Analysis

  • max time kernel
    101s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/05/2024, 10:11

General

  • Target

    jei-1.20.1-fabric-15.3.0.4.jar

  • Size

    1.1MB

  • MD5

    4e5a089e23f995c28f11a2387be85532

  • SHA1

    d5e29fead4928513444b6005968fb6a6aa6aa8e8

  • SHA256

    4801d66e40a42535a7a0af6349b2d427078baf886af4bf06f85434de331fba71

  • SHA512

    4ef89f16de8118be1c4982fcfb62aa2e16b557fc4ca8e972c72d04eb8e4a563d8aaeb282c6643f6b6945dadf91fb1a68599d87792e2b43ef7ca8763baadc1bf4

  • SSDEEP

    24576:QbM6LFM9mEZyTFR2HAHUVOha7sPIlVkjY6oCZKgf3Rx4:QbBBesFaAHUOhSsqD638

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 30 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\jei-1.20.1-fabric-15.3.0.4.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1328
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:1656
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffe2fb6ab58,0x7ffe2fb6ab68,0x7ffe2fb6ab78
      2⤵
        PID:4336
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1824,i,1751488267036868924,15982484815697643003,131072 /prefetch:2
        2⤵
          PID:4880
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 --field-trial-handle=1824,i,1751488267036868924,15982484815697643003,131072 /prefetch:8
          2⤵
            PID:864
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2236 --field-trial-handle=1824,i,1751488267036868924,15982484815697643003,131072 /prefetch:8
            2⤵
              PID:1912
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3096 --field-trial-handle=1824,i,1751488267036868924,15982484815697643003,131072 /prefetch:1
              2⤵
                PID:2648
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3128 --field-trial-handle=1824,i,1751488267036868924,15982484815697643003,131072 /prefetch:1
                2⤵
                  PID:2064
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3624 --field-trial-handle=1824,i,1751488267036868924,15982484815697643003,131072 /prefetch:1
                  2⤵
                    PID:2104
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4464 --field-trial-handle=1824,i,1751488267036868924,15982484815697643003,131072 /prefetch:8
                    2⤵
                      PID:4780
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4456 --field-trial-handle=1824,i,1751488267036868924,15982484815697643003,131072 /prefetch:8
                      2⤵
                        PID:1512
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4564 --field-trial-handle=1824,i,1751488267036868924,15982484815697643003,131072 /prefetch:8
                        2⤵
                          PID:3036
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4764 --field-trial-handle=1824,i,1751488267036868924,15982484815697643003,131072 /prefetch:8
                          2⤵
                            PID:4572
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 --field-trial-handle=1824,i,1751488267036868924,15982484815697643003,131072 /prefetch:8
                            2⤵
                              PID:5064
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4820 --field-trial-handle=1824,i,1751488267036868924,15982484815697643003,131072 /prefetch:1
                              2⤵
                                PID:3712
                            • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                              1⤵
                                PID:4816
                              • C:\Windows\system32\OpenWith.exe
                                C:\Windows\system32\OpenWith.exe -Embedding
                                1⤵
                                • Modifies registry class
                                • Suspicious behavior: GetForegroundWindowSpam
                                • Suspicious use of SetWindowsHookEx
                                PID:3696

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

                                Filesize

                                46B

                                MD5

                                c1a9780494446693c8ff92bdf2a9ccb8

                                SHA1

                                10b5f4a9b18139c01fdca76169d50f241ce48034

                                SHA256

                                339948c31670b84b7041aae50810ed5a0c6b2ff8938ee00514501560edd341b9

                                SHA512

                                8898591c06a962bc284766ac218675c4a975dc565f45b6b2a7b0c13a56221f564966d81288fa9d39e7a55ad2c826e6f5206aab140ecaed44671e073218741dfd

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                Filesize

                                168B

                                MD5

                                47add9f1c8455faf5ce5fbe50be5ff7c

                                SHA1

                                bb936d9ad6413e0e788329886141aa21ce4733d0

                                SHA256

                                dadaf4b9d4d4ac7b8bd22cd3b51cd2ae4ebf3e50d40681ffd63aba955291ec60

                                SHA512

                                ba17bda919919b1df58932cb748765f9484c35f516256b942dc06606b7430d5082ad08aec1baa2538afca23b6d0bc9639b6c363070b8dbe59828ff1bff846d9b

