KB

  • MD5

    3992d78012f9f2f7e1a59575e1859fe9

  • SHA1

    4380cdf95a24a398e264455b9c16e7ce7c04fc81

  • SHA256

    6f8ab3133af51d2e71bba1b2176997cbbe99a2266c217afe84d9852519a3450b

  • SHA512

    fffd16c8e1d7888bb71ce28ab9e97bd06e9006df6d264943302566f7be0064cd51f815a64cec6cd7f053f951595c232b92061900c3e1a62d5dd6e693c49cc9d7

  • SSDEEP

    3072:RIh/CwlVPQ6ZaJccKsueXjm49RUw2pfAYFODWDYw4YUHWZ3:mVChTJ4svXq49Rmh4yV4zHC

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies file permissions 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\3992d78012f9f2f7e1a59575e1859fe9.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1000
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:1660
    • C:\Windows\SYSTEM32\wscript.exe
      wscript C:\Users\Admin\qzpjtgbgwi.js
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2392
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\URivKZByzt.js"
        3⤵
          PID:4924
        • C:\Program Files\Java\jre-1.8\bin\javaw.exe
          "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\uxojbabsve.txt"
          3⤵
            PID:3764

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

        Filesize

        46B

        MD5

        642145db3766f1730c55c972c74dbaab

        SHA1

        3ee5e15d0db96fa4c1885ac62f9d6e0ce2cf2635

        SHA256

        cea1900d963dabe66debd935cffe439d7d005f1b25918b8099736c33354eedaf

        SHA512

        d1fec3ad0933c25383ecaee5258fa2780869a0242c704c5faad941773739f4d73e010f8e6234c2b91a9b1eecb7f6466dfd8001b699b3e4117cad61d4f398fe37

      • C:\Users\Admin\AppData\Roaming\URivKZByzt.js

        Filesize

        10KB

        MD5

        4fccb6c905ca75de32d215f44e5adf08

        SHA1

        a72402da433c6a2f4de9b9dfa2e9cd6b38ff754c

        SHA256

        d396e916d9ca8d1505a157a4eca9626f9a15be706f64b65e2e8c5859c7776eb5

        SHA512

        c05de1d95ee26a3f90424aa9acc89940d305c96aebc31815ace24096349b344920701848d8eea63b14471c391cbf6913d586eae0734f7bee25797fe42b5854ed

      • C:\Users\Admin\AppData\Roaming\uxojbabsve.txt

        Filesize

        107KB

        MD5

        d1abdb24c44f1ec93c4800f3128cf01f

        SHA1

        765a23589063a01d8c3e0b4e5615ac5d0ac475a6

        SHA256

        15ddd12f95653df0799fc8420b8d5d73361d3fd9a97237da094f4440ba108580

        SHA512

        659310fb4e2750cbb87ead008ffda551c6ce3296690c8747231b21ce8543961cecfbefb2c1cb9ba41f6fe87c60cd4f312549b1eab6039337514e2c18b529887f

      • C:\Users\Admin\qzpjtgbgwi.js

        Filesize

        231KB

        MD5

        29e6358dcc6c6518ff978ed2e06a097f

        SHA1

        963d7a5020461bf138b723518c4b606599ad18b4

        SHA256

        1e4b0b6254e8f64254e54a9b587c58b1b315d3778f2f359c1e2fa8a5eedf2832

        SHA512

        25310412f2e6b727cc990a17a6c6435a5c2380245beeae7fdfe45748bb7858d48910da032bf277322b7639bfb49c247f066aa3030758b344eb4403f88a9e4c62

      • memory/1000-4-0x0000021F94B50000-0x0000021F95B50000-memory.dmp

        Filesize

        16.0MB

      • memory/1000-14-0x0000021F93380000-0x0000021F93381000-memory.dmp

        Filesize

        4KB

      • memory/3764-52-0x0000019B77BB0000-0x0000019B77BB1000-memory.dmp

        Filesize

        4KB

      • memory/3764-72-0x0000019B00000000-0x0000019B01000000-memory.dmp

        Filesize

        16.0MB

      • memory/3764-39-0x0000019B00000000-0x0000019B01000000-memory.dmp

        Filesize

        16.0MB

      • memory/3764-47-0x0000019B00000000-0x0000019B01000000-memory.dmp

        Filesize

        16.0MB

      • memory/3764-27-0x0000019B00000000-0x0000019B01000000-memory.dmp

        Filesize

        16.0MB

      • memory/3764-61-0x0000019B00000000-0x0000019B01000000-memory.dmp

        Filesize

        16.0MB

      • memory/3764-68-0x0000019B00000000-0x0000019B01000000-memory.dmp

        Filesize

        16.0MB

      • memory/3764-37-0x0000019B77BB0000-0x0000019B77BB1000-memory.dmp

        Filesize

        4KB

      • memory/3764-77-0x0000019B77BB0000-0x0000019B77BB1000-memory.dmp

        Filesize

        4KB

      • memory/3764-76-0x0000019B77BB0000-0x0000019B77BB1000-memory.dmp

        Filesize

        4KB

      • memory/3764-81-0x0000019B77BB0000-0x0000019B77BB1000-memory.dmp

        Filesize

        4KB

      • memory/3764-114-0x0000019B77BB0000-0x0000019B77BB1000-memory.dmp

        Filesize

        4KB

      • memory/3764-131-0x0000019B00000000-0x0000019B01000000-memory.dmp

        Filesize

        16.0MB

      • memory/3764-135-0x0000019B00000000-0x0000019B01000000-memory.dmp

        Filesize

        16.0MB

      • memory/3764-141-0x0000019B00000000-0x0000019B01000000-memory.dmp

        Filesize

        16.0MB

      • memory/3764-146-0x0000019B00000000-0x0000019B01000000-memory.dmp

        Filesize

        16.0MB