Analysis

  • max time kernel
    138s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-02-2024 05:48

General

  • Target

    d26ab01b293b2d439a20d1dffc02a5c9f2523446d811192836e26d370a34d1b4.jar

  • Size

    347KB

  • MD5

    21635c271b7446b7e86bb3b447bb91d5

  • SHA1

    959da0fb174a8e4db238d08a3f5076a2f43c0f25

  • SHA256

    d26ab01b293b2d439a20d1dffc02a5c9f2523446d811192836e26d370a34d1b4

  • SHA512

    6b4bb9d3aac718198413704c908715a360030dfffe2b0a0d701b1e6ee492d996864c62601b24abe9968af7e486a8bfdd1adc488d615f4d56b43a5eac670371db

  • SSDEEP

    6144:CL5PakRJyjlhPPLh8+CnL0F0uPKwp1F18cy3PQd74MWM2BGzPZtfJKoCK8eaFDrC:CL5akRJklhHLnDvf1F18hc74w26PVKdw

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\d26ab01b293b2d439a20d1dffc02a5c9f2523446d811192836e26d370a34d1b4.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:180
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:3300
    • C:\Windows\SYSTEM32\regsvr32.exe
      regsvr32 /s C:\Users\Admin\AppData\Local\Temp\\163520.png
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3272
      • C:\Windows\SysWOW64\regsvr32.exe
        /s C:\Users\Admin\AppData\Local\Temp\\163520.png
        3⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of WriteProcessMemory
        PID:1680
        • C:\Windows\SysWOW64\ctfmon.exe
          "C:\Windows\SysWOW64\ctfmon.exe -p 1234"
          4⤵
            PID:224

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\163520.png

      Filesize

      478KB

      MD5

      8cca982603318de80b079f064ffbe5f1

      SHA1

      98f371d5bb067d6b7df902b10957fb01ca711468

      SHA256

      7b1c5147c903892f8888f91c98097c89e419ddcc89958a33e294e6dd192b6d4e

      SHA512

      d01830992fa6779a38c1d913af41dcf88d8b77d70ee299e4a002ba756d20a5d61ce5364240022a4bbcd44072b59a5000d96c5ce361f0cc7f12b1b077102a4c92

    • C:\Users\Admin\AppData\Local\Temp\163520.png

      Filesize

      142KB

      MD5

      ec357f8b44f7988eb8b2da2b52cdfa35

      SHA1

      112cc1718d1b7ba2180032be312b046626028262

      SHA256

      2cb46dc141a8c91c65921446a6ad82c8acf5a620044e61ed3fb11eb5d2035d96

      SHA512

      1b0874a3d13b9c9cd32094c662fff27101569cc20dc37c0d3a154643b9be4d8358d5b49375e86e5c1e5916c9387c392d6e784ecce14ae38828a02ed09d3f9a47

    • memory/180-2-0x000002B880000000-0x000002B881000000-memory.dmp

      Filesize

      16.0MB

    • memory/180-11-0x000002B8F25F0000-0x000002B8F25F1000-memory.dmp

      Filesize

      4KB

    • memory/180-18-0x000002B8F25F0000-0x000002B8F25F1000-memory.dmp

      Filesize

      4KB

    • memory/224-22-0x00000000001E0000-0x00000000001F8000-memory.dmp

      Filesize

      96KB

    • memory/224-27-0x00000000001E0000-0x00000000001F8000-memory.dmp

      Filesize

      96KB

    • memory/1680-21-0x0000000002730000-0x0000000002765000-memory.dmp

      Filesize

      212KB

    • memory/1680-31-0x0000000002730000-0x0000000002765000-memory.dmp

      Filesize

      212KB