Analysis
-
max time kernel
31s -
max time network
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2024 19:58
Static task
static1
Behavioral task
behavioral1
Sample
baritone-standalone-fabric-1.10.2.jar
Resource
win10v2004-20231215-en
General
-
Target
baritone-standalone-fabric-1.10.2.jar
-
Size
1.4MB
-
MD5
d2cb15f3611ebce923b0a7c2be61ea98
-
SHA1
d0f9021d9f168a7de607c7a472d945c3904c8093
-
SHA256
bfaf0b11e61564a902f2a4895d65637840f7f5a319e3042e2e1828200e1bd9ca
-
SHA512
e5f0a37a65667cc87f1236210deb50d0d414d907c9ac1e4b6588af87d00327ac44d40bf60f7355a2ecdb5167427f7f188c84ee68fe97f003194f4c06212851ba
-
SSDEEP
24576:94UgAWlNH4qJfNmEP/6CkOwGc6vr1DciQtB+NOxnRet9APqbFWfv/5ZOXxADuoE7:6UgAWlNH4wmEcFGcQrA3FTPrfvxZOXS2
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2288 icacls.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4084 wrote to memory of 2288 4084 java.exe 86 PID 4084 wrote to memory of 2288 4084 java.exe 86
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\baritone-standalone-fabric-1.10.2.jar1⤵
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:2288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5b74baf9fd1da898bd1cb3e1d32799f4c
SHA104585bc25ee0b36b42b149c77ed7368b7b0c97ea
SHA2567d59c1f71def0973271015bdfdc79e2b1fd77d6c0f62e449ffbf5f9907e9a570
SHA512336591fbae6fee98c0fd31cff3453c718e2747b85d240ba3c909632d3e3f5f8ddd90511b9f1095a341044f62b69f58068c3e1503c481d4ec9eb06a6662dbdc91