Analysis
-
max time kernel
134s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 12:26
Static task
static1
Behavioral task
behavioral1
Sample
adapter-game-databank-player-1.0.0-SNAPSHOT-sources.jar
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
adapter-game-databank-player-1.0.0-SNAPSHOT-sources.jar
Resource
win10v2004-20240508-en
General
-
Target
adapter-game-databank-player-1.0.0-SNAPSHOT-sources.jar
-
Size
78KB
-
MD5
ba1575decfa778a81674ec87a5f359bf
-
SHA1
8ab01014dfe151da97d2515ce08fec9194721e7c
-
SHA256
bf24ba2c5ee7d2bd55bc2536f2da9f0119cfba363493ddc7ca1760ceafe4047d
-
SHA512
a9f16617bd07fa5bace9f3b6470db0cede3dfd8e029b34ff265db06d2b0f4980da86e3acb78bf82d3771a23b30c269edbb23fbd658058beb1be5f04f11d73b0a
-
SSDEEP
1536:OvQKPEDfQe/PUNSjt1/OrvomJ9UHTPY321KeVokmaVK891:gvPEDfrgGOrvxIIxep/
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4172 icacls.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 320 wrote to memory of 4172 320 java.exe 84 PID 320 wrote to memory of 4172 320 java.exe 84
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\adapter-game-databank-player-1.0.0-SNAPSHOT-sources.jar1⤵
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:4172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD515194ba535ed32a1ed3ea972f3d44b36
SHA15a5cca19848ca9dd2055ac55ed9a637a8a97fcfb
SHA256d6c3ec6990a2f25413f435b05ef7253528362c3917af139755e93a53dc6909ed
SHA51242eb11393e121df9a6652451095e52c43bb50d0e667cbecf8fc98d4ba417a8af94a43d648a0713a56934f5bfe06080a94ccf66b47040f36d172d5dd86e445ff7