Analysis
-
max time kernel
42s -
max time network
42s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2024, 07:00
Static task
static1
Behavioral task
behavioral1
Sample
BurpLoaderKeygen.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
BurpLoaderKeygen.jar
Resource
win10v2004-20240412-en
General
-
Target
BurpLoaderKeygen.jar
-
Size
30KB
-
MD5
3046c470e2d186fcb6adbce1fc0611a6
-
SHA1
af1677a5ba92f731b3e15efb0eae6e025d9c262c
-
SHA256
2c8c7b95640f31985f83580402f26a06b78c55877fa33ef1f9d14d2ebb2d8ecd
-
SHA512
3f94a09b295e4524309da4edb58c02ebb43f556f656f81aa806d56e5b18928a4e504d6777ef20a813c70c948fac4aecbe562f028aab7f7435bf6fedf31415639
-
SSDEEP
768:IcLie6lfEKyYS8izs8tyPAR8NY/LJSRMXql9Gkt4:xLie6lfEKyYSwwNYU96Y
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3804 icacls.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb java.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4436 java.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4436 wrote to memory of 3804 4436 java.exe 90 PID 4436 wrote to memory of 3804 4436 java.exe 90 PID 4436 wrote to memory of 2832 4436 java.exe 94 PID 4436 wrote to memory of 2832 4436 java.exe 94
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\BurpLoaderKeygen.jar1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:3804
-
-
C:\Program Files\Java\jre-1.8\bin\java.exe"C:\Program Files\Java\jre-1.8\bin\java.exe" -version2⤵PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5a397a6e99d40544bbc7e6cae5bffa15e
SHA1841cdf4dbad5e859b9790901f90cb7845e60bf53
SHA256675d22acfce405dcee5d1229ef669395ac1082d801ef2dee69e14de972306ac1
SHA512f0ac15a8a5f1e112f8fb11bdb22a6b637100599d004b130e3a19bcae9a9d6675a78446ae5c736065cf8bb552a9b7bc61bb2750cf078748d84dc1bedb88d68bdb