Resubmissions

16-04-2024 20:34

240416-zcl5asde61 10

16-04-2024 17:52

240416-wfp4ksge93 7

Analysis

  • max time kernel
    234s
  • max time network
    302s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-04-2024 20:34

General

  • Target

    payload.jar

  • Size

    28KB

  • MD5

    b504eb2fb8e625e6967e4bccad1088e8

  • SHA1

    9ca5a29c1f66de5367c30854adb9ed173d7a3fed

  • SHA256

    56c93c26d3305315c2c63442163c6f8d22a6c425013bfe9ee0007849a7f8426b

  • SHA512

    c1ec4d9659f1ebc8f7fec8f85f527262856ae5eca5a9e35514b7f16ece703e19e3cdf8fae3830732fe2bfb3fef56fabc6f36487170220af3b96df7c662d64e5e

  • SSDEEP

    768:I+DjklfoxTKo7eI18lhVzEGtD7JkLg7/swgUCQy6xGHr:I4qo4ZE8VKL8m9QZUHr

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\payload.jar
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:3696
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:4228
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1416 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4660

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

      Filesize

      46B

      MD5

      97a49aefa36085b637641eea2ed6d4e4

      SHA1

      535060be8dd9b8b3c830797331125da530bed061

      SHA256

      0227318c0d2761fb02ea39e324b962483c852e48c281515e6699ffc55e143dc3

      SHA512

      7b0c9e80f0f57b3143283bdc15501decf90cddac61eb52e54b4b04fac863372a3ba433e658a2c56eaea88abdbb0a37d93989fec65eeb9750ab170d3823c976be

    • memory/3696-2-0x0000025937620000-0x0000025938620000-memory.dmp

      Filesize

      16.0MB

    • memory/3696-12-0x0000025935FE0000-0x0000025935FE1000-memory.dmp

      Filesize

      4KB

    • memory/3696-19-0x00000259378A0000-0x00000259378B0000-memory.dmp

      Filesize

      64KB

    • memory/3696-20-0x0000025937620000-0x0000025938620000-memory.dmp

      Filesize

      16.0MB

    • memory/3696-21-0x0000025937620000-0x0000025938620000-memory.dmp

      Filesize

      16.0MB