Analysis
-
max time kernel
90s -
max time network
93s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
08-03-2024 18:54
Static task
static1
Behavioral task
behavioral1
Sample
Adwind.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Adwind.jar
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
Adwind.jar
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
Adwind.jar
Resource
win11-20240221-en
General
-
Target
Adwind.jar
-
Size
5KB
-
MD5
fe537a3346590c04d81d357e3c4be6e8
-
SHA1
b1285f1d8618292e17e490857d1bdf0a79104837
-
SHA256
bbc572cced7c94d63a7208f4aba4ed20d1350bef153b099035a86c95c8d96d4a
-
SHA512
50a5c1ad99ee9f3a540cb30e87ebfdf7561f0a0ee35b3d06c394fa2bad06ca6088a04848ddcb25f449b3c98b89a91d1ba5859f1ed6737119b606968be250c8ce
-
SSDEEP
96:w9fXh7CBF8l1cHRDOjY4YbiPkW7UW1g+dWi9sBSy3HQNm6wx2xC7vz5:GXh78hHRDOU4YWPk2J14i9E3ymBxW+
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2380 icacls.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb java.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5100 wrote to memory of 2380 5100 java.exe 77 PID 5100 wrote to memory of 2380 5100 java.exe 77
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\Adwind.jar1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD547e9037412f71066efb3f06aba75ee28
SHA11027b426f73c04481fb3337b766a8084668cc224
SHA25654321caa8f3732a129779b5fff3267f376bec9d1cd676da7ee5873ce15657d7e
SHA5122b822efcd00ac78a999b03ab705e67819a69b1cb99662cdd7b73b62ee74afab70a5859e4373582252ca3fb5e6a0b6ed4e25d44e7c25963c922f8b86a40409d2d