Analysis
-
max time kernel
138s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2024 05:48
Static task
static1
Behavioral task
behavioral1
Sample
d26ab01b293b2d439a20d1dffc02a5c9f2523446d811192836e26d370a34d1b4.jar
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d26ab01b293b2d439a20d1dffc02a5c9f2523446d811192836e26d370a34d1b4.jar
Resource
win10v2004-20231215-en
General
-
Target
d26ab01b293b2d439a20d1dffc02a5c9f2523446d811192836e26d370a34d1b4.jar
-
Size
347KB
-
MD5
21635c271b7446b7e86bb3b447bb91d5
-
SHA1
959da0fb174a8e4db238d08a3f5076a2f43c0f25
-
SHA256
d26ab01b293b2d439a20d1dffc02a5c9f2523446d811192836e26d370a34d1b4
-
SHA512
6b4bb9d3aac718198413704c908715a360030dfffe2b0a0d701b1e6ee492d996864c62601b24abe9968af7e486a8bfdd1adc488d615f4d56b43a5eac670371db
-
SSDEEP
6144:CL5PakRJyjlhPPLh8+CnL0F0uPKwp1F18cy3PQd74MWM2BGzPZtfJKoCK8eaFDrC:CL5akRJklhHLnDvf1F18hc74w26PVKdw
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1680 regsvr32.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3300 icacls.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1680 set thread context of 224 1680 regsvr32.exe 89 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1680 regsvr32.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
pid Process 1680 regsvr32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 180 wrote to memory of 3300 180 java.exe 85 PID 180 wrote to memory of 3300 180 java.exe 85 PID 180 wrote to memory of 3272 180 java.exe 87 PID 180 wrote to memory of 3272 180 java.exe 87 PID 3272 wrote to memory of 1680 3272 regsvr32.exe 88 PID 3272 wrote to memory of 1680 3272 regsvr32.exe 88 PID 3272 wrote to memory of 1680 3272 regsvr32.exe 88 PID 1680 wrote to memory of 224 1680 regsvr32.exe 89 PID 1680 wrote to memory of 224 1680 regsvr32.exe 89 PID 1680 wrote to memory of 224 1680 regsvr32.exe 89 PID 1680 wrote to memory of 224 1680 regsvr32.exe 89 PID 1680 wrote to memory of 224 1680 regsvr32.exe 89 PID 1680 wrote to memory of 224 1680 regsvr32.exe 89 PID 1680 wrote to memory of 224 1680 regsvr32.exe 89 PID 1680 wrote to memory of 224 1680 regsvr32.exe 89
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\d26ab01b293b2d439a20d1dffc02a5c9f2523446d811192836e26d370a34d1b4.jar1⤵
- Suspicious use of WriteProcessMemory
PID:180 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:3300
-
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\\163520.png2⤵
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\\163520.png3⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\ctfmon.exe"C:\Windows\SysWOW64\ctfmon.exe -p 1234"4⤵PID:224
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
478KB
MD58cca982603318de80b079f064ffbe5f1
SHA198f371d5bb067d6b7df902b10957fb01ca711468
SHA2567b1c5147c903892f8888f91c98097c89e419ddcc89958a33e294e6dd192b6d4e
SHA512d01830992fa6779a38c1d913af41dcf88d8b77d70ee299e4a002ba756d20a5d61ce5364240022a4bbcd44072b59a5000d96c5ce361f0cc7f12b1b077102a4c92
-
Filesize
142KB
MD5ec357f8b44f7988eb8b2da2b52cdfa35
SHA1112cc1718d1b7ba2180032be312b046626028262
SHA2562cb46dc141a8c91c65921446a6ad82c8acf5a620044e61ed3fb11eb5d2035d96
SHA5121b0874a3d13b9c9cd32094c662fff27101569cc20dc37c0d3a154643b9be4d8358d5b49375e86e5c1e5916c9387c392d6e784ecce14ae38828a02ed09d3f9a47