Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 05:23
Static task
static1
Behavioral task
behavioral1
Sample
AIReducer-1.12.2-0.3.0.jar
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
AIReducer-1.12.2-0.3.0.jar
Resource
win10v2004-20240508-en
General
-
Target
AIReducer-1.12.2-0.3.0.jar
-
Size
83KB
-
MD5
37a0a342994190853f7932656c5f13b9
-
SHA1
a68d2b0996e8146f4c4fa270d7100c496120bfd3
-
SHA256
9e06e63ef116c8c621166e182e52d27f8d4b390683b9c0ab1b097fc800006d5b
-
SHA512
dbb90d0cff95768099f8933c0101db0e22197631fe4bab20c8df0075cf2df0cdd7aa8eab41171067717a19a5ad29c250b466474bd558fdd31ef172719666f0e3
-
SSDEEP
1536:s7nUjDQwm0fRnGsZxOHvacNOQvhTse+7jZWPemk6:LEv0fZGsphQIpjZWnk6
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3496 icacls.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2988 wrote to memory of 3496 2988 java.exe 84 PID 2988 wrote to memory of 3496 2988 java.exe 84
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\AIReducer-1.12.2-0.3.0.jar1⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:3496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5ab1f51777a5f4c0c7780f31cd26e5855
SHA12a29ff834859c2fff077dc2f4bd2b6c7111803d0
SHA256442d9fa4fb4e28f4a0e80533a5eeefea8ff92276bd100ee802050abf2c4c12f1
SHA512596eb115521e616e4f55a23fb8f6360c6e7f2cecb6e952e16de1d3c87089868038ebdce9bbd54f7e814df23c369be9eb1e50cbfb92c961667550e8feb2e3d91b