Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20-03-2024 06:59
Static task
static1
Behavioral task
behavioral1
Sample
d82b9d7af67f2ade0c11bfe6bfd69544.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d82b9d7af67f2ade0c11bfe6bfd69544.jar
Resource
win10v2004-20240226-en
General
-
Target
d82b9d7af67f2ade0c11bfe6bfd69544.jar
-
Size
129KB
-
MD5
d82b9d7af67f2ade0c11bfe6bfd69544
-
SHA1
051c9770aebcc850ae09baa6a223848a7aa3f289
-
SHA256
ae33e9f2e18d4fdd25db5bc30b8b8bdd63b53794e225dbe818ebe65a29b0dc95
-
SHA512
fbfc1943e95be1d5c9a536e2aa9267b188eb81e9c9445074c2b69d01f7d092c0d1590e15c8579da0c6ab1ba97e1767cd5a2984a1eb6e08611df3fec5764dc555
-
SSDEEP
3072:PdaZuzVCyUNstfAQyHuAYWgPNr6K5V3I/Iy7+itIlhGDbmC:PNIsNyH/LgPNrPH4/I7jhGDb
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
Processes:
WScript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DGjEIUIodz.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DGjEIUIodz.js WScript.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
WScript.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\DGjEIUIodz.js\"" WScript.exe -
Drops file in Program Files directory 12 IoCs
Processes:
javaw.exedescription ioc process File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb javaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings wscript.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
java.exewscript.exedescription pid process target process PID 3896 wrote to memory of 4376 3896 java.exe icacls.exe PID 3896 wrote to memory of 4376 3896 java.exe icacls.exe PID 3896 wrote to memory of 1476 3896 java.exe wscript.exe PID 3896 wrote to memory of 1476 3896 java.exe wscript.exe PID 1476 wrote to memory of 3164 1476 wscript.exe WScript.exe PID 1476 wrote to memory of 3164 1476 wscript.exe WScript.exe PID 1476 wrote to memory of 4628 1476 wscript.exe javaw.exe PID 1476 wrote to memory of 4628 1476 wscript.exe javaw.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\d82b9d7af67f2ade0c11bfe6bfd69544.jar1⤵
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:4376
-
-
C:\Windows\SYSTEM32\wscript.exewscript C:\Users\Admin\exohdopokf.js2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\DGjEIUIodz.js"3⤵
- Drops startup file
- Adds Run key to start application
PID:3164
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\yicpbfyb.txt"3⤵
- Drops file in Program Files directory
PID:4628
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5b4554e405bc25dd07c7023354ec13a2e
SHA18382813277367910f1043a7475f153614dc1aae0
SHA25624f7d7e2fb654e747034f6a2ce8a713473d2d8c95eb27638461e00b7634a845c
SHA51267419b066e0cf15f0e62c7984f1c966098bdf7e8f2859ba186dbf9e04b3b0dcc5d7469e19b46be0fed0fe3375ae2075194faacbbb17017ea4197ce7b719f9505
-
Filesize
10KB
MD5f38989cc8aaa486a1d20937d3364715c
SHA133dd1be185eba1eb4a6c52182c3df3f53ca6e9a5
SHA256e582d7660be65f8dcfc39688ea515022baaa734b5fb336e7f2a1e4e19071b4d5
SHA512c619a61774708eb36cf96b634221dad4d72f0fc5f820866508b0540415ee436b9fcb7779795d7a8f7096f68296e41088d650134c1b67f3a77105a31f9026ed0a
-
Filesize
92KB
MD5af3ce0807ad734c6e6b2f35d7ddf06ad
SHA18b771d227019e07a077aaed04d5f1016ed37cb95
SHA256a586c03463ca23ecb682d1505492ce375e63f3d7bd26cc12272e716a3f0016d3
SHA512771e3d25082b3d55e10f42008d363a08756ab437f1c7880911f18d73457e5a8aa599eb6dce52c854955faded427ff17c5a37d755c70304a05eff3f0e7eeadd08
-
Filesize
207KB
MD5b8722654a1ef8fcfebf490bce2492392
SHA17669dfc5f9bf91b3231fe30cb052adeb60e5f749
SHA25687d6eb8714fe79b95f2f74649cd2fef28e9d57e4c4e990d7ac0f0f6281b978f8
SHA5122ceff57cdf708ebe9c4b3735589045730178bf9914bcebef478c5ec8fa14fcd879c71c5543c7b90faff71f70ed477f1376e070785e2d3bbe52f11397aaec1846