Resubmissions
09/03/2024, 17:29
240309-v2jy1sea4s 709/03/2024, 17:23
240309-vyak6sdh21 726/02/2024, 21:20
240226-z6s5psgc46 726/02/2024, 21:17
240226-z5ekxsgb92 126/02/2024, 16:16
240226-tq25saag6y 426/02/2024, 13:40
240226-qyrr8sfb55 626/02/2024, 13:39
240226-qybe9afb43 726/02/2024, 13:02
240226-p9re6sef2t 7Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 17:23
Static task
static1
Behavioral task
behavioral1
Sample
243cab240e3f8d1af533c6351d561673/243cab240e3f8d1af533c6351d561673.jar
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
3a7580f58ed0a0a8a107dece6874b773/jquery.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
58aef9490f1b8a03e1a63d9265026b4c/58aef9490f1b8a03e1a63d9265026b4c.jar
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
5b5e824f06c05df04d1edd31e5e3ee48/5b5e824f06c05df04d1edd31e5e3ee48.jar
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
c90447b39942d5f1bfd8c93e1176135f/c90447b39942d5f1bfd8c93e1176135f.jar
Resource
win10v2004-20240226-en
General
-
Target
58aef9490f1b8a03e1a63d9265026b4c/58aef9490f1b8a03e1a63d9265026b4c.jar
-
Size
2.7MB
-
MD5
5c51ac1933f63fc62fb457c36f543f41
-
SHA1
16aa9583c72bbb04a66fde6ee92f438256e44ce2
-
SHA256
08b4ac714cd98b32f5b94e2b7ece8fc01bf37a53b495efc7d172e299289121d4
-
SHA512
c30434b3324d4f5735363cef29ae2dc4172e8fa5f1469f68c284112649fb7823619b8683efb3558897df31f929b141378c69fcbe881788eac569ff3003279386
-
SSDEEP
49152:FiEsQjU+vPR6Hzpty/GlUbLJ35aVoPaC+L5hCUCnoiwSwU1JgPWLIOoS:FiFQj9cHHVGbLR5h+L3CUCnoiZN1mPW9
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4728 icacls.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1612 wrote to memory of 4728 1612 java.exe 90 PID 1612 wrote to memory of 4728 1612 java.exe 90
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\58aef9490f1b8a03e1a63d9265026b4c\58aef9490f1b8a03e1a63d9265026b4c.jar1⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:4728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5f9219b2a7aa8f4aafc91ed401fc7d320
SHA12fc109167b169c33e9787e925c6255a2be74beb5
SHA256576a64a3fcf47c20271e8c87cf8a07c6a6f99fbf4d5bbcd8bafdb78ef7f6eb31
SHA512e368bbe605dff7c4b6288c37e5a14ec4822cc54ba972b15bda3694557d08287adc2b7fbe13953f764074ebf6ddc9925d46625f68c344eeba5fb065811009a4a2