Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 11:56
Static task
static1
Behavioral task
behavioral1
Sample
BHAJOC.jar
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
BHAJOC.jar
Resource
win10v2004-20240508-en
General
-
Target
BHAJOC.jar
-
Size
163KB
-
MD5
d360504ce487fba6ad119060eda13f99
-
SHA1
33e74ca191cc5c975636689384ea4a7d8f923b6d
-
SHA256
8cdc49e48fc6d746904b77f9e0fec8c939f59aa2bb075852c05d40c57801958e
-
SHA512
057262c8e8e5154855b4b443a8997d5169681f058a6c87f86deda24ff0499c67e3c92cdf8d6179441271a73781c6739b89233f2dc072fa4b0fb40dc15e1110f6
-
SSDEEP
3072:5uI5p2nrZqyqn1Svw2asu6ue1WIAJQxsF1x7JMWm+MZKvg8CVdI+4coymT0HXfc7:A7nrZqPn2w2yeeGePG5pZ78II+4coyLm
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4668 icacls.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3728 wrote to memory of 4668 3728 java.exe 83 PID 3728 wrote to memory of 4668 3728 java.exe 83
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\BHAJOC.jar1⤵
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:4668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5098faab3f77c057b4fd9352600d90f1a
SHA18833cd14fdb80876875645dae446609e2983766d
SHA25655992cc96e9b4ce7ad17ad4efb5fc7a28f352ebdfdfe0bb3679beb1995c4d96e
SHA5129a4101372f09a87bd8929933b47421b3461adb0c33a771cc75dc38ed3eec8dfa3d6b7644194f9345457f4cc72e18d8795e85816cf80c0a186b0da4d14b5b6b11