Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 12:01

General

  • Target

    combo-game-server-1.0.0-SNAPSHOT-sources.jar

  • Size

    70KB

  • MD5

    9efcba7b72e9c868c9e90ceb115a1b6c

  • SHA1

    6581f3a382657e8d99446a58f8770325fbe186f5

  • SHA256

    ed4f67939e0307c209c38f696d1fb19bf408d16bc20fc60dc9732e2b902610f2

  • SHA512

    9aba37b36d1af10062b64bd5b36b81123cf04e3e120980396484d3bc9ae03866764925bf7d037e4510bde391f9f058505fa084843410bd5c1d4b97cb8524f092

  • SSDEEP

    1536:z3KSMuep8D/DILzdzda0mvDdpBoyfwcbi1dKl+gWd3:14SnILz3wbN9fwiuAM

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\combo-game-server-1.0.0-SNAPSHOT-sources.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3704
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:4348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    b1b8a5be99bb547992a632c199c88906

    SHA1

    a36a8c527fe6138fa58f3a4518288e540704a970

    SHA256

    2ba5c62f6aaa6683625324fc2be161105a7791af13c16af1e5a448b6345be482

    SHA512

    a0524a0961d175a22ee792ca49714f73cd483c58424957f76f46c3821ba01b07469753737401db4a14d82d44ba06c133cdcf562aaa9776c752e5722d00871f98

  • memory/3704-2-0x000001BF41010000-0x000001BF41280000-memory.dmp

    Filesize

    2.4MB

  • memory/3704-13-0x000001BF41010000-0x000001BF41280000-memory.dmp

    Filesize

    2.4MB

  • memory/3704-12-0x000001BF40FF0000-0x000001BF40FF1000-memory.dmp

    Filesize

    4KB