Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2024 07:36

General

  • Target

    Telexcopy.pdf.jar

  • Size

    395KB

  • MD5

    81e621517a407ae36da0a767b960c88c

  • SHA1

    421f3489d10b803e2dd64d0b47ce619da2da448a

  • SHA256

    ca438598c383fab834c5e52369032e30c657f8f70cbb095f181ea7779d34bba1

  • SHA512

    cd0510723447c5ace63f4ec9eb1aa0aa7d9d56b70f08b16c92c71b9825351122e59c1b5173e1e7288f59a8d732be122e90be397521f80e71328d743ad172788c

  • SSDEEP

    192:WtZ3hAJtjmbwOqaI55LEOkOYiDiMkCjvDhvLlSIz3v4M3LwsUE+1MB7hikCOrPiH:cZ3hOOJvsEOWGWCjvSmwM7wsTvQMC

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\Telexcopy.pdf.jar
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:5088
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:4616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    317ab3eb3cf2506a1060cc00f9330f70

    SHA1

    606fbe0e5b080005fd59fa2ea6e4c49c04280e34

    SHA256

    9a1a529781ae9821497e2caae2bb027b1c3cd89ef9768d8b6b52a4f0609728ea

    SHA512

    f8cdb259a4aac0139f5c298462ed521cfc0bdc275566ce7adddbbe002d6a06f004eb5d1a31e7d9459bd2dfb1512d2ca12c5a27850f1fdf3d19b64f956eaa1917

  • memory/5088-56-0x000001299A880000-0x000001299A890000-memory.dmp

    Filesize

    64KB

  • memory/5088-64-0x000001299A8F0000-0x000001299A900000-memory.dmp

    Filesize

    64KB

  • memory/5088-55-0x000001299A7E0000-0x000001299A7F0000-memory.dmp

    Filesize

    64KB

  • memory/5088-30-0x000001299A550000-0x000001299B550000-memory.dmp

    Filesize

    16.0MB

  • memory/5088-37-0x000001299A550000-0x000001299B550000-memory.dmp

    Filesize

    16.0MB

  • memory/5088-45-0x000001299A550000-0x000001299B550000-memory.dmp

    Filesize

    16.0MB

  • memory/5088-50-0x000001299A530000-0x000001299A531000-memory.dmp

    Filesize

    4KB

  • memory/5088-53-0x000001299A550000-0x000001299B550000-memory.dmp

    Filesize

    16.0MB

  • memory/5088-21-0x000001299A550000-0x000001299B550000-memory.dmp

    Filesize

    16.0MB

  • memory/5088-12-0x000001299A530000-0x000001299A531000-memory.dmp

    Filesize

    4KB

  • memory/5088-58-0x000001299A8A0000-0x000001299A8B0000-memory.dmp

    Filesize

    64KB

  • memory/5088-57-0x000001299A550000-0x000001299B550000-memory.dmp

    Filesize

    16.0MB

  • memory/5088-60-0x000001299A910000-0x000001299A920000-memory.dmp

    Filesize

    64KB

  • memory/5088-59-0x000001299A8C0000-0x000001299A8D0000-memory.dmp

    Filesize

    64KB

  • memory/5088-61-0x000001299A8B0000-0x000001299A8C0000-memory.dmp

    Filesize

    64KB

  • memory/5088-62-0x000001299A8D0000-0x000001299A8E0000-memory.dmp

    Filesize

    64KB

  • memory/5088-63-0x000001299A8E0000-0x000001299A8F0000-memory.dmp

    Filesize

    64KB

  • memory/5088-65-0x000001299A900000-0x000001299A910000-memory.dmp

    Filesize

    64KB

  • memory/5088-4-0x000001299A550000-0x000001299B550000-memory.dmp

    Filesize

    16.0MB