Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2024, 05:38
Behavioral task
behavioral1
Sample
dd5d61f70b735816be30a3199d6f2b7e.jar
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
dd5d61f70b735816be30a3199d6f2b7e.jar
Resource
win10v2004-20240226-en
General
-
Target
dd5d61f70b735816be30a3199d6f2b7e.jar
-
Size
107KB
-
MD5
dd5d61f70b735816be30a3199d6f2b7e
-
SHA1
69b2e1cb754fe4f60de05cf2059541976bfaa30f
-
SHA256
8734bd806a05fa2c9eb1deb90f8997ccd36a43c50e25ad5f3182a27d218de8ca
-
SHA512
f4c9d1440538a5e4eb4718217662413d414936732b500ab8b2f201117fa8b0c34e3f6a80815d221c0ac3840b54688b1b3c0d9081daf277aeb40b5c073b12c714
-
SSDEEP
3072:9YJFK8whNIAnBJ74se6TRX2JPtsYHqwmQX2:erKhxnBJMs1TuPFPX2
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4100 icacls.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 544 wrote to memory of 4100 544 java.exe 88 PID 544 wrote to memory of 4100 544 java.exe 88
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\dd5d61f70b735816be30a3199d6f2b7e.jar1⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:4100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5b98ec38ce0b23a34394cabcedb4daab1
SHA14c48c27d58cb055e01c2118be8ea78db6553fd70
SHA256047152cd9900398e32d8e9a1acc656fae5bbd229962d0e3cad280229c6c5d65c
SHA512981c900188a191fd33c0abb3574cc4da08016d3d460061f0478ec2b5fa62ed43658caa439ecd73e69bf37cc915f6f940509ac7c243eb9315e02e93b9b40cab97