Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 00:31
Behavioral task
behavioral1
Sample
8abc3637879bc672e4f8d688d404c9d4bbe443efbf7d5b3ac2fee81e78c5c784.exe
Resource
win7-20231129-en
General
-
Target
8abc3637879bc672e4f8d688d404c9d4bbe443efbf7d5b3ac2fee81e78c5c784.exe
-
Size
1.4MB
-
MD5
63cf5accea38da4a029b785e306c556d
-
SHA1
c67a0774159b31de048e089f576211919c26b2c9
-
SHA256
8abc3637879bc672e4f8d688d404c9d4bbe443efbf7d5b3ac2fee81e78c5c784
-
SHA512
ba5b66953779cabb87f398c55549de3dcf84a3be1e052666c7a936d24a7316216a71877f41fabaeab49b34fcacda744b9cb7fc54c9c0b66393336f9c2384443c
-
SSDEEP
24576:W8wewwwwwwwb3v1AKEPzm0uams9Bua3bNAPdo+Pige1ZVwxDMZMudR71UYNAcaIq:vwewwwwwwwbNqo09BzbNAy+puCAM2PA5
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 2 IoCs
resource yara_rule behavioral2/memory/2508-0-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2508-5-0x0000000000400000-0x000000000041E000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 2176 8abc3637879bc672e4f8d688d404c9d4bbe443efbf7d5b3ac2fee81e78c5c784.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3056 icacls.exe -
resource yara_rule behavioral2/memory/2508-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2508-5-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Java\jre-1.8\launch4j-tmp\8abc3637879bc672e4f8d688d404c9d4bbe443efbf7d5b3ac2fee81e78c5c784.exe 8abc3637879bc672e4f8d688d404c9d4bbe443efbf7d5b3ac2fee81e78c5c784.exe File opened for modification C:\Program Files\Java\jre-1.8\launch4j-tmp\8abc3637879bc672e4f8d688d404c9d4bbe443efbf7d5b3ac2fee81e78c5c784.exe 8abc3637879bc672e4f8d688d404c9d4bbe443efbf7d5b3ac2fee81e78c5c784.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2176 8abc3637879bc672e4f8d688d404c9d4bbe443efbf7d5b3ac2fee81e78c5c784.exe 2176 8abc3637879bc672e4f8d688d404c9d4bbe443efbf7d5b3ac2fee81e78c5c784.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2176 2508 8abc3637879bc672e4f8d688d404c9d4bbe443efbf7d5b3ac2fee81e78c5c784.exe 83 PID 2508 wrote to memory of 2176 2508 8abc3637879bc672e4f8d688d404c9d4bbe443efbf7d5b3ac2fee81e78c5c784.exe 83 PID 2176 wrote to memory of 3056 2176 8abc3637879bc672e4f8d688d404c9d4bbe443efbf7d5b3ac2fee81e78c5c784.exe 85 PID 2176 wrote to memory of 3056 2176 8abc3637879bc672e4f8d688d404c9d4bbe443efbf7d5b3ac2fee81e78c5c784.exe 85 PID 2176 wrote to memory of 3292 2176 8abc3637879bc672e4f8d688d404c9d4bbe443efbf7d5b3ac2fee81e78c5c784.exe 89 PID 2176 wrote to memory of 3292 2176 8abc3637879bc672e4f8d688d404c9d4bbe443efbf7d5b3ac2fee81e78c5c784.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\8abc3637879bc672e4f8d688d404c9d4bbe443efbf7d5b3ac2fee81e78c5c784.exe"C:\Users\Admin\AppData\Local\Temp\8abc3637879bc672e4f8d688d404c9d4bbe443efbf7d5b3ac2fee81e78c5c784.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files\Java\jre-1.8\launch4j-tmp\8abc3637879bc672e4f8d688d404c9d4bbe443efbf7d5b3ac2fee81e78c5c784.exe"C:\Program Files\Java\jre-1.8\launch4j-tmp\8abc3637879bc672e4f8d688d404c9d4bbe443efbf7d5b3ac2fee81e78c5c784.exe" -jar "C:\Users\Admin\AppData\Local\Temp\8abc3637879bc672e4f8d688d404c9d4bbe443efbf7d5b3ac2fee81e78c5c784.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:3056
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C set3⤵PID:3292
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Java\jre-1.8\launch4j-tmp\8abc3637879bc672e4f8d688d404c9d4bbe443efbf7d5b3ac2fee81e78c5c784.exe
Filesize285KB
MD5122e34bfa3146ef9ae5a51fdc744353f
SHA1f0cc2294fe150a4cceca8a3da8615edcc4eb20e4
SHA256dd2169db3358ccdf4a4a185e4a22955c989eaa3b9d3e0e6025599b8fa173c968
SHA512306341e00598f02a70d3edc6ef666cb64982f1e31e5c0a1304977a1700c95395c1c7f0857ae8056853370eced0bd2aeafc72da804a65f98c1422929b7c431700
-
Filesize
46B
MD595dad4b99ca650c9e20f2f7dcffb55b4
SHA19b431196e7e0041b7252505fd6b590c9e53ca629
SHA256a5cac40d1a4613a5eeb6f7f0cde4066023abccc92bcaca7d25492d288600d627
SHA51270d9ea8c1ccf357cbd30f8e8b04b4e9e324f26f1e9e74450a941a65f2a2cc0422888ae890cbb7cf2658dad8b668be55a6425b21ad567179ba7b985305bd4be23