Analysis
-
max time kernel
35s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 17:59
Static task
static1
Behavioral task
behavioral1
Sample
Aristois-Free.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Aristois-Free.jar
Resource
win10v2004-20240508-en
General
-
Target
Aristois-Free.jar
-
Size
6.6MB
-
MD5
4cad86ed173ff0dad198582d86bf62b6
-
SHA1
d25bd59b411076ccc1ed4b4daef78aef093a9d3d
-
SHA256
fbff2ebba99bfa194af533852062c6d60831c7cc3801d4af980c329721484a28
-
SHA512
e233c3ba1b3aeab0e286ad46e7ac4f34ae2207269c7a624bc29d90f14e6ff2dac4d74785414966569ab8da0b2d65d591eadd8884c1989976c361b5ff0c87aea2
-
SSDEEP
196608:N0EY4XwEff0cxykwL9g1leOnAU+1blTRLXKrC05:KYDf8FkHXAU8dJXKrb5
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1540 java.exe 1540 java.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3400 icacls.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1540 java.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1540 wrote to memory of 3400 1540 java.exe 83 PID 1540 wrote to memory of 3400 1540 java.exe 83
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\Aristois-Free.jar1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:3400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD54569c47429c5ab4243194ad7305bdd64
SHA184570e35e2cf7a29ab4c4d279eaf59c78a7fe21b
SHA25659f2747abae5f2e2c9c82c037a57082a2d4ab7be2ad745af72a98fa9d0eb85e8
SHA5129a5e51a3b09c64ebbb9f5ec9ce14781b632cefebad1fbeee72078eb433a8ceaf9fea6550d1ded9a71659379e5e9a59ee704a12022315cc9fee87711f280d5137
-
Filesize
357KB
MD5dad976fafd111ceedc7a473932e9da8f
SHA13c0e8e7fcbc854a87219fbbfd181c2cc76018144
SHA256f61949c469c54a5f4e5a8e1668255b919ee1237f1e568acf4127dda0abcdc9a8
SHA51264801d4d34f130b5ee33d2df3a266e2aed981265d13c6552ab73418471398c49cab9a617647b64298c1de432d078f1a7b830d4330980e7ef10dd15a1d18bda11
-
Filesize
446KB
MD578b8212a157e985fa9d9ee9eaab033bd
SHA10c9b501520c20055ba77bbd8cae4895fcb1cfa40
SHA2561cbc8a197aea7eee710735a57a8cae6c0953ad1fe2cb6e17c2e5afebeb93b5ec
SHA512180dd20b04643d42195a30c28d455c923f395977f7dcb66b1ace85e99c1e3c00906542221092bf6d5465a5fc451d7523df862ab2bc050da3a136a6f635706d80