Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2024 15:53

General

  • Target

    Badlion Client 4.0.1/Badlion Client.app/Contents/libs/joml-jdk8-1.9.25.jar

  • Size

    710KB

  • MD5

    9b868b921d0490b417bd594984b680b1

  • SHA1

    7bb2cd964c5e7b129a52e1f47edfdd557a7ec3da

  • SHA256

    fc76d61e7900e65cab1f3c237a5186ff2344dd7d7d0bbf8f01a453c4fa2a1b28

  • SHA512

    c54cdcfe63c1998fd14d46988fc49509ac6af2e2516eaad0dae19566baf1c99f0482d026d7f6e79a66706905b76af9b4298a23521ecb32f5a3708806340b3959

  • SSDEEP

    12288:KmomVdb1+8moOzQTzSBNJuv+yUXUniNPW/I8Y8hq3n2RrjJydtlMm:LfdW6ST8+yUXUni9W/I8VCihG9

Malware Config

Signatures

  • Kinsing

    Kinsing is a loader written in Golang.

  • Modifies file permissions 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar "C:\Users\Admin\AppData\Local\Temp\Badlion Client 4.0.1\Badlion Client.app\Contents\libs\joml-jdk8-1.9.25.jar"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4332
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp
    Filesize

    46B

    MD5

    19052582e6c924d290c80927185ee2af

    SHA1

    ccfa36b2dce166bee34a236ecbd2937affa912bc

    SHA256

    8ce9d402e79ccdd30102a0dfd2ce4ed2e089b41e80c8b96227611eba0c9b7665

    SHA512

    eb7a37575143889aea60b33e6e0c43d4669b4abfe46a1c19175b3c76358589cd3f67e77ddc0782107c5c46b17a3a2bade2df06760ebfe6b43cf33ad46d5ced22

  • memory/4332-4-0x00000172C0860000-0x00000172C1860000-memory.dmp
    Filesize

    16.0MB

  • memory/4332-12-0x00000172BEF80000-0x00000172BEF81000-memory.dmp
    Filesize

    4KB