Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12/05/2024, 01:15

General

  • Target

    5a4ad96a02cd36c3bedbc7e54a95c60165f72e398b59606d86d3990bd833a6b7.jar

  • Size

    218KB

  • MD5

    3821d42433e37c5a5b7eeaa4d55ec92b

  • SHA1

    3745f526fd0b49610927d22b3c3e714967b1b6dd

  • SHA256

    5a4ad96a02cd36c3bedbc7e54a95c60165f72e398b59606d86d3990bd833a6b7

  • SHA512

    e3aea58ea9e9ee62c7a01daae11952d95ba5b08505433be82b03a8c5a15538a1e60dc46f41a7abb83a4284103aac5f1e3ac7d5d8a65bee508c5589b0e80480d9

  • SSDEEP

    6144:xIjeiHtSNJO57o/h9++wT+r3lAkzlD/RDFa:xFiNSjO57o/h94T+ZAkh6

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\5a4ad96a02cd36c3bedbc7e54a95c60165f72e398b59606d86d3990bd833a6b7.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Windows\system32\wscript.exe
      wscript C:\Users\Admin\iqitqqjcjb.js
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2896
      • C:\Program Files\Java\jre7\bin\javaw.exe
        "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\amivjiyuuh.txt"
        3⤵
          PID:2528

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\amivjiyuuh.txt

      Filesize

      164KB

      MD5

      7ea89d19a8441cc58b7255dc9fb205fa

      SHA1

      2ae19607a8231bffd72353766f4017eb5492f3e8

      SHA256

      486b68ef93d03c4e486b8ddd9e153391e7debc6839e0c09d38999dd159e30705

      SHA512

      0a76f52939c305b2756fa486222210a4a8c40deff0fc753d11da899baaa84da2fed37ddbd333c6b1dc91ea07a2a1bffcaeb4db08dcbb3db97c925254e6bcbaf4

    • C:\Users\Admin\iqitqqjcjb.js

      Filesize

      341KB

      MD5

      b820a4061057692649d1163778c1b2ef

      SHA1

      29ce92e7326d54b2014b8abc31b1e14c8236d516

      SHA256

      3e51a3de55f9c484593ec1ab454d9011ce7b6b4c9cf9af9d59fb30de108000ce

      SHA512

      78f17dde149b2574482999886e552578b7c1c1ae4faa6e483d6dc3490dec40023116417081b56932cf18b6d7207e46d36b1bc2898178deb3b8e008c668a82c1f

    • memory/2528-35-0x0000000000420000-0x0000000000421000-memory.dmp

      Filesize

      4KB

    • memory/2528-37-0x0000000000420000-0x0000000000421000-memory.dmp

      Filesize

      4KB

    • memory/2528-163-0x00000000020C0000-0x0000000002330000-memory.dmp

      Filesize

      2.4MB

    • memory/2528-19-0x00000000020C0000-0x0000000002330000-memory.dmp

      Filesize

      2.4MB

    • memory/2528-27-0x0000000000420000-0x0000000000421000-memory.dmp

      Filesize

      4KB

    • memory/2528-28-0x0000000000420000-0x0000000000421000-memory.dmp

      Filesize

      4KB

    • memory/2528-76-0x0000000000420000-0x0000000000421000-memory.dmp

      Filesize

      4KB

    • memory/2528-60-0x0000000000420000-0x0000000000421000-memory.dmp

      Filesize

      4KB

    • memory/2528-42-0x0000000000420000-0x0000000000421000-memory.dmp

      Filesize

      4KB

    • memory/2528-49-0x0000000000420000-0x0000000000421000-memory.dmp

      Filesize

      4KB

    • memory/2528-51-0x0000000000420000-0x0000000000421000-memory.dmp

      Filesize

      4KB

    • memory/2528-56-0x0000000000420000-0x0000000000421000-memory.dmp

      Filesize

      4KB

    • memory/2804-13-0x0000000002010000-0x0000000002280000-memory.dmp

      Filesize

      2.4MB

    • memory/2804-2-0x0000000002010000-0x0000000002280000-memory.dmp

      Filesize

      2.4MB

    • memory/2804-12-0x00000000005B0000-0x00000000005B1000-memory.dmp

      Filesize

      4KB