Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
19-03-2024 15:56
Static task
static1
Behavioral task
behavioral1
Sample
Order550232.jar
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Order550232.jar
Resource
win10v2004-20240226-en
General
-
Target
Order550232.jar
-
Size
129KB
-
MD5
c91d4750382881ff7da852e22a6f2419
-
SHA1
b916255dfadf02871d0a84083e989df52396e75b
-
SHA256
12eac35e31b525e6257a42f809868ad6203e9ed8c8b07b487a46cfa0ba5ed4d3
-
SHA512
e897cd5a0b05e557d83aa3c3678dcd565cd53737b8d05fe46515e56b7ff229d218c1cc908c57d1dcbf4b5fdd7295d2a44deaff81c76c91c4f7ff1db201266244
-
SSDEEP
3072:jo1lDnmPMoEu8S5IL47n3RervM8+gjkztlabpOex5ruXIbCuo:wKPMoCS5gm3UryusGOexWuo
Malware Config
Signatures
-
Drops startup file 2 IoCs
Processes:
WScript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dqTlpEOTrV.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dqTlpEOTrV.js WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
WScript.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\dqTlpEOTrV.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
java.exewscript.exedescription pid process target process PID 1512 wrote to memory of 2900 1512 java.exe wscript.exe PID 1512 wrote to memory of 2900 1512 java.exe wscript.exe PID 1512 wrote to memory of 2900 1512 java.exe wscript.exe PID 2900 wrote to memory of 2648 2900 wscript.exe WScript.exe PID 2900 wrote to memory of 2648 2900 wscript.exe WScript.exe PID 2900 wrote to memory of 2648 2900 wscript.exe WScript.exe PID 2900 wrote to memory of 2556 2900 wscript.exe javaw.exe PID 2900 wrote to memory of 2556 2900 wscript.exe javaw.exe PID 2900 wrote to memory of 2556 2900 wscript.exe javaw.exe
Processes
-
C:\Windows\system32\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\Order550232.jar1⤵
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\system32\wscript.exewscript C:\Users\Admin\euvrrnhkej.js2⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\dqTlpEOTrV.js"3⤵
- Drops startup file
- Adds Run key to start application
PID:2648
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\rbbdbnesk.txt"3⤵PID:2556
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD53a463dc3f1ccbb255564f73dccca622e
SHA1ab4a88d983c371128c73699cac7e308ca7870f7b
SHA25618c2e58bfb5e035d4c1e4d2ba4e506c8041c739ec32ec9ce80ba00adc4dbd550
SHA512d7a4fdb65d1b5ff1616489e7b893ebab3f1e160c99007a43fc73ada3ec53cc9ddae4c3a6acb6e2852b239de336253064fd838d3f843c09e2ab952dce8e8e2cbe
-
Filesize
92KB
MD52ed25df72bd13cca5979c53b8fe7e529
SHA182b9c61b60f966e1ff77374b7aea67334ae98ef1
SHA25681473eced4690bb6172d677771924cd4a0542c74f00dae2b3493cbebc6b1549c
SHA5123086609e10bb6504ac26fb573874ade44ec446e19ac7d1e059f108dbaf31271617a10addabed41997e400bc885d07ef713054ef2d2246748809740a64c7e90f6
-
Filesize
4KB
MD5c6e6c52a9327633b2942867f13b37f40
SHA1c7b10a202906a8095e7930b38d7df85c64ba429b
SHA2566b9b750f7e004fb7aad99bbde8de1efd0cfa20391edcf4694641d2e3688cc591
SHA512a3036a47447ad8f2e8db1a6c0c57db7abc6fd7f590332ee48307ba1af4202d71cd9807bf6526b498c51ecde646fb7913dfa125f316ba56d20206ae5f8e6bffae