Analysis
-
max time kernel
134s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 12:38
Static task
static1
Behavioral task
behavioral1
Sample
jmx_prometheus_javaagent-0.14.0.jar
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
jmx_prometheus_javaagent-0.14.0.jar
Resource
win10v2004-20240426-en
General
-
Target
jmx_prometheus_javaagent-0.14.0.jar
-
Size
404KB
-
MD5
9a4d4cd0150c734ad4d172def0997772
-
SHA1
7541a57484f3bc765d8c14e881ec8d445067b81c
-
SHA256
5ead661727d1e7ed4cf660c0904c71d93e01ebb8c744160bd122442580fe5206
-
SHA512
745699eda3dbdd42bc44fb2904cef7f09767ea0b86cf24fd2991bc0a2874717e3b3a4b1bc5bf551c120159f8869313714a02358d09357b3f2c11bc1d6724c852
-
SSDEEP
12288:3rGdSnljIsFFn7hj25I7EafOpRjMCXKYPKyMu4W:36dBsX7hoI7El4+guP
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2636 icacls.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3592 wrote to memory of 2636 3592 java.exe 84 PID 3592 wrote to memory of 2636 3592 java.exe 84
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\jmx_prometheus_javaagent-0.14.0.jar1⤵
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD56074221de0084f751c6429bcf6df3553
SHA16b2f54f2aee6aec7a3cf5c33e38929c32745e15e
SHA25664321fd24ec22414d27cd32c50e7d943501f1ebc39f34337c15bb8240c0c5996
SHA51292c70ae2ddc4a4a894a11d9a2fd56ac623caeb1ad61527c5b0b51efcaed87aca1c5155bd3e832e31b4404c58cae066b0bfdd7a820453a7134188fbf2592748f6