Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25-02-2024 14:29
Behavioral task
behavioral1
Sample
a405af40a581ee2f0408f195eac26dc9.jar
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a405af40a581ee2f0408f195eac26dc9.jar
Resource
win10v2004-20240221-en
General
-
Target
a405af40a581ee2f0408f195eac26dc9.jar
-
Size
99KB
-
MD5
a405af40a581ee2f0408f195eac26dc9
-
SHA1
89070bac1eff692f089c431d6b95ad64095e77c9
-
SHA256
3a1f6872728b85b1777450badac363ede549d11d2144b5af35035c1e0da60de9
-
SHA512
8fcd879ecb732b1c953dfd3a73b5433357fa56f850f99b202504828e8f1b8b2a6b3ec5f69c062480b14530468b3b60695fc52b5c47682d9b653b78b68797b59c
-
SSDEEP
3072:qES7fGr+2adei9woomfn9FvfjxJOFlPDtH:qES4+2adbH7fjfIDtH
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
-
Drops file in Program Files directory 12 IoCs
Processes:
java.exedescription ioc process File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb java.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
java.exedescription pid process target process PID 1536 wrote to memory of 3796 1536 java.exe icacls.exe PID 1536 wrote to memory of 3796 1536 java.exe icacls.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\a405af40a581ee2f0408f195eac26dc9.jar1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:3796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5ecb79337bb96d7f28445e873e81a00c2
SHA10ecf2824be8cfb707526e5f46ca4bc319405c643
SHA25659b295cb22227bac9c7c2b9af2a960d8cc684f2da2aa5933e95d448c9cdfb771
SHA5123bd9483f64118b8324029752111932d016b42dc737cfbf42584362ca6804524188270e4bfdd0e85c40bece2a64fb69f6c951c3dfc592decff84a9eb8ade5aba2