Analysis
-
max time kernel
152s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-03-2024 01:01
Static task
static1
Behavioral task
behavioral1
Sample
bd402a7b48f2b162736f4848c329792c.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bd402a7b48f2b162736f4848c329792c.jar
Resource
win10v2004-20240226-en
General
-
Target
bd402a7b48f2b162736f4848c329792c.jar
-
Size
147KB
-
MD5
bd402a7b48f2b162736f4848c329792c
-
SHA1
fc17278dbfe1e9d65a3b8f2cb8a972017eaf1cc6
-
SHA256
2013959396545e0d1c1a0c178544a778764ff12c4fba9a6637835a202cce979b
-
SHA512
af6d380d7c3cc1540b9aa9c1bf070178f4120b78f6c571e67b43af1a4cd6199c139a2dd7890b03920cc8cfcfa5c2f56f627b553f0cb09ae71ca495bd73cf7ccc
-
SSDEEP
3072:vAnBzB/sfK4/mNwKEoZ/4+TK8tA3uQr+22kj5Duor+rS:oB6K4mSKZC39r+6Duor+G
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TgoIKOyHRJ.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TgoIKOyHRJ.js WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\TgoIKOyHRJ.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2564 2872 java.exe 29 PID 2872 wrote to memory of 2564 2872 java.exe 29 PID 2872 wrote to memory of 2564 2872 java.exe 29 PID 2564 wrote to memory of 2888 2564 wscript.exe 30 PID 2564 wrote to memory of 2888 2564 wscript.exe 30 PID 2564 wrote to memory of 2888 2564 wscript.exe 30 PID 2564 wrote to memory of 2464 2564 wscript.exe 31 PID 2564 wrote to memory of 2464 2564 wscript.exe 31 PID 2564 wrote to memory of 2464 2564 wscript.exe 31
Processes
-
C:\Windows\system32\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\bd402a7b48f2b162736f4848c329792c.jar1⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\system32\wscript.exewscript C:\Users\Admin\_output.js2⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\TgoIKOyHRJ.js"3⤵
- Drops startup file
- Adds Run key to start application
PID:2888
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\tlrewl.txt"3⤵PID:2464
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD50aaca684c1da87000ded508128434e5b
SHA130e1080049ec19161920641b0d51910edb7c72dc
SHA256c2d01245ffb256e95fdd530c1fc85da103714fe8d1996f3cea6cbf5d8e8d1b15
SHA512979fa7dd85f09a1e7f04c5e91f79aba57268361cd0b34dc4c5113f6e56a421565e1241a1bceacf0be3a37eb2601bd8a0285ce861f31b234427f182b71c651e79
-
Filesize
106KB
MD57ee83aef0f72ce7f93452b093d9b34f5
SHA15c68f45173190f62e953bef170f07059cb54d716
SHA256040fe3f3bae7be7e1f180b3852016b6de34497a00e6d50b64a05aa334e74961c
SHA512cb6237b6b1c42e1ac7ba6f7ac69cc1244a20f9e76bca712f699347cc842ec139f2ba0aacfd47f336b458c9d9c5766bed87a3b72591f8ce9dab009909aeedeae7
-
Filesize
228KB
MD5d427936b203e2429e10ac2b1e0cb1263
SHA185a7521899c6c1cd5fe87b54f8cade2c7e108f15
SHA25626a3f7c55fb2661c5136308476b533f0a9081341d7fe4c4fa63f22563170eeca
SHA5122731f349f1598f572a5dc84902db6e4d6614aed89f491374808757593b8e602a3e24c1930465d8b15b451b0b7008903cffbc02e8b67febe664507ef52b61ae05