Analysis

  • max time kernel
    89s
  • max time network
    93s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240419-en
  • resource tags

    arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02/05/2024, 13:25

General

  • Target

    lib/jphp-gui-jfoenix-ext.jar

  • Size

    50KB

  • MD5

    d093f94c050d5900795de8149cb84817

  • SHA1

    54058dda5c9e66a22074590072c8a48559bba1fb

  • SHA256

    4bec0794a0d69debe2f955bf495ea7c0858ad84cb0d2d549cacb82e70c060cba

  • SHA512

    3faaa415fba5745298981014d0042e8e01850fccaac22f92469765fd8c56b920da877ff3138a629242d9c52e270e7e2ce89e7c69f6902859f48ea0359842e2fb

  • SSDEEP

    1536:1shuTqhiMtf/2PXkXgjYcO1556i/canPH1y3F95grf5CjdKBfn602ZhqsNgsSJ+y:nw1pywCjUfnX

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\lib\jphp-gui-jfoenix-ext.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4368
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:2880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    d770cc4a1845177e401b7a4b69787913

    SHA1

    c8b71a2feba0d5c3100d548dcd429c08a278ac33

    SHA256

    b5df518c14665c96fa07b42b2c8bccb28dfd291b6a8c4624954590ac59bd43aa

    SHA512

    73ea91d8f4e57d77ef89b78ab921039b5490a80f9c1010bd90b88e4f80f8121764be1cb6abf2cd9929fe574c63b8b930d15d8152242e5ae92b06b4db32b19b1a

  • memory/4368-2-0x0000019BD0F80000-0x0000019BD11F0000-memory.dmp

    Filesize

    2.4MB

  • memory/4368-12-0x0000019BD0F60000-0x0000019BD0F61000-memory.dmp

    Filesize

    4KB

  • memory/4368-13-0x0000019BD0F80000-0x0000019BD11F0000-memory.dmp

    Filesize

    2.4MB