Analysis
-
max time kernel
128s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12-02-2024 06:11
Static task
static1
Behavioral task
behavioral1
Sample
9674d32d4f08b3ab045d81a9d64c5e57.jar
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9674d32d4f08b3ab045d81a9d64c5e57.jar
Resource
win10v2004-20231215-en
General
-
Target
9674d32d4f08b3ab045d81a9d64c5e57.jar
-
Size
125KB
-
MD5
9674d32d4f08b3ab045d81a9d64c5e57
-
SHA1
59f7b5a07e7877fe54c1776e4007cfef26f5c050
-
SHA256
8f6731af469a59bf034f934876708ac2f9fc17b111a94e0ce750f56d6d927d42
-
SHA512
32702cdfdcd30ee7738749c9fa492cccfef15159bf7d3ed669ce10830700cc761c2a8f8006f13ba64c2892356b716f186a07a4128e4f402c360eb05b90e6dcce
-
SSDEEP
3072:SjoGR9+qynt/8Ky6nLu8fUvg740E+pJcf+LMb+6B0j:SuabY9Uvkd73cGLY+6B0j
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LlIVVKFSWA.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LlIVVKFSWA.js WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\B02N3ZE1UL = "\"C:\\Users\\Admin\\AppData\\Roaming\\LlIVVKFSWA.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 836 wrote to memory of 2100 836 java.exe 29 PID 836 wrote to memory of 2100 836 java.exe 29 PID 836 wrote to memory of 2100 836 java.exe 29 PID 2100 wrote to memory of 2656 2100 wscript.exe 31 PID 2100 wrote to memory of 2656 2100 wscript.exe 31 PID 2100 wrote to memory of 2656 2100 wscript.exe 31 PID 2100 wrote to memory of 2976 2100 wscript.exe 30 PID 2100 wrote to memory of 2976 2100 wscript.exe 30 PID 2100 wrote to memory of 2976 2100 wscript.exe 30
Processes
-
C:\Windows\system32\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\9674d32d4f08b3ab045d81a9d64c5e57.jar1⤵
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\system32\wscript.exewscript C:\Users\Admin\oefaqnycnu.js2⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\oiqkpcrsvf.txt"3⤵PID:2976
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\LlIVVKFSWA.js"3⤵
- Drops startup file
- Adds Run key to start application
PID:2656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5bf38e508a2c53470c0a1dfa984803e4a
SHA10604bb9412bda7cc8c5b33f9912b26b1286c63b2
SHA256252d415a3f81f40f59bd24621e53795838fade11a98f4714968ab102111e824e
SHA512c275eb92d075ca2afcb107ee769ca6f51b4a678814bcd108b19f916bdd1c8927619841d972fbaf03e9c41b00eebb9f6209aaed14404cfd110ceff96b9781f2d7
-
Filesize
64KB
MD5af5d6e13e10f2a2d0308d7e2814fe426
SHA18506ddf95892c5ba55edc71830190eb037dae620
SHA256ce9678ddb34f13afe4fd25fdde4e9933f66f652f6db88838d7160b0a4f2ef5fb
SHA512e4bf52305a82f91d7fec701038b6eacba2f116e98c176a096de27438467c2f183f55f4f6714e766c03a40cfa94849517358005fbd718cb8f802b89347a5fc48c
-
Filesize
191KB
MD552d62079da641a43991dc690c6e79fc0
SHA1315742580e93ed16d06d992ed1778fa9892a2c81
SHA25630bed001041f49d3c83b99b0453cfc5517f0b9e37c899422fdee6b4674ca8faa
SHA51281bf2962af957a980ddc1c44e38a80267688281b89862c4f8ad07d534244ccf4becc871e5981e0cfb3d4e92ea9bf684b2381a174ff99ac384e986b4324b3a9fa