Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/02/2024, 20:07
Static task
static1
Behavioral task
behavioral1
Sample
booter.jar
Resource
win10-20240214-en
Behavioral task
behavioral2
Sample
booter.jar
Resource
win7-20231129-en
Behavioral task
behavioral3
Sample
booter.jar
Resource
win10-20240214-en
Behavioral task
behavioral4
Sample
booter.jar
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
booter.jar
Resource
win11-20240214-en
Behavioral task
behavioral6
Sample
booter.jar
Resource
macos-20240214-en
Behavioral task
behavioral7
Sample
booter.jar
Resource
macos-20240214-en
General
-
Target
booter.jar
-
Size
16KB
-
MD5
eb388bc8a2c6f557e7d5fe57c2902c59
-
SHA1
e7846af5ee1aa776853bb10054cdb0769324d82d
-
SHA256
27a115667060c56d976633e19532ee2254cfb4275d5d12866ebaca636f307839
-
SHA512
7a30b2fb76a3657dda7a05bacceb9322f2397bbdb1fb69e63e5a173956e450ff9ef6e1e1005aa2da5d75ef3debe72afcf34b6d3f64930b367c8576aa7fbfd84b
-
SSDEEP
384:ePimjkQROkl7WVrr88qqGDFoThvqnTqkRViQ3rQDlPmwRc:AOOWtARryOqAYQsDlrRc
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1028 icacls.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4812 wrote to memory of 1028 4812 java.exe 86 PID 4812 wrote to memory of 1028 4812 java.exe 86
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\booter.jar1⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:1028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5e1ca114b2570736ddfa09d73de1cefdb
SHA1ac2dfd8232c4b9e4f1236fe01d6bd2f2e8a67dd0
SHA25621a06a037c372127a4808ca9d6e2d6bd427f33d7465ceed2d64e467e3d679670
SHA512f3e6b47fa2d203384a7fe133e78a7d8272f36e27b589ef9f5c362678ff33f45336087c9742a1d76839bdd758711b3e95e5e95a75c61941a1ea2eae244ba4f2d2