Analysis

  • max time kernel
    122s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-04-2024 12:52

General

  • Target

    launcher_WINDOWS.bat

  • Size

    138B

  • MD5

    dd444644a4794208a8e7cff6b0998256

  • SHA1

    41af9fb8580f3fce9f2d9e2ef5e87d630a0f1ede

  • SHA256

    a0f0e20e0be2cb4b14d65b6a2f44c7f79dd3ec72e26f85337f2bb4924b23da57

  • SHA512

    32f904d84561e572fa916afbfcbbdbf3d0e11a1870fbde6b1f314035cd1c6ab53cfe39fd0da54bba86a2e7bef9ba546ae0f839b0413c9450629676c90cf6c1b6

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\launcher_WINDOWS.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4200
    • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
      java -Xmx4608M -jar PokeRandoZX.jar please-use-the-launcher
      2⤵
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2484
      • C:\Windows\system32\icacls.exe
        C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
        3⤵
        • Modifies file permissions
        PID:4588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp
    Filesize

    46B

    MD5

    cc103e98405ace554fcd5f6271c9c574

    SHA1

    fef22bf36468fbca5beede7fc6534c6f72387a9d

    SHA256

    ee39f80a3f660ae3ffa61a3a1d8037146dfffec344cfab898aa620fca8fe7bd2

    SHA512

    b586469c6df01119742f18344aa18a723f205ade2c685d1b2557430394626192fbcbda68be7e707d0fca8828e95ded38a6787213d22660a9fac7c3c36254cc3b

  • memory/2484-42-0x0000020F00280000-0x0000020F00290000-memory.dmp
    Filesize

    64KB

  • memory/2484-18-0x0000020F73D60000-0x0000020F73D61000-memory.dmp
    Filesize

    4KB

  • memory/2484-44-0x0000020F00000000-0x0000020F01000000-memory.dmp
    Filesize

    16.0MB

  • memory/2484-45-0x0000020F002D0000-0x0000020F002E0000-memory.dmp
    Filesize

    64KB

  • memory/2484-33-0x0000020F00000000-0x0000020F01000000-memory.dmp
    Filesize

    16.0MB

  • memory/2484-34-0x0000020F73D60000-0x0000020F73D61000-memory.dmp
    Filesize

    4KB

  • memory/2484-40-0x0000020F00000000-0x0000020F01000000-memory.dmp
    Filesize

    16.0MB

  • memory/2484-4-0x0000020F00000000-0x0000020F01000000-memory.dmp
    Filesize

    16.0MB

  • memory/2484-52-0x0000020F00000000-0x0000020F01000000-memory.dmp
    Filesize

    16.0MB

  • memory/2484-17-0x0000020F73D60000-0x0000020F73D61000-memory.dmp
    Filesize

    4KB

  • memory/2484-22-0x0000020F00000000-0x0000020F01000000-memory.dmp
    Filesize

    16.0MB

  • memory/2484-47-0x0000020F002F0000-0x0000020F00300000-memory.dmp
    Filesize

    64KB

  • memory/2484-46-0x0000020F002E0000-0x0000020F002F0000-memory.dmp
    Filesize

    64KB

  • memory/2484-48-0x0000020F00000000-0x0000020F01000000-memory.dmp
    Filesize

    16.0MB

  • memory/2484-49-0x0000020F00310000-0x0000020F00320000-memory.dmp
    Filesize

    64KB

  • memory/2484-50-0x0000020F00320000-0x0000020F00330000-memory.dmp
    Filesize

    64KB

  • memory/2484-51-0x0000020F00000000-0x0000020F01000000-memory.dmp
    Filesize

    16.0MB

  • memory/2484-43-0x0000020F00300000-0x0000020F00310000-memory.dmp
    Filesize

    64KB