Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 23:40
Behavioral task
behavioral1
Sample
b9f50fb4e8fa3c8fd2a0169cebb48108.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b9f50fb4e8fa3c8fd2a0169cebb48108.exe
Resource
win10v2004-20240226-en
General
-
Target
b9f50fb4e8fa3c8fd2a0169cebb48108.exe
-
Size
108KB
-
MD5
b9f50fb4e8fa3c8fd2a0169cebb48108
-
SHA1
c223597d7c8a8d132e7c7d4c5f05372c7a824b10
-
SHA256
c6441fe83d55602274e827b37f177f85447cb54d8e6cea1566ac04ea259a13f6
-
SHA512
c42cbc0a36113007f856a0b6921c69b7bee0ad83c3a042d711ac83dfbaf9891a9f8755c6ad8ca61b6ce18c5556e5818ecd0ef0292961aedcafc7ca237d5750e9
-
SSDEEP
3072:LTof+8cUfY9eQUtjeY8ZfNyAMHUv2S55VW7FmNE:Po2U8hUtA9BM0OSzVa0E
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2556 js.exe -
Loads dropped DLL 5 IoCs
pid Process 2840 b9f50fb4e8fa3c8fd2a0169cebb48108.exe 2840 b9f50fb4e8fa3c8fd2a0169cebb48108.exe 2556 js.exe 2556 js.exe 2556 js.exe -
resource yara_rule behavioral1/memory/2840-0-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral1/files/0x0006000000018687-9.dat upx behavioral1/memory/2840-11-0x0000000000260000-0x000000000026F000-memory.dmp upx behavioral1/memory/2840-18-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral1/memory/2840-17-0x0000000000260000-0x000000000026F000-memory.dmp upx behavioral1/memory/2556-26-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2556-27-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Java VM v6.91 = "C:\\Windows\\system32\\jdk-1_5_0_19-windows-i391-pp\\jav.bat" js.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java VM v6.91 = "C:\\Windows\\system32\\jdk-1_5_0_19-windows-i391-pp\\jav.bat" js.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Java VM v6.91 js.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Java VM v6.91 js.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\jdk-1_5_0_19-windows-i391-pp\dc.$$A b9f50fb4e8fa3c8fd2a0169cebb48108.exe File created C:\Windows\SysWOW64\jdk-1_5_0_19-windows-i391-pp\jav.$$A b9f50fb4e8fa3c8fd2a0169cebb48108.exe File created C:\Windows\SysWOW64\jdk-1_5_0_19-windows-i391-pp\js.$$A b9f50fb4e8fa3c8fd2a0169cebb48108.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2556 2840 b9f50fb4e8fa3c8fd2a0169cebb48108.exe 28 PID 2840 wrote to memory of 2556 2840 b9f50fb4e8fa3c8fd2a0169cebb48108.exe 28 PID 2840 wrote to memory of 2556 2840 b9f50fb4e8fa3c8fd2a0169cebb48108.exe 28 PID 2840 wrote to memory of 2556 2840 b9f50fb4e8fa3c8fd2a0169cebb48108.exe 28 PID 2840 wrote to memory of 2556 2840 b9f50fb4e8fa3c8fd2a0169cebb48108.exe 28 PID 2840 wrote to memory of 2556 2840 b9f50fb4e8fa3c8fd2a0169cebb48108.exe 28 PID 2840 wrote to memory of 2556 2840 b9f50fb4e8fa3c8fd2a0169cebb48108.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9f50fb4e8fa3c8fd2a0169cebb48108.exe"C:\Users\Admin\AppData\Local\Temp\b9f50fb4e8fa3c8fd2a0169cebb48108.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\jdk-1_5_0_19-windows-i391-pp\js.exe"C:\Windows\system32\jdk-1_5_0_19-windows-i391-pp\js.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD53ec13bdc53b2984848736b602dd46de2
SHA19071031b09329136da76f505244ea5c3ee03ce6a
SHA256bbeb77a4bf55861bcf9d0ebb1baebd61838d82befcb4438d65a02fac6b4dcc57
SHA5120a88d6e01a4c6707eea1701a8159d326fb1574db2dd3afc8b85ca355163e83af0d08ad0080827af1cd99737f2c399ffd2aa5a193777b5fed95ee150fa38c840f