Analysis
-
max time kernel
72s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
04-02-2024 03:47
Static task
static1
Behavioral task
behavioral1
Sample
8e23008d7ada844193b579c1194ed0bb.jar
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8e23008d7ada844193b579c1194ed0bb.jar
Resource
win10v2004-20231215-en
General
-
Target
8e23008d7ada844193b579c1194ed0bb.jar
-
Size
129KB
-
MD5
8e23008d7ada844193b579c1194ed0bb
-
SHA1
e41203fbb4e3fc56da36de0f16da8ea013835455
-
SHA256
23470d051b914ebef24b5963b5cdfc2d88feedd783fd85766d1eb0397314b75e
-
SHA512
aa65bb14c09782f67870278d97ab783dbe88c97d62cff44d2fbae649cb1b8ff045231df8b51e0b5ff695173a57b155be7b1b377dee5aa1df5c99a0d31f5e9cde
-
SSDEEP
3072:FMT7X2SUszVuItHjPpPeM3jbFO6C11vZYPULkHImQq+MXa5Sh9UALa:FGMszVuKDPgM3jbFOXfvy1dQqjaOG
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vBlHdPbRXO.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vBlHdPbRXO.js WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\vBlHdPbRXO.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2596 1688 java.exe 29 PID 1688 wrote to memory of 2596 1688 java.exe 29 PID 1688 wrote to memory of 2596 1688 java.exe 29 PID 2596 wrote to memory of 2836 2596 wscript.exe 30 PID 2596 wrote to memory of 2836 2596 wscript.exe 30 PID 2596 wrote to memory of 2836 2596 wscript.exe 30 PID 2596 wrote to memory of 1648 2596 wscript.exe 31 PID 2596 wrote to memory of 1648 2596 wscript.exe 31 PID 2596 wrote to memory of 1648 2596 wscript.exe 31
Processes
-
C:\Windows\system32\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\8e23008d7ada844193b579c1194ed0bb.jar1⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\system32\wscript.exewscript C:\Users\Admin\fttmjknmdk.js2⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\vBlHdPbRXO.js"3⤵
- Drops startup file
- Adds Run key to start application
PID:2836
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\yhjtcckrx.txt"3⤵PID:1648
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD53d1f00e48df980bbe27e044f1806ac45
SHA1ca18bf1aa56088a4b4fc662641db53e759ca02c5
SHA256c662504121a016a1d03230f2b588dc3e46a0dc535b374ceea2812b5edd5bb03f
SHA512925521347e5797e64091baa676a1a28e1ba34bde07672ed2a830c7487ad1a216c499eb2dcd646255bbe2d6944ba283924e9f0ed92ad33f1bcc17c16655ab9dd3
-
Filesize
92KB
MD52609351f059049d57f3c3acb42f6ceba
SHA1f028f2c40bd349772b0ee2a50ce15faa692e5b90
SHA256050bd188e324cf2070656fda15505df4e8663377e7a62bc5cb7d3fceefdde25f
SHA512d797b768fc8adf63776f6011695a63998729c4a227c4002ec9cbe52e2431d50496e745c2833ee00db951dde49b3c2ba4692d01057253b5259a65d0aa5f8208ea
-
Filesize
205KB
MD5039aa1459dff7f925387f99398485238
SHA1ae030e4bc78bc8725ffb7911d77a820003059531
SHA25643b48dab6f4327b867221688c4f77d57a43faba5067698dd37c8d1a63229056a
SHA512484d67e334512eedf4636606b16b03032e4ac7d28d450d28789b3a8a3b6dadac573aeb9d34d2d2e66f1e2f839da410c8ef12b602d0a4db37c0b72c3671079503