Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
25-04-2024 16:35
Behavioral task
behavioral1
Sample
eb8ff032ecdacae049aa7edcb3c76e2b3274e7b01dd19aacbd71cfb96f8c9529.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eb8ff032ecdacae049aa7edcb3c76e2b3274e7b01dd19aacbd71cfb96f8c9529.jar
Resource
win10v2004-20240412-en
General
-
Target
eb8ff032ecdacae049aa7edcb3c76e2b3274e7b01dd19aacbd71cfb96f8c9529.jar
-
Size
208KB
-
MD5
b42ff7e68ccb74b444fd8d30636466cf
-
SHA1
854601f3529fed533b297b4904c67938152563b1
-
SHA256
eb8ff032ecdacae049aa7edcb3c76e2b3274e7b01dd19aacbd71cfb96f8c9529
-
SHA512
cda474d9172d10bdab1cc096284f67bb69fd78d009b05f0cff05398d161bf0790f56d9ec2dbb2a1025276c0590ef964e578bb8917b01632077c56313c4a3fafe
-
SSDEEP
3072:ErTEPKiBNElVUyG+sJOAqVy3qz88pPCGxfSs0jBHeVJCkuWEzPeiipBfN5X:E/MB0muAqChips7+VJCTWicBl9
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4500 icacls.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3068 wrote to memory of 4500 3068 java.exe 86 PID 3068 wrote to memory of 4500 3068 java.exe 86
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\eb8ff032ecdacae049aa7edcb3c76e2b3274e7b01dd19aacbd71cfb96f8c9529.jar1⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:4500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5de64b841ff45d08e452fad967c245250
SHA195471e0db4272f17820e95d69566377c1a35f506
SHA256db5efd690f44c6d7eda063b8c457931f9c8e9154a0fc0613ce3fd619d7fd759f
SHA5127e12d065f829058f123cacf545b75c520dd77a16cb9d52b843223e1af3a22de7733d0fdf299e42ad95ad95c932c728773deb964e76ba9ea3b22ef71629a6f7e6