Analysis

  • max time kernel
    92s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/02/2024, 20:07

General

  • Target

    booter.jar

  • Size

    16KB

  • MD5

    eb388bc8a2c6f557e7d5fe57c2902c59

  • SHA1

    e7846af5ee1aa776853bb10054cdb0769324d82d

  • SHA256

    27a115667060c56d976633e19532ee2254cfb4275d5d12866ebaca636f307839

  • SHA512

    7a30b2fb76a3657dda7a05bacceb9322f2397bbdb1fb69e63e5a173956e450ff9ef6e1e1005aa2da5d75ef3debe72afcf34b6d3f64930b367c8576aa7fbfd84b

  • SSDEEP

    384:ePimjkQROkl7WVrr88qqGDFoThvqnTqkRViQ3rQDlPmwRc:AOOWtARryOqAYQsDlrRc

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\booter.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4812
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:1028

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

          Filesize

          46B

          MD5

          e1ca114b2570736ddfa09d73de1cefdb

          SHA1

          ac2dfd8232c4b9e4f1236fe01d6bd2f2e8a67dd0

          SHA256

          21a06a037c372127a4808ca9d6e2d6bd427f33d7465ceed2d64e467e3d679670

          SHA512

          f3e6b47fa2d203384a7fe133e78a7d8272f36e27b589ef9f5c362678ff33f45336087c9742a1d76839bdd758711b3e95e5e95a75c61941a1ea2eae244ba4f2d2

        • memory/4812-4-0x0000023662C90000-0x0000023663C90000-memory.dmp

          Filesize

          16.0MB

        • memory/4812-12-0x0000023661650000-0x0000023661651000-memory.dmp

          Filesize

          4KB