Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
lambda-3.4.0.jar
Resource
win7-20231129-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
lambda-3.4.0.jar
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
lambda-3.4.0.jar
-
Size
8.3MB
-
MD5
8663b948d4e94d7c7671fa6016d72019
-
SHA1
065d8b5857740a425b6783617d8fcdddfbf186a5
-
SHA256
34c298eb884f0b8136123a3e9648031231491c5d5296c3f22d0f145168702670
-
SHA512
01d75d580b8821ddcee82ace2dcb19bbe20be9d985b8317cfd1979028c3b4ab272b4308819a34d24c088ab8d5ba97c2af49ac081a2269957fc6404a429f1a115
-
SSDEEP
196608:IIwXemA8vkUdK5VF7bDpfkiNryS/tciA3zUQeuMQL0dbOhI:plp7bDpfkweWzozB/udbYI
Score
7/10
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3848 icacls.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1316 wrote to memory of 3848 1316 java.exe 92 PID 1316 wrote to memory of 3848 1316 java.exe 92
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\lambda-3.4.0.jar1⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:3848
-