Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2024 15:03
Static task
static1
Behavioral task
behavioral1
Sample
8ca1ecf268ce85ceb8855ac8e2c55414.jar
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8ca1ecf268ce85ceb8855ac8e2c55414.jar
Resource
win10v2004-20231222-en
General
-
Target
8ca1ecf268ce85ceb8855ac8e2c55414.jar
-
Size
123KB
-
MD5
8ca1ecf268ce85ceb8855ac8e2c55414
-
SHA1
40cb27e69cff3e53a252a9d539fa60314ac4e3a7
-
SHA256
9d4b71f7a7886232ed1977d2c92870637ffc08dba838b20245ad60aeb7d2b102
-
SHA512
9ddaebdade5d99b2a12e0753a7dd7f4a81857b8654461bfe2119cade2665f5db33a769788a3d72f2582a20ba7fe736033882cc279c16759a14c025b920130605
-
SSDEEP
3072:ZLLB9Vo35PRErXjMOKCaOgyeAz1+i1GMcU6A7Auka/:ZvLVo3TYMtZA+HA6Ja/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cTmNhYTLpQ.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cTmNhYTLpQ.js WScript.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 316 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\cTmNhYTLpQ.js\"" WScript.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb javaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\Local Settings wscript.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2360 wrote to memory of 316 2360 java.exe 85 PID 2360 wrote to memory of 316 2360 java.exe 85 PID 2360 wrote to memory of 1844 2360 java.exe 87 PID 2360 wrote to memory of 1844 2360 java.exe 87 PID 1844 wrote to memory of 1452 1844 wscript.exe 88 PID 1844 wrote to memory of 1452 1844 wscript.exe 88 PID 1844 wrote to memory of 2576 1844 wscript.exe 90 PID 1844 wrote to memory of 2576 1844 wscript.exe 90
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\8ca1ecf268ce85ceb8855ac8e2c55414.jar1⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:316
-
-
C:\Windows\SYSTEM32\wscript.exewscript C:\Users\Admin\_output.js2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\cTmNhYTLpQ.js"3⤵
- Drops startup file
- Adds Run key to start application
PID:1452
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\niyhvuaacc.txt"3⤵
- Drops file in Program Files directory
PID:2576
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD528b06263aec0f70d1aae1449e8ca5cbd
SHA1fde96b7e14bed5ca334f2289a9521181310d9d6e
SHA256c9ce53f698fc987c7d058e689be03814064a6c8343acb93fb535459f62ebca55
SHA5129c8877b79ce7e8bc6f50606952be8e2d461e1856fa4a1d5eccf9595a8c106129474a7f410f86ac05fe66a79e7db2a27fc39caa11125bdc4ebf3febbb89aaeb62
-
Filesize
9KB
MD5685b1b2952c8efe8584d692840416ebb
SHA1d52696d12e7aa7b5c3757bfc0d524e11a527edba
SHA256a0468409b7c7800ce0b1df997097525357bb2b93686afba5e5f82dd03667c00c
SHA5127b173df0ef8b2045f65980e2ea657a544551b4809eb6d82b5eed829e5858fab4966e500912f193d2a6382974f2d1c775a93454f562a6a826d6a191dec7f39868
-
Filesize
88KB
MD5468ec549c270898563a0d61e42a3bd17
SHA16bbd046226d2a87abd4e24d9831e029d97f5e0c7
SHA256ba97fd311dcae06ced279a1a5503252c7c0986a28e4168f0f96b4afcbcb7f79b
SHA512e9071cd00f5c12810e08655f9dedd740fa3052132467a1596056d986a505d980fde4a0bac0d9ff573b630fd0c5b4aeec05b878bd3d05c549e9745fe26dbc8039
-
Filesize
195KB
MD59e872de7115891e5eea6c64be9164ad9
SHA1c279eb494fbf5cd0a398fb02c4b10e8728b4198b
SHA256019a6c3f10ef4440d4c08462eaca4acca8f58e16bc375c0483336368bc919457
SHA512b9d651f7f4bc7edbd4f66c0acad209bcbc3268a648a02cff5b19b5f30eafe2c6e1ade7ce617f4b16433585cf3aa3f13a25f665a7541371af0e587c2a472453db