Analysis
-
max time kernel
31s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/04/2024, 10:49
Static task
static1
Behavioral task
behavioral1
Sample
SoftwareModMenu v1.2 Setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
SoftwareModMenu v1.2 Setup.exe
Resource
win10v2004-20240226-en
General
-
Target
SoftwareModMenu v1.2 Setup.exe
-
Size
38KB
-
MD5
2179d4662c7e81a2a7588f6d3fff82b3
-
SHA1
8b0f8ada75bcb13b1e347f2acaa7578554ac3d2b
-
SHA256
bd8ad15146e19518e43a2d6f5f2e36132b33c6fe0ad6e39eb6938704f96a9e0c
-
SHA512
e34c40a5d93b835bc60a861a97eac8f55adc42f22e15fd9edb740f1c5971866bc51ad2ccc0e4b4c30fe12b749d0e324b7b64a6a8e28de3eb607e0622cb9efd08
-
SSDEEP
768:/DUqShsinfLFRZpgI717TglHVojtMN8M6zb5:waORz6O1TgJVeMN875
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4256 icacls.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 5080 wrote to memory of 3100 5080 SoftwareModMenu v1.2 Setup.exe 90 PID 5080 wrote to memory of 3100 5080 SoftwareModMenu v1.2 Setup.exe 90 PID 3100 wrote to memory of 4256 3100 javaw.exe 91 PID 3100 wrote to memory of 4256 3100 javaw.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\SoftwareModMenu v1.2 Setup.exe"C:\Users\Admin\AppData\Local\Temp\SoftwareModMenu v1.2 Setup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -Dfile.encoding=UTF-8 -classpath " org.develnext.jphp.ext.javafx.FXLauncher2⤵
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:4256
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD528587bb30c03887bd4cbdeec86a2aeb2
SHA1677530af275b783567b4d0a6c04746bbd53e56a8
SHA2563f19bd1fc669e82299fa2f686d68482d7d36bffccafc0195fbd5f620d927b077
SHA51294c14f5e44fb6be96dd728d74b99d8b58af4ecaf0896867121e5f3dfd13267f3d3dc01f79c9ae0e700925aa40ceed78967f1a5ea03e04be7094aa661672e75e4