Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-03-2024 17:54
Static task
static1
Behavioral task
behavioral1
Sample
dc4097eadf7729f28635a6b37f9c2c74.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dc4097eadf7729f28635a6b37f9c2c74.jar
Resource
win10v2004-20240226-en
General
-
Target
dc4097eadf7729f28635a6b37f9c2c74.jar
-
Size
128KB
-
MD5
dc4097eadf7729f28635a6b37f9c2c74
-
SHA1
78e690f2642201cbb7a9a77075ed616a80118e84
-
SHA256
16feda82f86ae7863bd19b0d893b737578206810a0e4366b45150b2c48aa73f4
-
SHA512
f0212dd3372bf676a666b7af33f78270cd7ef9c958e24f218d1ecab7b4ebfcc8399c03b962509846d9ff3d8ffd074009d23dd3fe425e6aa4c6985942dc6eed8e
-
SSDEEP
3072:IQyD+j9CG5q5TkzxA94o4XjobqedHHrvR+kG4mbjLHW0t/Vdjqa:IQoY9t5mTuxA9gj3edHHrv0bjLHW0t/5
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\otOJexNvvn.js WScript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\otOJexNvvn.js WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\otOJexNvvn.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1504 wrote to memory of 2560 1504 java.exe 29 PID 1504 wrote to memory of 2560 1504 java.exe 29 PID 1504 wrote to memory of 2560 1504 java.exe 29 PID 2560 wrote to memory of 2708 2560 wscript.exe 30 PID 2560 wrote to memory of 2708 2560 wscript.exe 30 PID 2560 wrote to memory of 2708 2560 wscript.exe 30 PID 2560 wrote to memory of 2628 2560 wscript.exe 31 PID 2560 wrote to memory of 2628 2560 wscript.exe 31 PID 2560 wrote to memory of 2628 2560 wscript.exe 31
Processes
-
C:\Windows\system32\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\dc4097eadf7729f28635a6b37f9c2c74.jar1⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\system32\wscript.exewscript C:\Users\Admin\[output].js2⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\otOJexNvvn.js"3⤵
- Drops startup file
- Adds Run key to start application
PID:2708
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\ljinudtpcf.txt"3⤵PID:2628
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD506f61cd3d0cdf9257fcdac6483d4c1ba
SHA1f4eec20fdbc68dbdd8bb5fd1dfecd918b099ef2f
SHA256424ba40767618afade696d3714c1ba1960ff91e3bc1658fa510cd2332baf2a2f
SHA5129aa7d19fb9999d0414d2399e14ccf43b66cbd6a1bf54be6538b6a0a9e9ac096bdc065a43e4d776ed5cd01a14562446fcd535979b0756781e132e13b27b575657
-
Filesize
9KB
MD5730e1246285921eac566caa6a0c9b663
SHA12e508ef96d92608971061ff76b520f141a049e78
SHA256aba5bc2432ee098aa4a30e4310ee1a300db7bb28dd4220ebc47f17aed7a17413
SHA5120524474a34a89b4eafb375567b82229f0551e5aedc5ba8b9475397d395370ec84499ff7bcd1dd0698e5ea7300a27560eaeec0824ebc3edc49267326ee843b281
-
Filesize
200KB
MD59da6b45d17e4c0ef80df356e1a7e6bdf
SHA15bf501a2ce339671a28d1ecea943c5bb817962b6
SHA2561d61ac748d5d297ca8fa771d12a1c79626c6e2c217a8a349b4ade54c09ae589b
SHA512f4249a1bc09eff66e058a736cbae688c6f7a56391f0fdaaca0056a94098442761e12022c10870a8a5cac99d6af51daab747244bb4dfbc33a89fef1f74f12a788