Analysis

  • max time kernel
    144s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-02-2024 07:22

General

  • Target

    Fapcraft 1.12.2 v1.1.jar

  • Size

    43.7MB

  • MD5

    f5d9b40d51f4bd60e2bd30d30e4548a2

  • SHA1

    f53e08bbe16f25240af25793600e76ea854b731a

  • SHA256

    0c5cfabb7d64aac865fd6753375ddd856bed12e1ff8f1e0e4164fa5ccc4925bf

  • SHA512

    ea458ed92b7ac80479bee9d68e3bc00b894c0aeba441f0002aae68c83f4c4a6376ff78c159ad4b2152cad4dbaab2453ebe54d42054b74a571bbdd4d843e5be1e

  • SSDEEP

    786432:Pp7lHfurN3Fg4r2p1FrVhpdd/fm6JEdoykfLOU762LQcFrUhPjbrSio480v1LP:PptgN3L61dTdWCab4LRLQarEjvcAr

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar "C:\Users\Admin\AppData\Local\Temp\Fapcraft 1.12.2 v1.1.jar"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3972
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:3140
  • C:\Windows\system32\mspaint.exe
    "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\TraceConvertFrom.bmp"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4256
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService
    1⤵
      PID:2324
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4932

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

        Filesize

        46B

        MD5

        ffefc7b0cb3c7bfaa33d8dcf06b8681f

        SHA1

        45629303a9346e77007aa4dfdeb6807f65ad47a9

        SHA256

        5231719212a109c3415db4379d8c6b9b2db291c326c27725862fb143f7f44443

        SHA512

        15d6910cf20449d04751cdeb247767efd1109ebf75a2f2d69944d6f4da07b97d76749119200d72b0d6875aa4bf42b091d7bdf4ea354d6a319b05f2adbf13b528

      • memory/3972-4-0x000002313E070000-0x000002313F070000-memory.dmp

        Filesize

        16.0MB

      • memory/3972-11-0x000002313C890000-0x000002313C891000-memory.dmp

        Filesize

        4KB

      • memory/3972-12-0x000002313C890000-0x000002313C891000-memory.dmp

        Filesize

        4KB