Analysis
-
max time kernel
85s -
max time network
93s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
18-02-2024 20:07
Static task
static1
Behavioral task
behavioral1
Sample
booter.jar
Resource
win10-20240214-en
Behavioral task
behavioral2
Sample
booter.jar
Resource
win7-20231129-en
Behavioral task
behavioral3
Sample
booter.jar
Resource
win10-20240214-en
Behavioral task
behavioral4
Sample
booter.jar
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
booter.jar
Resource
win11-20240214-en
Behavioral task
behavioral6
Sample
booter.jar
Resource
macos-20240214-en
Behavioral task
behavioral7
Sample
booter.jar
Resource
macos-20240214-en
General
-
Target
booter.jar
-
Size
16KB
-
MD5
eb388bc8a2c6f557e7d5fe57c2902c59
-
SHA1
e7846af5ee1aa776853bb10054cdb0769324d82d
-
SHA256
27a115667060c56d976633e19532ee2254cfb4275d5d12866ebaca636f307839
-
SHA512
7a30b2fb76a3657dda7a05bacceb9322f2397bbdb1fb69e63e5a173956e450ff9ef6e1e1005aa2da5d75ef3debe72afcf34b6d3f64930b367c8576aa7fbfd84b
-
SSDEEP
384:ePimjkQROkl7WVrr88qqGDFoThvqnTqkRViQ3rQDlPmwRc:AOOWtARryOqAYQsDlrRc
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4208 icacls.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1020 wrote to memory of 4208 1020 java.exe 81 PID 1020 wrote to memory of 4208 1020 java.exe 81
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\booter.jar1⤵
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:4208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5b155e103cbe28faf4300f0c628d5891b
SHA1b74559c0ba96f7cd836502ecc09357642da62956
SHA25695d5cf3418fa28fcc05186c9f3845c60b48bdb3bd91855676c23ea9065b3f258
SHA512285a3ed9b46881fd0d8b7c43f18027092608c63c4c0a1d908133ba78152cc98f23c8b72ef88cd5ec98f93e59161bcf698e394c4228322eee99173d825fbdbe4e