Resubmissions

16-04-2024 20:34

240416-zcl5asde61 10

16-04-2024 17:52

240416-wfp4ksge93 7

Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-04-2024 17:52

General

  • Target

    payload.jar

  • Size

    28KB

  • MD5

    b504eb2fb8e625e6967e4bccad1088e8

  • SHA1

    9ca5a29c1f66de5367c30854adb9ed173d7a3fed

  • SHA256

    56c93c26d3305315c2c63442163c6f8d22a6c425013bfe9ee0007849a7f8426b

  • SHA512

    c1ec4d9659f1ebc8f7fec8f85f527262856ae5eca5a9e35514b7f16ece703e19e3cdf8fae3830732fe2bfb3fef56fabc6f36487170220af3b96df7c662d64e5e

  • SSDEEP

    768:I+DjklfoxTKo7eI18lhVzEGtD7JkLg7/swgUCQy6xGHr:I4qo4ZE8VKL8m9QZUHr

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\payload.jar
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:4764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    28a7a72a9297cf72e8fbd7ae36bca194

    SHA1

    11691188f6cca9c94f0fd36cb4cb1ad629c4920a

    SHA256

    b9db46dbc5441fae6e08f5c061da2e226ba2587594152193ebaec36870def390

    SHA512

    bd363a2fe60d4abd99800d469295b5dfa146b71c9e3d15c5f19705585dc6c55d57178a600797a7154361109d445d7052e0aefc99effe80b64193a353b1c43f61

  • memory/1512-39-0x0000017ABEC10000-0x0000017ABEC20000-memory.dmp

    Filesize

    64KB

  • memory/1512-37-0x0000017ABEBE0000-0x0000017ABEBF0000-memory.dmp

    Filesize

    64KB

  • memory/1512-20-0x0000017ABE950000-0x0000017ABF950000-memory.dmp

    Filesize

    16.0MB

  • memory/1512-31-0x0000017ABE950000-0x0000017ABF950000-memory.dmp

    Filesize

    16.0MB

  • memory/1512-40-0x0000017ABEC20000-0x0000017ABEC30000-memory.dmp

    Filesize

    64KB

  • memory/1512-38-0x0000017ABEC80000-0x0000017ABEC90000-memory.dmp

    Filesize

    64KB

  • memory/1512-12-0x0000017ABD070000-0x0000017ABD071000-memory.dmp

    Filesize

    4KB

  • memory/1512-4-0x0000017ABE950000-0x0000017ABF950000-memory.dmp

    Filesize

    16.0MB

  • memory/1512-33-0x0000017ABE950000-0x0000017ABF950000-memory.dmp

    Filesize

    16.0MB

  • memory/1512-41-0x0000017ABE950000-0x0000017ABF950000-memory.dmp

    Filesize

    16.0MB

  • memory/1512-42-0x0000017ABEC30000-0x0000017ABEC40000-memory.dmp

    Filesize

    64KB

  • memory/1512-43-0x0000017ABEC40000-0x0000017ABEC50000-memory.dmp

    Filesize

    64KB

  • memory/1512-45-0x0000017ABEC60000-0x0000017ABEC70000-memory.dmp

    Filesize

    64KB

  • memory/1512-44-0x0000017ABEC50000-0x0000017ABEC60000-memory.dmp

    Filesize

    64KB

  • memory/1512-46-0x0000017ABEC70000-0x0000017ABEC80000-memory.dmp

    Filesize

    64KB

  • memory/1512-47-0x0000017ABE950000-0x0000017ABF950000-memory.dmp

    Filesize

    16.0MB