Analysis
-
max time kernel
76s -
max time network
145s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/02/2024, 16:35
Static task
static1
Behavioral task
behavioral1
Sample
Aristois-Free.jar
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
Aristois-Free.jar
Resource
win11-20240221-en
General
-
Target
Aristois-Free.jar
-
Size
6.6MB
-
MD5
4cad86ed173ff0dad198582d86bf62b6
-
SHA1
d25bd59b411076ccc1ed4b4daef78aef093a9d3d
-
SHA256
fbff2ebba99bfa194af533852062c6d60831c7cc3801d4af980c329721484a28
-
SHA512
e233c3ba1b3aeab0e286ad46e7ac4f34ae2207269c7a624bc29d90f14e6ff2dac4d74785414966569ab8da0b2d65d591eadd8884c1989976c361b5ff0c87aea2
-
SSDEEP
196608:N0EY4XwEff0cxykwL9g1leOnAU+1blTRLXKrC05:KYDf8FkHXAU8dJXKrb5
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4804 icacls.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb java.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 572 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1004 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1004 vlc.exe -
Suspicious use of FindShellTrayWindow 17 IoCs
pid Process 1004 vlc.exe 1004 vlc.exe 1004 vlc.exe 1004 vlc.exe 1004 vlc.exe 1004 vlc.exe 1004 vlc.exe 1004 vlc.exe 1004 vlc.exe 1004 vlc.exe 1004 vlc.exe 1004 vlc.exe 1004 vlc.exe 1004 vlc.exe 1004 vlc.exe 1004 vlc.exe 1004 vlc.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 1004 vlc.exe 1004 vlc.exe 1004 vlc.exe 1004 vlc.exe 1004 vlc.exe 1004 vlc.exe 1004 vlc.exe 1004 vlc.exe 1004 vlc.exe 1004 vlc.exe 1004 vlc.exe 1004 vlc.exe 1004 vlc.exe 1004 vlc.exe 1004 vlc.exe 1004 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1004 vlc.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2356 wrote to memory of 4804 2356 java.exe 80 PID 2356 wrote to memory of 4804 2356 java.exe 80
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\Aristois-Free.jar1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:4804
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:912
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\NewRename.mp3"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1004
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\ConfirmProtect.cmd" "1⤵PID:2592
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\ConfirmProtect.cmd" "1⤵PID:1564
-
C:\Windows\System32\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\Downloads\ConfirmProtect.cmd1⤵
- Opens file in notepad (likely ransom note)
PID:572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD51c926eb9c193c077bf87d11f6abb3af9
SHA148b2b7ed2cbe126e442dc2ebbc53acf6ee092f6c
SHA2563d48085b9a5f0f35668502769fb50f7ffba50e90b42f0537ae0005944a785243
SHA51219ea02650e92cfdacb9a695cd5cc780920af0654a4733405bd3f167b4fcb5cfc417f4580ee31e8384990f6b6d550f62c65335a09accd70fed01e853925dce0e0
-
Filesize
77B
MD589366e497e206687f657893c7fd35d0c
SHA1b21e9ca52a65e4d51a43a001890d3a0255dde37f
SHA256818a290381eeae0a806c0da9ef45a79523d37b7bf12e0c36b41051c165b49913
SHA512ec4d9c47e7f45c5dafe5501bb9853f2933eed2d64986cb0a644ffea3d963ca61f93e48ece55c26fe83369413d4734006d21524577a21fd5f1cebb9091f512083