Analysis

  • max time kernel
    93s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-03-2024 04:02

General

  • Target

    21d2af8f6192380ebf0c91923df9a12a0d6b3c26f8478da73c8d8bf0d3963756.jar

  • Size

    209KB

  • MD5

    f9c912be352f38dce2c0e9743e9a46ba

  • SHA1

    da2c05295eaff7e917a99b87c426d673f021a8ab

  • SHA256

    21d2af8f6192380ebf0c91923df9a12a0d6b3c26f8478da73c8d8bf0d3963756

  • SHA512

    14f7409a78cf4bd9f8b1943f24a9ecb591e5bc5e3eb25aa485f084c5881017f74faa3680ca83f4f732afbdd1361ee448d93ddc14a22858afcb490ed1a4bbb5fa

  • SSDEEP

    6144:Ve/8hJTHV/SaxkiQzyORDGVWWUIYucPBVmyKT:VeUh1FjTQBaWWUIqTKT

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\21d2af8f6192380ebf0c91923df9a12a0d6b3c26f8478da73c8d8bf0d3963756.jar
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:4408
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:4676

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp
    Filesize

    46B

    MD5

    a223d89a99c43e1ef16c4dc7c1d5029d

    SHA1

    14422fea35e87680a10ee8c29623860e42b2cdba

    SHA256

    07594d336b695f1d062004c65e9f644f0c7985414fb86d6f9d046e0a5d9934f0

    SHA512

    ac4fb42bb6ea1d0ae105480fdeeb947a0478c9a9262efe6f32b92a2a12edb40b8266edd5410d32a3c3440ec4363e06b484cad12dd4a5f64d6dce7313e3bd6e38

  • memory/4408-44-0x0000025790D30000-0x0000025790D40000-memory.dmp
    Filesize

    64KB

  • memory/4408-53-0x0000025790DA0000-0x0000025790DB0000-memory.dmp
    Filesize

    64KB

  • memory/4408-43-0x0000025790CC0000-0x0000025790CD0000-memory.dmp
    Filesize

    64KB

  • memory/4408-25-0x0000025790A40000-0x0000025791A40000-memory.dmp
    Filesize

    16.0MB

  • memory/4408-30-0x000002578F270000-0x000002578F271000-memory.dmp
    Filesize

    4KB

  • memory/4408-34-0x0000025790A40000-0x0000025791A40000-memory.dmp
    Filesize

    16.0MB

  • memory/4408-39-0x0000025790A40000-0x0000025791A40000-memory.dmp
    Filesize

    16.0MB

  • memory/4408-41-0x0000025790A40000-0x0000025791A40000-memory.dmp
    Filesize

    16.0MB

  • memory/4408-17-0x0000025790A40000-0x0000025791A40000-memory.dmp
    Filesize

    16.0MB

  • memory/4408-14-0x000002578F270000-0x000002578F271000-memory.dmp
    Filesize

    4KB

  • memory/4408-46-0x0000025790D90000-0x0000025790DA0000-memory.dmp
    Filesize

    64KB

  • memory/4408-45-0x0000025790D50000-0x0000025790D60000-memory.dmp
    Filesize

    64KB

  • memory/4408-47-0x0000025790D20000-0x0000025790D30000-memory.dmp
    Filesize

    64KB

  • memory/4408-48-0x0000025790A40000-0x0000025791A40000-memory.dmp
    Filesize

    16.0MB

  • memory/4408-49-0x0000025790D40000-0x0000025790D50000-memory.dmp
    Filesize

    64KB

  • memory/4408-51-0x0000025790D70000-0x0000025790D80000-memory.dmp
    Filesize

    64KB

  • memory/4408-50-0x0000025790D60000-0x0000025790D70000-memory.dmp
    Filesize

    64KB

  • memory/4408-52-0x0000025790D80000-0x0000025790D90000-memory.dmp
    Filesize

    64KB

  • memory/4408-4-0x0000025790A40000-0x0000025791A40000-memory.dmp
    Filesize

    16.0MB