Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2024 23:25
Static task
static1
Behavioral task
behavioral1
Sample
4cba408df86e977b569cbbbb620f6541.jar
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4cba408df86e977b569cbbbb620f6541.jar
Resource
win10v2004-20231215-en
General
-
Target
4cba408df86e977b569cbbbb620f6541.jar
-
Size
129KB
-
MD5
4cba408df86e977b569cbbbb620f6541
-
SHA1
062a68ec018d9ee80666386cf505dd65bd316f24
-
SHA256
f8feadc1125cf67e04a78dddf70c6eef258178b9c38d23ab9be976c9f2c71c72
-
SHA512
4478e08c27d1dcda2d7a4da70bc94d5a329815e9bb820e9319d348b46fdd04abb0ae95304d699af58c0ef48c99506214addedfe59362a2774ef68f9b26c89e40
-
SSDEEP
3072:2d+2eE4r5mV/KoUzvUWyWa2U73yERqTjdDzFXEpcTxiA:2UBmYo2MzB2U7ippzFUpcTQA
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eohMqhWkvF.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eohMqhWkvF.js WScript.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2756 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\eohMqhWkvF.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings wscript.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 232 wrote to memory of 2756 232 java.exe 90 PID 232 wrote to memory of 2756 232 java.exe 90 PID 232 wrote to memory of 4392 232 java.exe 92 PID 232 wrote to memory of 4392 232 java.exe 92 PID 4392 wrote to memory of 4744 4392 wscript.exe 93 PID 4392 wrote to memory of 4744 4392 wscript.exe 93 PID 4392 wrote to memory of 1340 4392 wscript.exe 94 PID 4392 wrote to memory of 1340 4392 wscript.exe 94
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\4cba408df86e977b569cbbbb620f6541.jar1⤵
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:2756
-
-
C:\Windows\SYSTEM32\wscript.exewscript C:\Users\Admin\lrpgqbmepw.js2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\eohMqhWkvF.js"3⤵
- Drops startup file
- Adds Run key to start application
PID:4744
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\cumdistciq.txt"3⤵PID:1340
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5013bcd19843480a24680194958bab7b6
SHA1f27035d6458204f2d0457b687108dead7eb459cf
SHA25648413fa47fbb522e0277ab215ff716f07459f7501ee712e94f8e459a9668d53c
SHA5125615acc6df969362ec71223558449b145906bf6a71eadb15efee4d590c09abf60b7eb207a4729f1779c985aec0e4dfcdca945c6b8255fed1c065b9be4ec4d1b5
-
Filesize
64KB
MD5ed96bce0e060037c90915867199c5809
SHA13a015650988b040d5be8bd92c40e4453c0eae9dc
SHA256568fb6d57ca86a7cf7b2a46da8deb9ac210c2b74f04ead19faf3b08ad8807434
SHA512a028244dfebb5f9f42066a515e412ec0f1ff463ecaeeeee3e665ce09502d1edbeb09369bea04faef932241fc69cbf5dd5cfe840d0c43ee72b63e2dbc7398034b
-
Filesize
10KB
MD5bd854a8caf7e7c7755481169afebeb9d
SHA146d81477627836bdda15137a8837d10eb84bbbfc
SHA256c346c5553d730a5f500588c0cb604454019e0a9a8c234b09e3050de08c5c4de9
SHA5125d311fdf3958f117d5b06cb4e975a7bd373a1b9e8379e2df133472bcd30dca710afd382b848bffaf3899cfa1e887f0fe74f019878a24c326a081d15afa73e3e5
-
Filesize
207KB
MD55e62b21da65c21843765eec3519d08fa
SHA1be3a7074f1f9bf1065859c200f41389d289c7de5
SHA256741c1ef88d98a8945e91a8d899c93e31d0639ee727d541f0658e8f80136faf39
SHA51283d6c6d0f667bd0c9ff7b558f4982a6f18dc33b19ddd4fa48c703bc8ff3948018420c6dab586553588e8a9db8f19bf392486b65c994fa472cf4c209983fff11e