Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2024, 18:12

General

  • Target

    OpenJDK21U-jdk_x64_windows_hotspot_21.0.2_13.msi

  • Size

    171.3MB

  • MD5

    5374071ddf1e21ffdcbdaba3c32ccff3

  • SHA1

    d2c53a16b0d86c3012e3bb5f1093752106c460f5

  • SHA256

    d0c53b1bfa741b7f6484200faf8452e5a779357c2a29aa6b0dfdedf7173e903f

  • SHA512

    12bf88c408d656f858b68fa0762c71d4987932e62cb3dc17f5ff28c231bd41ecbfc9159b15c3a6482ecce7323eadbe5da6e5d15cd8663c774e6efd152be0d223

  • SSDEEP

    3145728:/p73XE8Bgw2KJlA6yC4NiZ4C4ES9ZROLqWWdVmdgostZn27DQym5rvU:/xUAl34lC09ZRVb6dgosb2/UVc

Score
6/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\OpenJDK21U-jdk_x64_windows_hotspot_21.0.2_13.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:572
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2360

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads