Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
05/03/2024, 20:54
Static task
static1
Behavioral task
behavioral1
Sample
Bot3.7.jar
Resource
win11-20240221-en
General
-
Target
Bot3.7.jar
-
Size
610KB
-
MD5
2a0203c04722cca18c7829e7082e3bbb
-
SHA1
6bd6054585ab0e4ba961b8685af9a9df556f4f08
-
SHA256
aef51e8fc0523142dd59038c4c74746c0856648f67081206cba26d740db91c69
-
SHA512
797344cd9ba8045f0a63ead03a339c726665bbd3a39f12c3b07c5e44b6e51633a0dc0defdaf1ff37977feae5cb4d10c84248be04ebb67d284cf89ac3bec97ff8
-
SSDEEP
12288:6u551EEB5DX6uI1ylSEAHQ35DIRUamELzy0:6u551EEB5DX6j0liIDFgzy0
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 832 icacls.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3452 java.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3452 wrote to memory of 832 3452 java.exe 82 PID 3452 wrote to memory of 832 3452 java.exe 82
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\Bot3.7.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5652eb09df8d9e54d66455fb8e7eb41d4
SHA13d293ac2ee7ab61796bf2021e2156d5f0d120e29
SHA25667646bfed2d9a948044816712c3e37ac046a67aa1f8cefb47f2dec76fade79ae
SHA5128bb036cca995bec62e4bc617e5ab633b685a7f7fd421eaba198be0ae980f29430187d34f79e19c953c0d3bc850b19c78ed9ea7acb47cdec6deffd874b34bb3b4