Analysis

  • max time kernel
    112s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2024, 12:59

General

  • Target

    uiutils-1.4.4.jar

  • Size

    64KB

  • MD5

    1011014e12992113fe2a6fa4a0e31275

  • SHA1

    4f5c496f50d53da67f8400e1d387cb030f50fa8e

  • SHA256

    5bba3bc56f795e22c7e7b6e54ee3a5c8171f0481905dc44639d05e526dbdd241

  • SHA512

    ff204563d2831e372fb7f61d84a411cd951ec149dfadfaf8620756ba3ab5ce2125abcf8eaba207423ff9d683c6e34b113477dac175ef4d3c93e500c5cb2b0e59

  • SSDEEP

    1536:cER7jMnxXhwH6hNTrBkRlr8m5bbZrLxsCIoMnbxMPSpNy0:cKM7QqNfoz5N1IHl

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\uiutils-1.4.4.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5108
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:400
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2276,i,5697607538120380977,9987005253899555344,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4948
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault1de8fffdh652bh4a1ehba53hc2ff865730b5
      1⤵
        PID:3328

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/5108-2-0x0000021EDC770000-0x0000021EDD770000-memory.dmp

        Filesize

        16.0MB

      • memory/5108-11-0x0000021EDAF10000-0x0000021EDAF11000-memory.dmp

        Filesize

        4KB

      • memory/5108-13-0x0000021EDC770000-0x0000021EDD770000-memory.dmp

        Filesize

        16.0MB