Overview
overview
7Static
static
4GameExtractor.bat
windows7-x64
1GameExtractor.bat
windows10-2004-x64
7GameExtractor.exe
windows7-x64
1GameExtractor.exe
windows10-2004-x64
7GameExtractor.jar
windows7-x64
1GameExtractor.jar
windows10-2004-x64
7apache-com...ss.jar
windows7-x64
1apache-com...ss.jar
windows10-2004-x64
7jiu.jar
windows7-x64
1jiu.jar
windows10-2004-x64
7jlayer.jar
windows7-x64
1jlayer.jar
windows10-2004-x64
7jna.jar
windows7-x64
7jna.jar
windows10-2004-x64
7Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2024 00:13
Behavioral task
behavioral1
Sample
GameExtractor.bat
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
GameExtractor.bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
GameExtractor.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
GameExtractor.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
GameExtractor.jar
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
GameExtractor.jar
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
apache-commons-compress.jar
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
apache-commons-compress.jar
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
jiu.jar
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
jiu.jar
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
jlayer.jar
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
jlayer.jar
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
jna.jar
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
jna.jar
Resource
win10v2004-20231222-en
General
-
Target
GameExtractor.bat
-
Size
122B
-
MD5
17cee035c0b13f24afeea212d6ffe9bf
-
SHA1
672ded3b549f4238a223e34a90da46707b7ca53a
-
SHA256
e4a574b0766eaa32519d5f54f5d2b6500efd7217dd88e3dc388db3d91c959de3
-
SHA512
082a7b17bf47a04b2e3ece09746d13aa737d2a0af5962aac94d4f48ae18e37a57da774efecaea5935b4f5ad87dc31407eae881999195336334722b01550d04ca
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3292 icacls.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb java.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ java.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ java.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 324 java.exe 324 java.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4544 wrote to memory of 324 4544 cmd.exe 93 PID 4544 wrote to memory of 324 4544 cmd.exe 93 PID 324 wrote to memory of 3292 324 java.exe 94 PID 324 wrote to memory of 3292 324 java.exe 94
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\GameExtractor.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -Xmx1024m -jar GameExtractor.jar2⤵
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:3292
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD58711fadb48749c1d3a920400fd8e65ff
SHA11c48b0d70d38e58d719da3e96011620e2eb47def
SHA2566737e46d8ccb3a3965ae6891cf8a14d2ad49e7315b60c683518fd94172b74bb3
SHA5128cc1d7e83f6cf95d55194569c27fc0e9664d4454d77c73d49e75e97c71654183722bc0decff1dda80c32d6a0d085c6df4c249738f85b7089d483aa30282f6584