Analysis
-
max time kernel
85s -
max time network
78s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2024 18:54
Static task
static1
Behavioral task
behavioral1
Sample
Adwind.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Adwind.jar
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
Adwind.jar
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
Adwind.jar
Resource
win11-20240221-en
General
-
Target
Adwind.jar
-
Size
5KB
-
MD5
fe537a3346590c04d81d357e3c4be6e8
-
SHA1
b1285f1d8618292e17e490857d1bdf0a79104837
-
SHA256
bbc572cced7c94d63a7208f4aba4ed20d1350bef153b099035a86c95c8d96d4a
-
SHA512
50a5c1ad99ee9f3a540cb30e87ebfdf7561f0a0ee35b3d06c394fa2bad06ca6088a04848ddcb25f449b3c98b89a91d1ba5859f1ed6737119b606968be250c8ce
-
SSDEEP
96:w9fXh7CBF8l1cHRDOjY4YbiPkW7UW1g+dWi9sBSy3HQNm6wx2xC7vz5:GXh78hHRDOU4YWPk2J14i9E3ymBxW+
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4896 icacls.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb java.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1268 wrote to memory of 4896 1268 java.exe 89 PID 1268 wrote to memory of 4896 1268 java.exe 89
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\Adwind.jar1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:4896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5e917fe4470a634f9e09fd0150757fc3b
SHA1c04789bb5010418dcbf0759468981e68a5faf5b8
SHA256bab84f0b3d1cea5c9fff5a47736ffb3fa8269f83dd72a341d993175dc88a4c46
SHA5124f3607d5c628403b30298fe04c5b976911b38c9c2dc79825d520e17ab94a473014826ce97a43961d096a83f40914399843f27594f0636d3be58c153e7cbb325c