Analysis

  • max time kernel
    1383s
  • max time network
    1162s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    14-03-2024 10:38

General

  • Target

    mods/lazydfu-0.1.3.jar

  • Size

    14KB

  • MD5

    b36e83f424c5bb5100a3e8ffea0c6ce7

  • SHA1

    0dfa8b03ed408fb7fdada29e01cfebba02af1049

  • SHA256

    4f3b77273b57d019a8db58371e63e4426557c1bb7c9cc10536a03972122778c8

  • SHA512

    dc3766352c645f6da92b13000dffa80584ee58093c925c2154eb3c125a2b2f9a3af298202e2658b039c6ee41e81ca9a2e9d4b942561f7085239dd4421e0cce0a

  • SSDEEP

    384:rPycW1nAR9momphuoeQp6MP+d1GgcQoeO4GG:rPycmAR9N0uod8MPksgNJl

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\mods\lazydfu-0.1.3.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:1304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    28324ac9937cf510f145b2806de65862

    SHA1

    c09503361e51228bfd324743e3a2605222885e93

    SHA256

    4768cfee30895dd7527a1db473fb31b5d4c38ccb893d2af6880ccc118a7ac414

    SHA512

    20e87f4ed6b1622569914892a9c82375a6ec780ab8ba25ca64562d0c742df7f749075d275839baf42297397c5f5be2d51113596cb89cd425a90cd81490a91c4f

  • memory/2744-4-0x000002E684640000-0x000002E685640000-memory.dmp

    Filesize

    16.0MB

  • memory/2744-12-0x000002E684620000-0x000002E684621000-memory.dmp

    Filesize

    4KB

  • memory/2744-13-0x000002E684640000-0x000002E685640000-memory.dmp

    Filesize

    16.0MB