Analysis

  • max time kernel
    42s
  • max time network
    39s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    08-03-2024 18:54

General

  • Target

    Adwind.jar

  • Size

    5KB

  • MD5

    fe537a3346590c04d81d357e3c4be6e8

  • SHA1

    b1285f1d8618292e17e490857d1bdf0a79104837

  • SHA256

    bbc572cced7c94d63a7208f4aba4ed20d1350bef153b099035a86c95c8d96d4a

  • SHA512

    50a5c1ad99ee9f3a540cb30e87ebfdf7561f0a0ee35b3d06c394fa2bad06ca6088a04848ddcb25f449b3c98b89a91d1ba5859f1ed6737119b606968be250c8ce

  • SSDEEP

    96:w9fXh7CBF8l1cHRDOjY4YbiPkW7UW1g+dWi9sBSy3HQNm6wx2xC7vz5:GXh78hHRDOU4YWPk2J14i9E3ymBxW+

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\Adwind.jar
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:4384
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:540
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4288

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

      Filesize

      46B

      MD5

      e90f25c1ce5c285ec46513d59f69e56d

      SHA1

      6c5fd98d54344dafee04a421b45ca64810acc1fd

      SHA256

      44a0f86beab3a94d1b0127187e0b1ba93eb45d9b60ece7ad78763e787a43d77e

      SHA512

      c637ed5a8477df3657229f70f1eadd87979ae6097566030af7ba77acd1e6e67059d23ad4382e9315339841be804b6ddd32a59a29bc2e9067e89fbb14cf1ab469

    • memory/4384-4-0x000001D69E940000-0x000001D69F940000-memory.dmp

      Filesize

      16.0MB

    • memory/4384-12-0x000001D69CF00000-0x000001D69CF01000-memory.dmp

      Filesize

      4KB

    • memory/4384-22-0x000001D69E940000-0x000001D69F940000-memory.dmp

      Filesize

      16.0MB

    • memory/4384-26-0x000001D69E940000-0x000001D69F940000-memory.dmp

      Filesize

      16.0MB

    • memory/4384-30-0x000001D69E940000-0x000001D69F940000-memory.dmp

      Filesize

      16.0MB

    • memory/4384-31-0x000001D69E940000-0x000001D69F940000-memory.dmp

      Filesize

      16.0MB

    • memory/4384-32-0x000001D69E940000-0x000001D69F940000-memory.dmp

      Filesize

      16.0MB