Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2024 06:11
Static task
static1
Behavioral task
behavioral1
Sample
9674d32d4f08b3ab045d81a9d64c5e57.jar
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9674d32d4f08b3ab045d81a9d64c5e57.jar
Resource
win10v2004-20231215-en
General
-
Target
9674d32d4f08b3ab045d81a9d64c5e57.jar
-
Size
125KB
-
MD5
9674d32d4f08b3ab045d81a9d64c5e57
-
SHA1
59f7b5a07e7877fe54c1776e4007cfef26f5c050
-
SHA256
8f6731af469a59bf034f934876708ac2f9fc17b111a94e0ce750f56d6d927d42
-
SHA512
32702cdfdcd30ee7738749c9fa492cccfef15159bf7d3ed669ce10830700cc761c2a8f8006f13ba64c2892356b716f186a07a4128e4f402c360eb05b90e6dcce
-
SSDEEP
3072:SjoGR9+qynt/8Ky6nLu8fUvg740E+pJcf+LMb+6B0j:SuabY9Uvkd73cGLY+6B0j
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LlIVVKFSWA.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LlIVVKFSWA.js WScript.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1348 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\B02N3ZE1UL = "\"C:\\Users\\Admin\\AppData\\Roaming\\LlIVVKFSWA.js\"" WScript.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb javaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings wscript.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4288 wrote to memory of 1348 4288 java.exe 85 PID 4288 wrote to memory of 1348 4288 java.exe 85 PID 4288 wrote to memory of 5000 4288 java.exe 87 PID 4288 wrote to memory of 5000 4288 java.exe 87 PID 5000 wrote to memory of 3360 5000 wscript.exe 88 PID 5000 wrote to memory of 3360 5000 wscript.exe 88 PID 5000 wrote to memory of 372 5000 wscript.exe 89 PID 5000 wrote to memory of 372 5000 wscript.exe 89
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\9674d32d4f08b3ab045d81a9d64c5e57.jar1⤵
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:1348
-
-
C:\Windows\SYSTEM32\wscript.exewscript C:\Users\Admin\oefaqnycnu.js2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\LlIVVKFSWA.js"3⤵
- Drops startup file
- Adds Run key to start application
PID:3360
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\qubkvgud.txt"3⤵
- Drops file in Program Files directory
PID:372
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD56426b4a08a8d865aa295b0f2bc071497
SHA12ac940f3998c94d25c7935c0d2f35571fa80be81
SHA25681a180fe703ede7b6d9e361feda2315c7a3329ed5a3fc93262f7036975bb6ce3
SHA5123d01dbb44cea26afffdfb4c1a2b587e94afca596fe1c935f5a7204a7da511bba493f5153927b2e52dd9407989b2cba190e867b657504c9a3dcb7277439de9db8
-
Filesize
5KB
MD5bf38e508a2c53470c0a1dfa984803e4a
SHA10604bb9412bda7cc8c5b33f9912b26b1286c63b2
SHA256252d415a3f81f40f59bd24621e53795838fade11a98f4714968ab102111e824e
SHA512c275eb92d075ca2afcb107ee769ca6f51b4a678814bcd108b19f916bdd1c8927619841d972fbaf03e9c41b00eebb9f6209aaed14404cfd110ceff96b9781f2d7
-
Filesize
92KB
MD5fe8f4acd85fac3ad2222e579899cd0db
SHA1e74ec1ad9e53f30af7a7ad23f77461159ad1be7a
SHA256fd916a78e37fece7471b94a22fc992ed43a760f8590637d8e23e53f36993ee09
SHA512c1fd8d53dbc24f287e01b0d7c411a7797656ca09719c6046cea73ed9bfc9437c0c2068ae6b34a4b2f926ee25f2896590a493339c5ffc99b90dfa00141b674c21
-
Filesize
191KB
MD552d62079da641a43991dc690c6e79fc0
SHA1315742580e93ed16d06d992ed1778fa9892a2c81
SHA25630bed001041f49d3c83b99b0453cfc5517f0b9e37c899422fdee6b4674ca8faa
SHA51281bf2962af957a980ddc1c44e38a80267688281b89862c4f8ad07d534244ccf4becc871e5981e0cfb3d4e92ea9bf684b2381a174ff99ac384e986b4324b3a9fa