Analysis

  • max time kernel
    146s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/02/2024, 19:53

General

  • Target

    libraries/io/netty/netty-all/4.0.23.Final/netty-all-4.0.23.Final.jar

  • Size

    1.7MB

  • MD5

    4725826ca7ba3713db6748ee8f3906c3

  • SHA1

    0294104aaf1781d6a56a07d561e792c5d0c95f45

  • SHA256

    50510e9c9874b539b98ef931fe7eeeb002f6b5b1976ea37669b9493426294561

  • SHA512

    80fcf9653620a614fb444d039c8bd8c195db25cb16f39ccccd87c1434fbc836c66f792e7717cc989b66d57c0a86365b8ae051c107916c231d4ecd0b4d2908490

  • SSDEEP

    24576:eTZZySEwtY+G2WZeW58R8ThJZw62EgC6fCyL1zjLr6NewH5pWzwNdemBpC7+RjiM:Qz1En2WX8qXK62666UzvWDZrNdemBmOz

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\libraries\io\netty\netty-all\4.0.23.Final\netty-all-4.0.23.Final.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:2516

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

          Filesize

          46B

          MD5

          713e8a06067e83f3672d319aecff7483

          SHA1

          c506b681769f246a0aefefc04a069619a4c57bd2

          SHA256

          e2a57e1562ef8cbba0dd9e3b055631562b1cb36e7b83d58f7f48d0a9a4f528c5

          SHA512

          3bee28eb00cc687cd66b55a6b6494431e23505798f5499354670ac4635321a8c70d2df88b037d674f4b83df131be463b273bedd09b375c9fbf126eca8860d12c

        • memory/3048-4-0x000001BE9BDA0000-0x000001BE9CDA0000-memory.dmp

          Filesize

          16.0MB

        • memory/3048-12-0x000001BE9BD80000-0x000001BE9BD81000-memory.dmp

          Filesize

          4KB