Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2024 20:40
Static task
static1
Behavioral task
behavioral1
Sample
80d07fb695cf98f441859d78c9a69c88.jar
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
80d07fb695cf98f441859d78c9a69c88.jar
Resource
win10v2004-20231222-en
General
-
Target
80d07fb695cf98f441859d78c9a69c88.jar
-
Size
148KB
-
MD5
80d07fb695cf98f441859d78c9a69c88
-
SHA1
6504e408f13b2f70ee3d0d891cf0fa532329a032
-
SHA256
3f011a10f57445e62d0cf9c5add509215b39e09a742cae2d4707a07a48a71298
-
SHA512
a2df2067c998a194b5c518a8a15486b8f45c4a9b98291a82280de98eafa79527a28472fe419f1ae6eec5ec90076ea3d7e6b42de87c9ee1390c10398314c0a59b
-
SSDEEP
3072:k1fgGK11400Jn4GkPwAdarAH1sfjy0p02cdqBYJOr595/u/QMchyLsVeF873h9+G:rGK7400JpAdayOfjpTckBOY98/wcstRp
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dCXvAMFTAC.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dCXvAMFTAC.js WScript.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4728 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\dCXvAMFTAC.js\"" WScript.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb javaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings wscript.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3300 wrote to memory of 4728 3300 java.exe 89 PID 3300 wrote to memory of 4728 3300 java.exe 89 PID 3300 wrote to memory of 4080 3300 java.exe 90 PID 3300 wrote to memory of 4080 3300 java.exe 90 PID 4080 wrote to memory of 1992 4080 wscript.exe 91 PID 4080 wrote to memory of 1992 4080 wscript.exe 91 PID 4080 wrote to memory of 2012 4080 wscript.exe 92 PID 4080 wrote to memory of 2012 4080 wscript.exe 92
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\80d07fb695cf98f441859d78c9a69c88.jar1⤵
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:4728
-
-
C:\Windows\SYSTEM32\wscript.exewscript C:\Users\Admin\duexbrhexl.js2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\dCXvAMFTAC.js"3⤵
- Drops startup file
- Adds Run key to start application
PID:1992
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\nmeuptqb.txt"3⤵
- Drops file in Program Files directory
PID:2012
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD555a48e4f449edab0ba15bef85d27c6bf
SHA1263decd005c9ff3f87476611889805a73d20ba73
SHA25654698e3f5d7795a4e3a4edef5edecd746229789a8ebab3991b51a437e9b5f040
SHA512a53eff2c59c6438a089bb3e588215af3ec4aaaab218a1a266aff8a9bcf55d19dea571475fa1478477b57e3a2a32e8387614c6f3302fc9304e2c6a801a641b096
-
Filesize
10KB
MD5bc151eedb995b062c850ec907d92c2e0
SHA12500517c7912737a59f3946fabbb506c6f294682
SHA25659c024a2c7a05e9ec38e3658822a498de263e72535fa602bc16e05d77dc3cec0
SHA512a6dece2d1f59469a0f1a474ac310a98a511571600158179151a9b0bdb583081b99f46c72e9644250a7864879d7bb67cd9843154a2fa3b7654a5c44420eccee49
-
Filesize
107KB
MD5d1abdb24c44f1ec93c4800f3128cf01f
SHA1765a23589063a01d8c3e0b4e5615ac5d0ac475a6
SHA25615ddd12f95653df0799fc8420b8d5d73361d3fd9a97237da094f4440ba108580
SHA512659310fb4e2750cbb87ead008ffda551c6ce3296690c8747231b21ce8543961cecfbefb2c1cb9ba41f6fe87c60cd4f312549b1eab6039337514e2c18b529887f
-
Filesize
231KB
MD5553975254beafdaab9f69011980b9569
SHA1b549e749a1991bf12145a20c1f968c07a1645822
SHA256d5fd83a507b0f9384bc408819389cd9e23c89b55a0edb6857673fba8113e2159
SHA512ffebe27b3a746439698958852c8e1714813c54744fecad790877583347d54413b3adc60347dbb084a6ea52c9d3902333e688cc0b8e556eb8c545d08543f48112