Resubmissions
10/04/2024, 14:09
240410-rglekaae67 110/04/2024, 14:08
240410-rfycqsae35 110/04/2024, 14:05
240410-rd1ebade4z 7Analysis
-
max time kernel
42s -
max time network
61s -
platform
windows11-21h2_x64 -
resource
win11-20240319-en -
resource tags
arch:x64arch:x86image:win11-20240319-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/04/2024, 14:05
Static task
static1
Behavioral task
behavioral1
Sample
FreeVBucks.jar
Resource
win11-20240319-en
General
-
Target
FreeVBucks.jar
-
Size
8KB
-
MD5
beed358e0cd7f27fe71f2d8662344c90
-
SHA1
09b70e97e88dcb75943a5053aafd7ffef063bdc1
-
SHA256
409b2c1120c94dd076b70c97d6d8ecf7d6a07bc5328f2cabf8c77ae5fdd9bfbb
-
SHA512
68f9d2a8b1bdfc7caeae6fdf19bb1f51af3abeba1e4ece2974f7dd280bcfef2d0ac2e780b50910d8908d874427fee616ae71a02e28e2e6b54b50cd6ff01d80b6
-
SSDEEP
192:rGLStammxQZmn46v59kKmqiiNjbbTY63lKxtnsDDXBFCNqrCU:rGCWlBDmTiN//VKPsDD3yqH
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2208 icacls.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1233663403-1277323514-675434005-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3540 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2800 wrote to memory of 2208 2800 java.exe 82 PID 2800 wrote to memory of 2208 2800 java.exe 82
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\FreeVBucks.jar1⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:2208
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5da8b15cb300b5415cb6e1ffeecd28f2c
SHA1614dc754071eede190868349e8eb563c67683796
SHA2567e8292bfe9cb2c6540af536e585344ee8099333c049a5ca583c9497b7ff2c585
SHA5127e39828d19041a71cadd863985c936b73c7384235cc9bc1a42418c7f3a271d5efad737d8481e79eee65fb8c840d0cdb964e53ac2b1404aaebbae02aad8d3d1fb