Analysis
-
max time kernel
140s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/02/2024, 08:33
Behavioral task
behavioral1
Sample
00293828403xlspdf.jar
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
00293828403xlspdf.jar
Resource
win10v2004-20231215-en
General
-
Target
00293828403xlspdf.jar
-
Size
125KB
-
MD5
acdf87548c106b4271d86ad9e5afb859
-
SHA1
0c4108f5b00a0d72d42050757b1fb8d144b44a96
-
SHA256
0352732011c82ddbc89c86f732bd0c3acb9a9c6caf7bdbcb99bb08b68a9db1db
-
SHA512
5b6268cf0d7cbac10d015f237b3c86b8dddc9ccb82d47e3aa975feeeed09e4a5315522ae177584a63a6f8562ca3bb5df5bb328f63d24f2e661584bf8d0939477
-
SSDEEP
3072:ZvPwf6XB5qfvyaKJUbyp4VIVG72WpVErn+kysWOZE2Dt8:Fw8Sij6bWSIVS2WfEEstI
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2044 icacls.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb java.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1452 wrote to memory of 2044 1452 java.exe 85 PID 1452 wrote to memory of 2044 1452 java.exe 85
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\00293828403xlspdf.jar1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:2044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5bb1f8ace8a3fce0accf9bd2e15079354
SHA1ec0482bfef9ec13e651243db656f21af27d2d936
SHA256cc702f412d32442b549665dd0e3537c6e8c501556c70b8cdbbc174447be1644b
SHA51224ab89328072ecd007842fe0d69584b8f7ec3ac05a9d11fcadfaac990805930cd0c134e8d404e2428c92c66610b85634670e42405828ff2aaa9431986b6a756a