Analysis
-
max time kernel
42s -
max time network
39s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
08-03-2024 18:54
Static task
static1
Behavioral task
behavioral1
Sample
Adwind.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Adwind.jar
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
Adwind.jar
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
Adwind.jar
Resource
win11-20240221-en
General
-
Target
Adwind.jar
-
Size
5KB
-
MD5
fe537a3346590c04d81d357e3c4be6e8
-
SHA1
b1285f1d8618292e17e490857d1bdf0a79104837
-
SHA256
bbc572cced7c94d63a7208f4aba4ed20d1350bef153b099035a86c95c8d96d4a
-
SHA512
50a5c1ad99ee9f3a540cb30e87ebfdf7561f0a0ee35b3d06c394fa2bad06ca6088a04848ddcb25f449b3c98b89a91d1ba5859f1ed6737119b606968be250c8ce
-
SSDEEP
96:w9fXh7CBF8l1cHRDOjY4YbiPkW7UW1g+dWi9sBSy3HQNm6wx2xC7vz5:GXh78hHRDOU4YWPk2J14i9E3ymBxW+
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
-
Drops file in Program Files directory 12 IoCs
Processes:
java.exedescription ioc process File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb java.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
java.exedescription pid process target process PID 4384 wrote to memory of 540 4384 java.exe icacls.exe PID 4384 wrote to memory of 540 4384 java.exe icacls.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\Adwind.jar1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:540
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5e90f25c1ce5c285ec46513d59f69e56d
SHA16c5fd98d54344dafee04a421b45ca64810acc1fd
SHA25644a0f86beab3a94d1b0127187e0b1ba93eb45d9b60ece7ad78763e787a43d77e
SHA512c637ed5a8477df3657229f70f1eadd87979ae6097566030af7ba77acd1e6e67059d23ad4382e9315339841be804b6ddd32a59a29bc2e9067e89fbb14cf1ab469