Resubmissions

11-02-2024 13:47

240211-q3qqqsag66 7

11-02-2024 13:45

240211-q2vnasag58 7

Analysis

  • max time kernel
    139s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-02-2024 13:47

General

  • Target

    jars/NewLaunchLegacy.jar

  • Size

    22KB

  • MD5

    6fad0dde8d270e0d6c1094725d5390dd

  • SHA1

    4bd9f28875ec8a597b0a592d2570a17057ff769c

  • SHA256

    c05baa4bde0f1444925ee1502d1080dcb8dd1c1124b865d3e89254e4dfb138df

  • SHA512

    b9e4df98406d40a95d4817baa479452272bef39644c4d3eea0b497a7d8f51a5a3704a5e772e735795f3512daa60c51f0d1784764d6690b08ae57fcf7aba27b21

  • SSDEEP

    384:63VLTZDtUfYdONOlSEagft41ScASXFTb5D/8SkDiWny8:63VdxlRt4EkXFTFD/8Skvny8

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\jars\NewLaunchLegacy.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4668
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:2612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    d9012eb295ed7c64c3c8e36acc80d878

    SHA1

    42c00ca984388b155ee8c2ce1872a5f933d3b9cb

    SHA256

    a864fc4147091834dafea27116479aae9f7ed0a24a4b7608a733ffc7b395ec89

    SHA512

    42ff5f56999b82b0a910fb7b9537910d03c3b8a796b22e4ba715b00ff1a3bfd00a2eae725bfb633e04d590a391fb6e806d766d648b0b68f9e9e566744ceaac57

  • memory/4668-4-0x000002A6E6C40000-0x000002A6E7C40000-memory.dmp

    Filesize

    16.0MB

  • memory/4668-12-0x000002A6E5470000-0x000002A6E5471000-memory.dmp

    Filesize

    4KB