Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
21-03-2024 17:54
Static task
static1
Behavioral task
behavioral1
Sample
dc4097eadf7729f28635a6b37f9c2c74.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dc4097eadf7729f28635a6b37f9c2c74.jar
Resource
win10v2004-20240226-en
General
-
Target
dc4097eadf7729f28635a6b37f9c2c74.jar
-
Size
128KB
-
MD5
dc4097eadf7729f28635a6b37f9c2c74
-
SHA1
78e690f2642201cbb7a9a77075ed616a80118e84
-
SHA256
16feda82f86ae7863bd19b0d893b737578206810a0e4366b45150b2c48aa73f4
-
SHA512
f0212dd3372bf676a666b7af33f78270cd7ef9c958e24f218d1ecab7b4ebfcc8399c03b962509846d9ff3d8ffd074009d23dd3fe425e6aa4c6985942dc6eed8e
-
SSDEEP
3072:IQyD+j9CG5q5TkzxA94o4XjobqedHHrvR+kG4mbjLHW0t/Vdjqa:IQoY9t5mTuxA9gj3edHHrv0bjLHW0t/5
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\otOJexNvvn.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\otOJexNvvn.js WScript.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2344 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\otOJexNvvn.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings wscript.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4636 wrote to memory of 2344 4636 java.exe 104 PID 4636 wrote to memory of 2344 4636 java.exe 104 PID 4636 wrote to memory of 1336 4636 java.exe 107 PID 4636 wrote to memory of 1336 4636 java.exe 107 PID 1336 wrote to memory of 1256 1336 wscript.exe 109 PID 1336 wrote to memory of 1256 1336 wscript.exe 109 PID 1336 wrote to memory of 4332 1336 wscript.exe 110 PID 1336 wrote to memory of 4332 1336 wscript.exe 110
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\dc4097eadf7729f28635a6b37f9c2c74.jar1⤵
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:2344
-
-
C:\Windows\SYSTEM32\wscript.exewscript C:\Users\Admin\[output].js2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\otOJexNvvn.js"3⤵
- Drops startup file
- Adds Run key to start application
PID:1256
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\kasvkabzt.txt"3⤵PID:4332
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:81⤵PID:5020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5fb7089e01e1d2bd267970426b9bd5014
SHA1a1809175380a3a4cb2e80314f23c37a88d850cbf
SHA25677893801681450e4067547ad29ee4a32848da4b0af382a1dc291562cdce213af
SHA51298da8227c8845f0cc8281b3bb143b76eb06a051db38fd9a4fc64f5c542a6d1bb5f824d70d7865afc5b889a6be05e6bcbe76c887b3c2c2825c07751f7c90fbacc
-
Filesize
92KB
MD506f61cd3d0cdf9257fcdac6483d4c1ba
SHA1f4eec20fdbc68dbdd8bb5fd1dfecd918b099ef2f
SHA256424ba40767618afade696d3714c1ba1960ff91e3bc1658fa510cd2332baf2a2f
SHA5129aa7d19fb9999d0414d2399e14ccf43b66cbd6a1bf54be6538b6a0a9e9ac096bdc065a43e4d776ed5cd01a14562446fcd535979b0756781e132e13b27b575657
-
Filesize
9KB
MD5730e1246285921eac566caa6a0c9b663
SHA12e508ef96d92608971061ff76b520f141a049e78
SHA256aba5bc2432ee098aa4a30e4310ee1a300db7bb28dd4220ebc47f17aed7a17413
SHA5120524474a34a89b4eafb375567b82229f0551e5aedc5ba8b9475397d395370ec84499ff7bcd1dd0698e5ea7300a27560eaeec0824ebc3edc49267326ee843b281
-
Filesize
200KB
MD59da6b45d17e4c0ef80df356e1a7e6bdf
SHA15bf501a2ce339671a28d1ecea943c5bb817962b6
SHA2561d61ac748d5d297ca8fa771d12a1c79626c6e2c217a8a349b4ade54c09ae589b
SHA512f4249a1bc09eff66e058a736cbae688c6f7a56391f0fdaaca0056a94098442761e12022c10870a8a5cac99d6af51daab747244bb4dfbc33a89fef1f74f12a788