Analysis
-
max time kernel
150s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
15-02-2024 03:55
Static task
static1
Behavioral task
behavioral1
Sample
Order550232.jar
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Order550232.jar
Resource
win10v2004-20231215-en
General
-
Target
Order550232.jar
-
Size
129KB
-
MD5
c91d4750382881ff7da852e22a6f2419
-
SHA1
b916255dfadf02871d0a84083e989df52396e75b
-
SHA256
12eac35e31b525e6257a42f809868ad6203e9ed8c8b07b487a46cfa0ba5ed4d3
-
SHA512
e897cd5a0b05e557d83aa3c3678dcd565cd53737b8d05fe46515e56b7ff229d218c1cc908c57d1dcbf4b5fdd7295d2a44deaff81c76c91c4f7ff1db201266244
-
SSDEEP
3072:jo1lDnmPMoEu8S5IL47n3RervM8+gjkztlabpOex5ruXIbCuo:wKPMoCS5gm3UryusGOexWuo
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dqTlpEOTrV.js WScript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dqTlpEOTrV.js WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\dqTlpEOTrV.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2772 2564 java.exe 29 PID 2564 wrote to memory of 2772 2564 java.exe 29 PID 2564 wrote to memory of 2772 2564 java.exe 29 PID 2772 wrote to memory of 2096 2772 wscript.exe 30 PID 2772 wrote to memory of 2096 2772 wscript.exe 30 PID 2772 wrote to memory of 2096 2772 wscript.exe 30 PID 2772 wrote to memory of 2428 2772 wscript.exe 31 PID 2772 wrote to memory of 2428 2772 wscript.exe 31 PID 2772 wrote to memory of 2428 2772 wscript.exe 31
Processes
-
C:\Windows\system32\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\Order550232.jar1⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\system32\wscript.exewscript C:\Users\Admin\euvrrnhkej.js2⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\dqTlpEOTrV.js"3⤵
- Drops startup file
- Adds Run key to start application
PID:2096
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\ktajdfkpi.txt"3⤵PID:2428
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD53a463dc3f1ccbb255564f73dccca622e
SHA1ab4a88d983c371128c73699cac7e308ca7870f7b
SHA25618c2e58bfb5e035d4c1e4d2ba4e506c8041c739ec32ec9ce80ba00adc4dbd550
SHA512d7a4fdb65d1b5ff1616489e7b893ebab3f1e160c99007a43fc73ada3ec53cc9ddae4c3a6acb6e2852b239de336253064fd838d3f843c09e2ab952dce8e8e2cbe
-
Filesize
92KB
MD52ed25df72bd13cca5979c53b8fe7e529
SHA182b9c61b60f966e1ff77374b7aea67334ae98ef1
SHA25681473eced4690bb6172d677771924cd4a0542c74f00dae2b3493cbebc6b1549c
SHA5123086609e10bb6504ac26fb573874ade44ec446e19ac7d1e059f108dbaf31271617a10addabed41997e400bc885d07ef713054ef2d2246748809740a64c7e90f6
-
Filesize
205KB
MD5d5fe40e5e35ebbc1a60c54672f775325
SHA19b01278c620351932e98e95db9881f18652f7e67
SHA256a40e1a0e0a1e68051cefc29955d92d99efa3d24a8d70052de8aa9e4ab08da32b
SHA5122ade53d5a1d303328af40acf3f1d231fc54a8b3eb0d1e934094a7b7c63e5035c679e7ce89465e0ea4ea796e7f5f991c1da760cb64ad4b15b8d9130272e6d617c