Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 20:45
Static task
static1
Behavioral task
behavioral1
Sample
RisePatcher_v3.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
RisePatcher_v3.jar
Resource
win10v2004-20240412-en
General
-
Target
RisePatcher_v3.jar
-
Size
1.3MB
-
MD5
82a696b63d34263ac938a5e7d90cdd1a
-
SHA1
d239a21be170756adfe64ef65f003feee2d2ac7d
-
SHA256
f3bc19761b0871584597e938112ece267beae7d530a2df283d0aa70589830a5c
-
SHA512
95230f09d5a664a20af6e43048934cecc06803783f138971f0cd94a2bcf5e0187127e54c2e8bc3ebb40c6ccf532a3330a9291c08c63b975df369e4206c624414
-
SSDEEP
24576:6VLAg6jGaPalpB/Q/0zszXemaDVZzopqXpYugIzjUQDbSZF8A5LZuCs/knebewrv:MLAg8GaPUQszszXemaDwncYsai4ZuCsZ
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3756 icacls.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2928 wrote to memory of 3756 2928 java.exe 86 PID 2928 wrote to memory of 3756 2928 java.exe 86
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\RisePatcher_v3.jar1⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:3756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5509e7df4d9fc8350eaffc5579684a740
SHA12f7b17b7ae92d1f11632dd7d6cdfc3744c525634
SHA256e940cf87e53e31380f1a761dceb9b45dfc8c29ada4165df72abcf9487778c7dc
SHA512034fb71d8197a488863456d38735716cc1e2c9a8345bf24c1209ec8cc620f87e84807f2c98129486d2949a01c335221e763cf73ae8f29815ef29a240c31dda1f