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                Filesize

                                264KB

                                MD5

                                f50f89a0a91564d0b8a211f8921aa7de

                                SHA1

                                112403a17dd69d5b9018b8cede023cb3b54eab7d

                                SHA256

                                b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                SHA512

                                bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                Filesize

                                2KB

                                MD5

                                bc2ea1ecbedfdd550338425e372e2e82

                                SHA1

                                c448ea689c8664fb7836cd483772ba6802248e04

                                SHA256

                                87c6dc63badea9d6804592d2c41ee74ed1412cc2b402e8d54f56a15e46c06bbd

                                SHA512

                                696f06dbc23012e9fd92c1054bcf9df72412c34fc3a16886903ce58ab4e6d78be91a2f32081d70e09e9996531827b940c30b4ce90c0f2a24e8e46b395bb53e83

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                Filesize

                                2B

                                MD5

                                d751713988987e9331980363e24189ce

                                SHA1

                                97d170e1550eee4afc0af065b78cda302a97674c

                                SHA256

                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                SHA512

                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                524B

                                MD5

                                c0e91fbb6cfba964ae8342337db838e6

                                SHA1

                                54a36f2f169ab04e7a9df7ad4932accfb7b1c86b

                                SHA256

                                506a924734c1ee056d2b5e5ba0f39f2bd632e93623916a93a2529aebf0ea661c

                                SHA512

                                cc0199472396fa49baf80b671af9fb21ddd89c3dd202bbb8762a68463ab221c5a41ec30cde7669edae2105868db4d0cc52329f67dd5cc4f8434b7571036ed704

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                29c13fc20dfd750a68b03b6c1a48d6c6

                                SHA1

                                b4f49b2df2178ef9dc71273494afc9aa0e6a7f4e

                                SHA256

                                fbdc340032153ccb688ccdfa5af41b975575fc26a30e65af19583552532e3139

                                SHA512

                                77c771806f253b9912e33660f1fede7e09beba1306a1bf527887cc0fdd160b60777c9e22c91720da8c4cdc7222f52bb8e1211a3b01165ad4773c309cc67c6505

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                Filesize

                                16KB

                                MD5

                                0484682a8bafd866eb0ed91d26e4489c

                                SHA1

                                41a94cc2333c1b718b16cd786ca0ffee1b5de95f

                                SHA256

                                dd723d05c404afefdd138dc1e125641ba37ead03de95c21f2a8485f45c68596e

                                SHA512

                                a5887c8b8ba278996ffae2706145a526d6d1a0e2418db36a32e6573e2bd0ff727d7b0803b1047a631de24c23e5a857736bd9ec586a3b53aee5220d3b267bb237

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                257KB

                                MD5

                                4ac258127036f7e749debf2442357f81

                                SHA1

                                1cad462bdc994671467340eba94af0ecdfa709c1

                                SHA256

                                792eb35629493ee3e9c8c57a8720f6a1bf6b4001e911ac6f3508fbffd62d40e2

                                SHA512

                                6ea8becfcbd20dcec161e9ae7cb8e662f91b5fae21348a1bbef9d42e192b48b8ac701d6c1d25fe8b162536429b261e8adb75ecf6a2f623ed127ec2fe94f38d2c

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                257KB

                                MD5

                                77dc526026611f3f0ec6fc6d63c298a2

                                SHA1

                                61b2774b91f1634c8c8261803a60cfcc66e7c9cb

                                SHA256

                                8f06591f43e59b338f8c5d294af7d027e1fd0344ef83b58ab5bc2e6f9c47fa36

                                SHA512

                                8bc816c70ef8653e51e389c66b52543f730a8c32cdf59cdc7ce175b37a3f0119e19458053d898a7c64deb9c2f1df2b21a82eee803689cb902003265bff528d9c

                              • memory/1328-2-0x000002482CED0000-0x000002482D140000-memory.dmp

                                Filesize

                                2.4MB

                              • memory/1328-13-0x000002482CED0000-0x000002482D140000-memory.dmp

                                Filesize

                                2.4MB

                              • memory/1328-12-0x000002482B610000-0x000002482B611000-memory.dmp

                                Filesize

                                4KB