Analysis

  • max time kernel
    134s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/05/2024, 12:26

General

  • Target

    adapter-game-databank-player-1.0.0-SNAPSHOT-sources.jar

  • Size

    78KB

  • MD5

    ba1575decfa778a81674ec87a5f359bf

  • SHA1

    8ab01014dfe151da97d2515ce08fec9194721e7c

  • SHA256

    bf24ba2c5ee7d2bd55bc2536f2da9f0119cfba363493ddc7ca1760ceafe4047d

  • SHA512

    a9f16617bd07fa5bace9f3b6470db0cede3dfd8e029b34ff265db06d2b0f4980da86e3acb78bf82d3771a23b30c269edbb23fbd658058beb1be5f04f11d73b0a

  • SSDEEP

    1536:OvQKPEDfQe/PUNSjt1/OrvomJ9UHTPY321KeVokmaVK891:gvPEDfrgGOrvxIIxep/

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\adapter-game-databank-player-1.0.0-SNAPSHOT-sources.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:320
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:4172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    15194ba535ed32a1ed3ea972f3d44b36

    SHA1

    5a5cca19848ca9dd2055ac55ed9a637a8a97fcfb

    SHA256

    d6c3ec6990a2f25413f435b05ef7253528362c3917af139755e93a53dc6909ed

    SHA512

    42eb11393e121df9a6652451095e52c43bb50d0e667cbecf8fc98d4ba417a8af94a43d648a0713a56934f5bfe06080a94ccf66b47040f36d172d5dd86e445ff7

  • memory/320-2-0x000001D36EB00000-0x000001D36ED70000-memory.dmp

    Filesize

    2.4MB

  • memory/320-11-0x000001D36D240000-0x000001D36D241000-memory.dmp

    Filesize

    4KB

  • memory/320-13-0x000001D36EB00000-0x000001D36ED70000-memory.dmp

    Filesize

    2.4MB