Analysis
-
max time kernel
449s -
max time network
1169s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-es -
resource tags
arch:x64arch:x86image:win10v2004-20231222-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
02/02/2024, 18:02
Static task
static1
Behavioral task
behavioral1
Sample
client-1.20.3-1.20.1.jar
Resource
win7-20231215-es
Behavioral task
behavioral2
Sample
client-1.20.3-1.20.1.jar
Resource
win10v2004-20231222-es
General
-
Target
client-1.20.3-1.20.1.jar
-
Size
11.1MB
-
MD5
68bf006edfec1d3487e6744dd914d8f1
-
SHA1
e22aea60914da437b3de1d703a82d90be1043584
-
SHA256
ef624f858d383021283272addecd08514aa3f544dd219a525ff34106926b748f
-
SHA512
907eaed58bf79cbc24dd754c97da6813f68ee631b02f1b5952094932427cd9113d3330988af501f4e0d58ea0010d4633b4e0942af4eaaf4f724244e65e0d5e37
-
SSDEEP
196608:wGOdgXtIx3JNRhSbFbQw0MBdbVteJPldk/2xRHb9zyp+29Tu1g42qBSaOt/H:qdgXa0bJQxulYW2xRHb9zypvGQ
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2556 icacls.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2556 2148 java.exe 87 PID 2148 wrote to memory of 2556 2148 java.exe 87
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\client-1.20.3-1.20.1.jar1⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD54393c5daff02cb5fb3b7d4f7f295ae33
SHA1a1672edd9df58c430563371275c6d27662d30de7
SHA2561aa1d5cba4a3bfdbce9f40e317b5a8bc69dcbf2e5d8a565a9064aff19a6cd9cb
SHA512dba3e6f762729e2144d2a71c52a5cbdc6496bb8698c255b91ced056ae2cf43c0801aafc16e4d74bdb59004d1e69c8c6159190d4715f48c2a61fede2f756995b5