Analysis
-
max time kernel
125s -
max time network
132s -
platform
windows10-1703_x64 -
resource
win10-20240214-en -
resource tags
arch:x64arch:x86image:win10-20240214-enlocale:en-usos:windows10-1703-x64system -
submitted
18/02/2024, 20:07
Static task
static1
Behavioral task
behavioral1
Sample
booter.jar
Resource
win10-20240214-en
Behavioral task
behavioral2
Sample
booter.jar
Resource
win7-20231129-en
Behavioral task
behavioral3
Sample
booter.jar
Resource
win10-20240214-en
Behavioral task
behavioral4
Sample
booter.jar
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
booter.jar
Resource
win11-20240214-en
Behavioral task
behavioral6
Sample
booter.jar
Resource
macos-20240214-en
Behavioral task
behavioral7
Sample
booter.jar
Resource
macos-20240214-en
General
-
Target
booter.jar
-
Size
16KB
-
MD5
eb388bc8a2c6f557e7d5fe57c2902c59
-
SHA1
e7846af5ee1aa776853bb10054cdb0769324d82d
-
SHA256
27a115667060c56d976633e19532ee2254cfb4275d5d12866ebaca636f307839
-
SHA512
7a30b2fb76a3657dda7a05bacceb9322f2397bbdb1fb69e63e5a173956e450ff9ef6e1e1005aa2da5d75ef3debe72afcf34b6d3f64930b367c8576aa7fbfd84b
-
SSDEEP
384:ePimjkQROkl7WVrr88qqGDFoThvqnTqkRViQ3rQDlPmwRc:AOOWtARryOqAYQsDlrRc
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1788 icacls.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5048 wrote to memory of 1788 5048 java.exe 75 PID 5048 wrote to memory of 1788 5048 java.exe 75
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\booter.jar1⤵
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:1788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5d18d96acd126f3a67b278a357f7d7154
SHA1f107ea371b6863deb1e16aeaf198769148372bbf
SHA256fe240143b01bd4b44b0a3eee637cdc82da613924c1d704bd6ed3c3f282fe42a3
SHA51292d407cfbc982c563bd872fb7f0155973fbab619341fde3a3a5bc85a8435cd8cb5891749a9fcfb60758486b6a6ed143dab66fb56ac8b85f7134366b3d103b74b