Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2024, 10:50
Behavioral task
behavioral1
Sample
Pambansang Bangko ng Pilipinas #04082024.jar
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Pambansang Bangko ng Pilipinas #04082024.jar
Resource
win10v2004-20240226-en
General
-
Target
Pambansang Bangko ng Pilipinas #04082024.jar
-
Size
219KB
-
MD5
9f402491a7fb92ad00f505b3a2bfa4f9
-
SHA1
394d058b6d055aa71df8627bb4feba20a3f68ff0
-
SHA256
94625739d121386b168f555b165c22e2504ab8033fea9abcee6d1ba88fe42ac1
-
SHA512
c6cf17527af488c368693d84dd61ea62ce1790bb6d1746ae922d3038198f9808674fa340bb1213195b1cc45c64196bb5ff2de3997f32e697d8ca57fef5b5b009
-
SSDEEP
3072:yWAsPgYGkRFWJkGchS4K0CxQmA98CjlrfigrSYyeoedGNQPKbMAo9FNesOEZL0mD:yEo4Rcvv4K0nmAWCjlGkXoed/n5Co5fr
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1352 icacls.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb java.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3076 wrote to memory of 1352 3076 java.exe 88 PID 3076 wrote to memory of 1352 3076 java.exe 88
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\Pambansang Bangko ng Pilipinas #04082024.jar"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:1352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD58556b247e1466ad193cd9b0efb1ef9e2
SHA1129dfe756e04d8443a87dfaa503faddb1f4ec3bb
SHA256f3390034d21584b1d8e6f501a9b7de0e462b718b16a39e8abf7df2f7df0556fc
SHA5127224e5f765087ea12a71f37eba3ded9f782cbf271287c04f2f79e0fe72ebdd3b72ca067e7230ca671983ba819df48b538b25a81732b57aab196d483fbb042722