Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 00:32
Static task
static1
Behavioral task
behavioral1
Sample
c20078b2f678fb08a504d5c84e9ed234.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c20078b2f678fb08a504d5c84e9ed234.jar
Resource
win10v2004-20240226-en
General
-
Target
c20078b2f678fb08a504d5c84e9ed234.jar
-
Size
3KB
-
MD5
c20078b2f678fb08a504d5c84e9ed234
-
SHA1
edc3900dbb83a94f32e06b7253b7a39df99b77c2
-
SHA256
e79c2c04c0d148852a9e0cd2b071f569c6151dfc75a7b7ccd3b27e0a74b52632
-
SHA512
4a56bb35587270e0ae7edb10c37e153bfe487ec2b4b182d3af46cc63cd455b6d352039a5f5ed6d424f3ca69aafe9f30854620c2da87be6ec532141447b1ae9b0
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1660 icacls.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3528 wrote to memory of 1660 3528 java.exe 90 PID 3528 wrote to memory of 1660 3528 java.exe 90
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\c20078b2f678fb08a504d5c84e9ed234.jar1⤵
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:1660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5ea52cea040b7c4bebbe25e62218335dd
SHA1c9cabec09997e86ba250845ffa0ea67274f80782
SHA256dfb67689fff103bb1c20a57486fb4e405790793dedfc8a73fb4afc75dc804513
SHA5125214b9fb8ff409ef850290775fcf414fd47cd8ff591ee95d4fe1f73d687aebd90d3dccee316b190acef9dae2a8c8dbfb88ac946546c3fef95dd6c820f34f491f