Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20-03-2024 15:44
Static task
static1
Behavioral task
behavioral1
Sample
d92e4d601fad56e8750ea73e8b0e53d9.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d92e4d601fad56e8750ea73e8b0e53d9.jar
Resource
win10v2004-20240226-en
General
-
Target
d92e4d601fad56e8750ea73e8b0e53d9.jar
-
Size
621KB
-
MD5
d92e4d601fad56e8750ea73e8b0e53d9
-
SHA1
6170d6d322c7b46268d153030b966785217ed982
-
SHA256
56ca8f9b8ac1cb7dab8123ba8b84a067e05527f75ffbe18046b1f12c0ac4db2c
-
SHA512
ef513f88c03031f147599463f4a0cb3e530a01d29db439b542e5c03c4cc35bbbe79bd90c54f5604033cbd8044bcca0d279888c0d37f3cdb1d2c78292ba2c30c5
-
SSDEEP
12288:PpHLHFPoyVTEmJyQH2hXj3v90mju+hrHD9oZ2VzGejfENmCuJJWkBxM0:9LHFPhdEmJzH2llFvhrHGZwnFqSxJ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
Processes:
WScript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HXpBUBTtZF.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HXpBUBTtZF.js WScript.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
WScript.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\HXpBUBTtZF.js\"" WScript.exe -
Drops file in Program Files directory 24 IoCs
Processes:
javaw.exejava.exedescription ioc process File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb java.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\Local Settings wscript.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
java.exepid process 1844 java.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
java.exewscript.exejavaw.exedescription pid process target process PID 4016 wrote to memory of 2016 4016 java.exe icacls.exe PID 4016 wrote to memory of 2016 4016 java.exe icacls.exe PID 4016 wrote to memory of 4212 4016 java.exe wscript.exe PID 4016 wrote to memory of 4212 4016 java.exe wscript.exe PID 4212 wrote to memory of 2500 4212 wscript.exe WScript.exe PID 4212 wrote to memory of 2500 4212 wscript.exe WScript.exe PID 4212 wrote to memory of 1164 4212 wscript.exe javaw.exe PID 4212 wrote to memory of 1164 4212 wscript.exe javaw.exe PID 1164 wrote to memory of 1844 1164 javaw.exe java.exe PID 1164 wrote to memory of 1844 1164 javaw.exe java.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\d92e4d601fad56e8750ea73e8b0e53d9.jar1⤵
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:2016
-
-
C:\Windows\SYSTEM32\wscript.exewscript C:\Users\Admin\gbystgqcic.js2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\HXpBUBTtZF.js"3⤵
- Drops startup file
- Adds Run key to start application
PID:2500
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\qboasqjo.txt"3⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Program Files\Java\jre-1.8\bin\java.exe"C:\Program Files\Java\jre-1.8\bin\java.exe" -jar C:\Users\Admin\AppData\Local\Temp\_0.105551579451586221569121857187342560.class4⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1844
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5f922a10659067e061df2db53b93a7cb0
SHA1e8aa99f30e248730e8a0ffb4a1accec1bb88a349
SHA2563e7abfde9af501d2145da5bf53c6702bbbe0dd8f6313ae846abfb23976737f7a
SHA512007544d4e436e9fc5e31a68660bf650ca088f44d90ba6c3d6a4aeb8f33a7ea6f61f017a1b574032adfe603dddeabe46939b5673f01cf5f8738b451896e2f2b44
-
Filesize
46B
MD5b76ef443d0f75d94468e98a9d0d082e4
SHA1f5724fa1ca1aba83ee0d35166020ac28041d2721
SHA256f81fba2008f6aa97f95ed6ea7891b269d0302b9b5e4c30eea10a82095e7760c1
SHA5123ab559518049f6e21a84c8044b2a578ab86b212ec7ac5241b4e1580954e0aaa5aa51c919b7f83cd8c51d6bc0fa40caae80bf7d54c730be09b99702ef1a42efb9
-
Filesize
241KB
MD5781fb531354d6f291f1ccab48da6d39f
SHA19ce4518ebcb5be6d1f0b5477fa00c26860fe9a68
SHA25697d585b6aff62fb4e43e7e6a5f816dcd7a14be11a88b109a9ba9e8cd4c456eb9
SHA5123e6630f5feb4a3eb1dac7e9125ce14b1a2a45d7415cf44cea42bc51b2a9aa37169ee4a4c36c888c8f2696e7d6e298e2ad7b2f4c22868aaa5948210eb7db220d8
-
Filesize
11KB
MD5150efb51ec05bc4a9bbb525397f5f741
SHA1be85f05d5a074fa98232cf993fc6f5a7dac9f880
SHA256b97357a2422085a44feea1491f88a44e3a9080cef0330a70b6d9cc0f0ed3cd19
SHA512e45f7012eb013e53b9a49e239bf7c07a81a08587501674fdb0e6f048edfa904b01138da374ce51b131f1bda952761cc64e317fe453e76d8cf099868a4ad301e5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3045580317-3728985860-206385570-1000\83aa4cc77f591dfc2374580bbd95f6ba_2d983147-f9f1-498d-be7e-1997eada874a
Filesize45B
MD5c8366ae350e7019aefc9d1e6e6a498c6
SHA15731d8a3e6568a5f2dfbbc87e3db9637df280b61
SHA25611e6aca8e682c046c83b721eeb5c72c5ef03cb5936c60df6f4993511ddc61238
SHA51233c980d5a638bfc791de291ebf4b6d263b384247ab27f261a54025108f2f85374b579a026e545f81395736dd40fa4696f2163ca17640dd47f1c42bc9971b18cd
-
Filesize
473KB
MD5ca4cf45e9499c04f77d54212bb0805c0
SHA1296688e7207ddbdd7f0e5096ae9c1993b5ff130b
SHA256f8255759c5da02e9b0de11ea93f90f14fc34bb8cd839ff7c4a53a86438b11344
SHA51290075be1e95bacdb020504304b79cc1e2fca3eadcffd87d00c16d95ce93922e3b1835b93d0f91874dcfb3dd17b8dafad65c3a258bd95a0e05a237cd4f1691d0b
-
Filesize
905KB
MD5b66fe74731233f91d26f03d3ac6c0fe3
SHA1450a3eb0ec332e643658bc6a8a5a94fb4b0f41b9
SHA256877d4d148ddd634c30c781a9da721cec54f83c1cec9ff7995f94ad100c2aedd8
SHA512c63c7eba2692232e4f8a84f2a6945adcf24187ff3d9ec8f7be29e51b3c2ff3c710b3d2cc6604434c2a6359801301e6fb5fb0f33b0fe1848d1c7d73bdc6f019c5