Analysis

  • max time kernel
    42s
  • max time network
    42s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/04/2024, 07:00

General

  • Target

    BurpLoaderKeygen.jar

  • Size

    30KB

  • MD5

    3046c470e2d186fcb6adbce1fc0611a6

  • SHA1

    af1677a5ba92f731b3e15efb0eae6e025d9c262c

  • SHA256

    2c8c7b95640f31985f83580402f26a06b78c55877fa33ef1f9d14d2ebb2d8ecd

  • SHA512

    3f94a09b295e4524309da4edb58c02ebb43f556f656f81aa806d56e5b18928a4e504d6777ef20a813c70c948fac4aecbe562f028aab7f7435bf6fedf31415639

  • SSDEEP

    768:IcLie6lfEKyYS8izs8tyPAR8NY/LJSRMXql9Gkt4:xLie6lfEKyYSwwNYU96Y

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\BurpLoaderKeygen.jar
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4436
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:3804
    • C:\Program Files\Java\jre-1.8\bin\java.exe
      "C:\Program Files\Java\jre-1.8\bin\java.exe" -version
      2⤵
        PID:2832

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

            Filesize

            46B

            MD5

            a397a6e99d40544bbc7e6cae5bffa15e

            SHA1

            841cdf4dbad5e859b9790901f90cb7845e60bf53

            SHA256

            675d22acfce405dcee5d1229ef669395ac1082d801ef2dee69e14de972306ac1

            SHA512

            f0ac15a8a5f1e112f8fb11bdb22a6b637100599d004b130e3a19bcae9a9d6675a78446ae5c736065cf8bb552a9b7bc61bb2750cf078748d84dc1bedb88d68bdb

          • memory/2832-45-0x0000020BE2A90000-0x0000020BE2A91000-memory.dmp

            Filesize

            4KB

          • memory/2832-52-0x0000020BE2AB0000-0x0000020BE2D20000-memory.dmp

            Filesize

            2.4MB

          • memory/4436-29-0x0000022763470000-0x0000022764470000-memory.dmp

            Filesize

            16.0MB

          • memory/4436-4-0x0000022763470000-0x0000022764470000-memory.dmp

            Filesize

            16.0MB

          • memory/4436-36-0x0000022763470000-0x0000022764470000-memory.dmp

            Filesize

            16.0MB

          • memory/4436-19-0x0000022763470000-0x0000022764470000-memory.dmp

            Filesize

            16.0MB

          • memory/4436-51-0x0000022763470000-0x0000022764470000-memory.dmp

            Filesize

            16.0MB

          • memory/4436-17-0x0000022763450000-0x0000022763451000-memory.dmp

            Filesize

            4KB

          • memory/4436-56-0x00000227636F0000-0x0000022763700000-memory.dmp

            Filesize

            64KB

          • memory/4436-57-0x0000022763770000-0x0000022763780000-memory.dmp

            Filesize

            64KB

          • memory/4436-58-0x0000022763470000-0x0000022764470000-memory.dmp

            Filesize

            16.0MB

          • memory/4436-59-0x0000022763780000-0x0000022763790000-memory.dmp

            Filesize

            64KB

          • memory/4436-60-0x0000022763750000-0x0000022763760000-memory.dmp

            Filesize

            64KB

          • memory/4436-61-0x0000022763760000-0x0000022763770000-memory.dmp

            Filesize

            64KB

          • memory/4436-62-0x0000022763470000-0x0000022764470000-memory.dmp

            Filesize

            16.0MB