Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/04/2024, 10:50

General

  • Target

    Pambansang Bangko ng Pilipinas #04082024.jar

  • Size

    219KB

  • MD5

    9f402491a7fb92ad00f505b3a2bfa4f9

  • SHA1

    394d058b6d055aa71df8627bb4feba20a3f68ff0

  • SHA256

    94625739d121386b168f555b165c22e2504ab8033fea9abcee6d1ba88fe42ac1

  • SHA512

    c6cf17527af488c368693d84dd61ea62ce1790bb6d1746ae922d3038198f9808674fa340bb1213195b1cc45c64196bb5ff2de3997f32e697d8ca57fef5b5b009

  • SSDEEP

    3072:yWAsPgYGkRFWJkGchS4K0CxQmA98CjlrfigrSYyeoedGNQPKbMAo9FNesOEZL0mD:yEo4Rcvv4K0nmAWCjlGkXoed/n5Co5fr

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar "C:\Users\Admin\AppData\Local\Temp\Pambansang Bangko ng Pilipinas #04082024.jar"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:3076
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:1352

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    8556b247e1466ad193cd9b0efb1ef9e2

    SHA1

    129dfe756e04d8443a87dfaa503faddb1f4ec3bb

    SHA256

    f3390034d21584b1d8e6f501a9b7de0e462b718b16a39e8abf7df2f7df0556fc

    SHA512

    7224e5f765087ea12a71f37eba3ded9f782cbf271287c04f2f79e0fe72ebdd3b72ca067e7230ca671983ba819df48b538b25a81732b57aab196d483fbb042722

  • memory/3076-41-0x000002DFC92F0000-0x000002DFCA2F0000-memory.dmp

    Filesize

    16.0MB

  • memory/3076-12-0x000002DFC7A40000-0x000002DFC7A41000-memory.dmp

    Filesize

    4KB

  • memory/3076-17-0x000002DFC92F0000-0x000002DFCA2F0000-memory.dmp

    Filesize

    16.0MB

  • memory/3076-25-0x000002DFC92F0000-0x000002DFCA2F0000-memory.dmp

    Filesize

    16.0MB

  • memory/3076-37-0x000002DFC92F0000-0x000002DFCA2F0000-memory.dmp

    Filesize

    16.0MB

  • memory/3076-4-0x000002DFC92F0000-0x000002DFCA2F0000-memory.dmp

    Filesize

    16.0MB

  • memory/3076-42-0x000002DFC7A40000-0x000002DFC7A41000-memory.dmp

    Filesize

    4KB

  • memory/3076-44-0x000002DFC7A40000-0x000002DFC7A41000-memory.dmp

    Filesize

    4KB

  • memory/3076-45-0x000002DFC92F0000-0x000002DFCA2F0000-memory.dmp

    Filesize

    16.0MB

  • memory/3076-50-0x000002DFC7A40000-0x000002DFC7A41000-memory.dmp

    Filesize

    4KB

  • memory/3076-53-0x000002DFC7A40000-0x000002DFC7A41000-memory.dmp

    Filesize

    4KB

  • memory/3076-90-0x000002DFC92F0000-0x000002DFCA2F0000-memory.dmp

    Filesize

    16.0MB

  • memory/3076-91-0x000002DFC96F0000-0x000002DFC9700000-memory.dmp

    Filesize

    64KB