Overview
overview
10Static
static
10SS Tool [E....3.exe
windows7-x64
5SS Tool [E....3.exe
windows10-2004-x64
5SS Tool [E...or.exe
windows7-x64
5SS Tool [E...or.exe
windows10-2004-x64
5SS Tool [E...ng.exe
windows7-x64
7SS Tool [E...ng.exe
windows10-2004-x64
7$PLUGINSDI...ng.exe
windows7-x64
3$PLUGINSDI...ng.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3SS Tool [E...ui.jar
windows7-x64
1SS Tool [E...ui.jar
windows10-2004-x64
7SS Tool [E...er.exe
windows7-x64
7SS Tool [E...er.exe
windows10-2004-x64
7SS Tool [E...or.exe
windows7-x64
3SS Tool [E...or.exe
windows10-2004-x64
3SS Tool [E...ew.exe
windows7-x64
9SS Tool [E...ew.exe
windows10-2004-x64
9SS Tool [E...st.jar
windows7-x64
1SS Tool [E...st.jar
windows10-2004-x64
7SS Tool [E...ew.chm
windows7-x64
1SS Tool [E...ew.chm
windows10-2004-x64
1SS Tool [E...ew.exe
windows7-x64
4SS Tool [E...ew.exe
windows10-2004-x64
4SS Tool [E...ch.lnk
windows7-x64
3SS Tool [E...ch.lnk
windows10-2004-x64
3SS Tool [E...IN.lnk
windows7-x64
3SS Tool [E...IN.lnk
windows10-2004-x64
3Analysis
-
max time kernel
144s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 05:07
Behavioral task
behavioral1
Sample
SS Tool [Extract]/Applications/Bucky Roberts 3.3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
SS Tool [Extract]/Applications/Bucky Roberts 3.3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
SS Tool [Extract]/Applications/CheatDetector.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
SS Tool [Extract]/Applications/CheatDetector.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
SS Tool [Extract]/Applications/Everything.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
SS Tool [Extract]/Applications/Everything.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/Everything/Everything.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/Everything/Everything.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
SS Tool [Extract]/Applications/JDGui.jar
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
SS Tool [Extract]/Applications/JDGui.jar
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
SS Tool [Extract]/Applications/ProcessHacker.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
SS Tool [Extract]/Applications/ProcessHacker.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
SS Tool [Extract]/Applications/Schematica Reach Detector.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
SS Tool [Extract]/Applications/Schematica Reach Detector.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
SS Tool [Extract]/Applications/USBDeview.exe
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
SS Tool [Extract]/Applications/USBDeview.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
SS Tool [Extract]/Applications/Xray Pack Test.jar
Resource
win7-20240215-en
Behavioral task
behavioral24
Sample
SS Tool [Extract]/Applications/Xray Pack Test.jar
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
SS Tool [Extract]/LastActivityViewer/LastActivityView.chm
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
SS Tool [Extract]/LastActivityViewer/LastActivityView.chm
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
SS Tool [Extract]/LastActivityViewer/LastActivityView.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
SS Tool [Extract]/LastActivityViewer/LastActivityView.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
SS Tool [Extract]/Shortcuts/Prefetch.lnk
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
SS Tool [Extract]/Shortcuts/Prefetch.lnk
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
SS Tool [Extract]/Shortcuts/RECYCLE BIN.lnk
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
SS Tool [Extract]/Shortcuts/RECYCLE BIN.lnk
Resource
win10v2004-20240508-en
General
-
Target
SS Tool [Extract]/Applications/JDGui.jar
-
Size
8.4MB
-
MD5
fb2fc7abba5deb472ed3ee4b0fa5ac13
-
SHA1
35bec04dcf240d915da97f7a6522288155725163
-
SHA256
bdd2f3dc8750910e0d69378482cff57f2ff29d23983d1e55d266390527bd6b67
-
SHA512
04f59d0ec974009ca5141f7f7229862d8e084f7ecc5685825e2fa10c8539c56f5a81252f3c80e344453c75050b8fa0dc5fd5cb6b4bb9c6b845bac86ed31899e0
-
SSDEEP
98304:TKrU2GKgNrM2w43X2U2grOF6I4twkreik67HAmIwFF5XnfejLDuPekD+HcaunF1E:eU2dYrM2w43V3u6AlwF6jL6DUcauF1xK
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
-
Modifies registry class 2 IoCs
Processes:
java.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ java.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ java.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
java.exepid process 2108 java.exe 2108 java.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
java.exedescription pid process target process PID 2108 wrote to memory of 1624 2108 java.exe icacls.exe PID 2108 wrote to memory of 1624 2108 java.exe icacls.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\SS Tool [Extract]\Applications\JDGui.jar"1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3940,i,15142778360084620907,1763097090506261076,262144 --variations-seed-version --mojo-platform-channel-handle=4376 /prefetch:81⤵PID:4164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD50fc3b1767ed72d8e582f849fd7c4d18b
SHA17f532ac4b66cf14b26d76ec0e0150dc01e99382f
SHA2562dc1baf763c34c24f911b58bbfe2f78a7b59fa1eaef67da533fcecb0594957b5
SHA512b4010d85767ed2e0e9bb28e01d0fa321ea062ec0bfc1923590bff75179eece65521a929578590a8a02978e3803757ee1d191779508c2690fdb4430da008acd78