Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
21/03/2024, 06:26
Behavioral task
behavioral1
Sample
Quotation.jar
Resource
win7-20240220-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
Quotation.jar
Resource
win10v2004-20240226-en
3 signatures
150 seconds
General
-
Target
Quotation.jar
-
Size
178KB
-
MD5
64e3a4b3d5db601ce4d8e204a2e00c87
-
SHA1
2642402b4bc5fdd3623e3887ed96318de57d1187
-
SHA256
5df03f19b8aa32a39b1f91c33ee5f9ae4d2c4027e3f793389ff843c34e073b97
-
SHA512
d3cf8305465bbfe9e5b58b7102871bf86aaf621d462749f17fcd0f727585adb3dcda59bdf60cc13922ce36b544010195c1024273bf0c26bda4ff4e6dcb3f05be
-
SSDEEP
3072:3+KW+iHgY5kQodGjZiyK2X4xBacn451qnYicydLdfixUUGG+pniEY2pNjUgSvy:3+9ngppd0ZWJ451eYicbQ4F24gSq
Score
7/10
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3176 icacls.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb java.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1852 wrote to memory of 3176 1852 java.exe 100 PID 1852 wrote to memory of 3176 1852 java.exe 100
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\Quotation.jar1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4264 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:81⤵PID:1444