Analysis
-
max time kernel
101s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 10:11
Static task
static1
Behavioral task
behavioral1
Sample
jei-1.20.1-fabric-15.3.0.4.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
jei-1.20.1-fabric-15.3.0.4.jar
Resource
win10v2004-20240508-en
General
-
Target
jei-1.20.1-fabric-15.3.0.4.jar
-
Size
1.1MB
-
MD5
4e5a089e23f995c28f11a2387be85532
-
SHA1
d5e29fead4928513444b6005968fb6a6aa6aa8e8
-
SHA256
4801d66e40a42535a7a0af6349b2d427078baf886af4bf06f85434de331fba71
-
SHA512
4ef89f16de8118be1c4982fcfb62aa2e16b557fc4ca8e972c72d04eb8e4a563d8aaeb282c6643f6b6945dadf91fb1a68599d87792e2b43ef7ca8763baadc1bf4
-
SSDEEP
24576:QbM6LFM9mEZyTFR2HAHUVOha7sPIlVkjY6oCZKgf3Rx4:QbBBesFaAHUOhSsqD638
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1656 icacls.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133602415589875353" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2708 chrome.exe 2708 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3696 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3696 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1328 wrote to memory of 1656 1328 java.exe 85 PID 1328 wrote to memory of 1656 1328 java.exe 85 PID 2708 wrote to memory of 4336 2708 chrome.exe 97 PID 2708 wrote to memory of 4336 2708 chrome.exe 97 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 4880 2708 chrome.exe 98 PID 2708 wrote to memory of 864 2708 chrome.exe 99 PID 2708 wrote to memory of 864 2708 chrome.exe 99 PID 2708 wrote to memory of 1912 2708 chrome.exe 100 PID 2708 wrote to memory of 1912 2708 chrome.exe 100 PID 2708 wrote to memory of 1912 2708 chrome.exe 100 PID 2708 wrote to memory of 1912 2708 chrome.exe 100 PID 2708 wrote to memory of 1912 2708 chrome.exe 100 PID 2708 wrote to memory of 1912 2708 chrome.exe 100 PID 2708 wrote to memory of 1912 2708 chrome.exe 100 PID 2708 wrote to memory of 1912 2708 chrome.exe 100 PID 2708 wrote to memory of 1912 2708 chrome.exe 100 PID 2708 wrote to memory of 1912 2708 chrome.exe 100 PID 2708 wrote to memory of 1912 2708 chrome.exe 100 PID 2708 wrote to memory of 1912 2708 chrome.exe 100 PID 2708 wrote to memory of 1912 2708 chrome.exe 100 PID 2708 wrote to memory of 1912 2708 chrome.exe 100 PID 2708 wrote to memory of 1912 2708 chrome.exe 100 PID 2708 wrote to memory of 1912 2708 chrome.exe 100 PID 2708 wrote to memory of 1912 2708 chrome.exe 100 PID 2708 wrote to memory of 1912 2708 chrome.exe 100 PID 2708 wrote to memory of 1912 2708 chrome.exe 100 PID 2708 wrote to memory of 1912 2708 chrome.exe 100 PID 2708 wrote to memory of 1912 2708 chrome.exe 100 PID 2708 wrote to memory of 1912 2708 chrome.exe 100 PID 2708 wrote to memory of 1912 2708 chrome.exe 100 PID 2708 wrote to memory of 1912 2708 chrome.exe 100 PID 2708 wrote to memory of 1912 2708 chrome.exe 100 PID 2708 wrote to memory of 1912 2708 chrome.exe 100 PID 2708 wrote to memory of 1912 2708 chrome.exe 100
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\jei-1.20.1-fabric-15.3.0.4.jar1⤵
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffe2fb6ab58,0x7ffe2fb6ab68,0x7ffe2fb6ab782⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1824,i,1751488267036868924,15982484815697643003,131072 /prefetch:22⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 --field-trial-handle=1824,i,1751488267036868924,15982484815697643003,131072 /prefetch:82⤵PID:864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2236 --field-trial-handle=1824,i,1751488267036868924,15982484815697643003,131072 /prefetch:82⤵PID:1912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3096 --field-trial-handle=1824,i,1751488267036868924,15982484815697643003,131072 /prefetch:12⤵PID:2648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3128 --field-trial-handle=1824,i,1751488267036868924,15982484815697643003,131072 /prefetch:12⤵PID:2064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3624 --field-trial-handle=1824,i,1751488267036868924,15982484815697643003,131072 /prefetch:12⤵PID:2104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4464 --field-trial-handle=1824,i,1751488267036868924,15982484815697643003,131072 /prefetch:82⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4456 --field-trial-handle=1824,i,1751488267036868924,15982484815697643003,131072 /prefetch:82⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4564 --field-trial-handle=1824,i,1751488267036868924,15982484815697643003,131072 /prefetch:82⤵PID:3036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4764 --field-trial-handle=1824,i,1751488267036868924,15982484815697643003,131072 /prefetch:82⤵PID:4572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 --field-trial-handle=1824,i,1751488267036868924,15982484815697643003,131072 /prefetch:82⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4820 --field-trial-handle=1824,i,1751488267036868924,15982484815697643003,131072 /prefetch:12⤵PID:3712
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4816
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5c1a9780494446693c8ff92bdf2a9ccb8
SHA110b5f4a9b18139c01fdca76169d50f241ce48034
SHA256339948c31670b84b7041aae50810ed5a0c6b2ff8938ee00514501560edd341b9
SHA5128898591c06a962bc284766ac218675c4a975dc565f45b6b2a7b0c13a56221f564966d81288fa9d39e7a55ad2c826e6f5206aab140ecaed44671e073218741dfd
-
Filesize
168B
MD547add9f1c8455faf5ce5fbe50be5ff7c
SHA1bb936d9ad6413e0e788329886141aa21ce4733d0
SHA256dadaf4b9d4d4ac7b8bd22cd3b51cd2ae4ebf3e50d40681ffd63aba955291ec60
SHA512ba17bda919919b1df58932cb748765f9484c35f516256b942dc06606b7430d5082ad08aec1baa2538afca23b6d0bc9639b6c363070b8dbe59828ff1bff846d9b
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2KB
MD5bc2ea1ecbedfdd550338425e372e2e82
SHA1c448ea689c8664fb7836cd483772ba6802248e04
SHA25687c6dc63badea9d6804592d2c41ee74ed1412cc2b402e8d54f56a15e46c06bbd
SHA512696f06dbc23012e9fd92c1054bcf9df72412c34fc3a16886903ce58ab4e6d78be91a2f32081d70e09e9996531827b940c30b4ce90c0f2a24e8e46b395bb53e83
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5c0e91fbb6cfba964ae8342337db838e6
SHA154a36f2f169ab04e7a9df7ad4932accfb7b1c86b
SHA256506a924734c1ee056d2b5e5ba0f39f2bd632e93623916a93a2529aebf0ea661c
SHA512cc0199472396fa49baf80b671af9fb21ddd89c3dd202bbb8762a68463ab221c5a41ec30cde7669edae2105868db4d0cc52329f67dd5cc4f8434b7571036ed704
-
Filesize
6KB
MD529c13fc20dfd750a68b03b6c1a48d6c6
SHA1b4f49b2df2178ef9dc71273494afc9aa0e6a7f4e
SHA256fbdc340032153ccb688ccdfa5af41b975575fc26a30e65af19583552532e3139
SHA51277c771806f253b9912e33660f1fede7e09beba1306a1bf527887cc0fdd160b60777c9e22c91720da8c4cdc7222f52bb8e1211a3b01165ad4773c309cc67c6505
-
Filesize
16KB
MD50484682a8bafd866eb0ed91d26e4489c
SHA141a94cc2333c1b718b16cd786ca0ffee1b5de95f
SHA256dd723d05c404afefdd138dc1e125641ba37ead03de95c21f2a8485f45c68596e
SHA512a5887c8b8ba278996ffae2706145a526d6d1a0e2418db36a32e6573e2bd0ff727d7b0803b1047a631de24c23e5a857736bd9ec586a3b53aee5220d3b267bb237
-
Filesize
257KB
MD54ac258127036f7e749debf2442357f81
SHA11cad462bdc994671467340eba94af0ecdfa709c1
SHA256792eb35629493ee3e9c8c57a8720f6a1bf6b4001e911ac6f3508fbffd62d40e2
SHA5126ea8becfcbd20dcec161e9ae7cb8e662f91b5fae21348a1bbef9d42e192b48b8ac701d6c1d25fe8b162536429b261e8adb75ecf6a2f623ed127ec2fe94f38d2c
-
Filesize
257KB
MD577dc526026611f3f0ec6fc6d63c298a2
SHA161b2774b91f1634c8c8261803a60cfcc66e7c9cb
SHA2568f06591f43e59b338f8c5d294af7d027e1fd0344ef83b58ab5bc2e6f9c47fa36
SHA5128bc816c70ef8653e51e389c66b52543f730a8c32cdf59cdc7ce175b37a3f0119e19458053d898a7c64deb9c2f1df2b21a82eee803689cb902003265bff528d9c