Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/03/2024, 02:00

General

  • Target

    88a9b4cfac5ba3a433942f8f4e489229f0fd694a7f9a78a8b6ca5cc5dc590e00.jar

  • Size

    109KB

  • MD5

    ee75fce2158c3587daa560419f122001

  • SHA1

    760d09adceeb4903db4130ef0d28654915844d5d

  • SHA256

    88a9b4cfac5ba3a433942f8f4e489229f0fd694a7f9a78a8b6ca5cc5dc590e00

  • SHA512

    c1a4ce9bf70ced9adee8f2955573e65777bc3e4151dacca076502cbd8cb8af9ceb5735cfed73e2bb9d8617961a3862ef94f440d25ab9f948407705b1a88d4229

  • SSDEEP

    3072:QOOwYuveeNu/6Xy8HZknOZ6Xdbx9kkTrxZKXZnmVOEvIT:KwdveeoiXy8Cny6Nbx9nrxZKJtEvS

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\88a9b4cfac5ba3a433942f8f4e489229f0fd694a7f9a78a8b6ca5cc5dc590e00.jar
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:4872
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:3104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    d6cf80cae4663d37ea4ed9329412c77d

    SHA1

    8bf3788da1b3483289bfb8916a6d86678fb09f14

    SHA256

    9b268e479b343c30d9483566655b239788c8ad18cb5a2c650598f996e23b725a

    SHA512

    7c80a335a3ac662eaf6f8ebfc7b42faea2bb1db968e65fcd9eed775114657a52fcfd6f22472ab231b3aefb636fe210763fd0c97c3471eb24c61ca6146087f768

  • memory/4872-43-0x00000229A1430000-0x00000229A1440000-memory.dmp

    Filesize

    64KB

  • memory/4872-44-0x00000229A1440000-0x00000229A1450000-memory.dmp

    Filesize

    64KB

  • memory/4872-14-0x000002299F950000-0x000002299F951000-memory.dmp

    Filesize

    4KB

  • memory/4872-4-0x00000229A1170000-0x00000229A2170000-memory.dmp

    Filesize

    16.0MB

  • memory/4872-28-0x000002299F950000-0x000002299F951000-memory.dmp

    Filesize

    4KB

  • memory/4872-33-0x00000229A1170000-0x00000229A2170000-memory.dmp

    Filesize

    16.0MB

  • memory/4872-40-0x00000229A13F0000-0x00000229A1400000-memory.dmp

    Filesize

    64KB

  • memory/4872-41-0x00000229A1460000-0x00000229A1470000-memory.dmp

    Filesize

    64KB

  • memory/4872-12-0x000002299F950000-0x000002299F951000-memory.dmp

    Filesize

    4KB

  • memory/4872-42-0x00000229A1420000-0x00000229A1430000-memory.dmp

    Filesize

    64KB

  • memory/4872-20-0x00000229A1170000-0x00000229A2170000-memory.dmp

    Filesize

    16.0MB

  • memory/4872-45-0x00000229A1450000-0x00000229A1460000-memory.dmp

    Filesize

    64KB

  • memory/4872-46-0x00000229A1470000-0x00000229A1480000-memory.dmp

    Filesize

    64KB

  • memory/4872-48-0x00000229A1170000-0x00000229A2170000-memory.dmp

    Filesize

    16.0MB

  • memory/4872-47-0x00000229A1480000-0x00000229A1490000-memory.dmp

    Filesize

    64KB

  • memory/4872-49-0x00000229A1490000-0x00000229A14A0000-memory.dmp

    Filesize

    64KB

  • memory/4872-50-0x00000229A14A0000-0x00000229A14B0000-memory.dmp

    Filesize

    64KB

  • memory/4872-51-0x00000229A14B0000-0x00000229A14C0000-memory.dmp

    Filesize

    64KB

  • memory/4872-52-0x00000229A1170000-0x00000229A2170000-memory.dmp

    Filesize

    16.0MB