Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 01:12
Behavioral task
behavioral1
Sample
48f6788ba8e0405098152cd2417e68fdb87bfc41665ead3883f1b0d67fec202a.jar
Resource
win7-20240508-en
General
-
Target
48f6788ba8e0405098152cd2417e68fdb87bfc41665ead3883f1b0d67fec202a.jar
-
Size
124KB
-
MD5
7bf4527b293b0c3f6cc8859886d6c9d8
-
SHA1
75183471ffca124e8ead875329cc6fcd6492e2c8
-
SHA256
48f6788ba8e0405098152cd2417e68fdb87bfc41665ead3883f1b0d67fec202a
-
SHA512
d25e0c208cd4959779fa90d0a686dae65b290ac8062564f40044fa656a8901cddd7f0084544c265c4ccd4978f42c9248184c07801ccdc5b8ddf1d53983515ee8
-
SSDEEP
1536:m2JqdLhOqhzbqA4LOcKgoWrQj0oU1BlKE6tcj871PSMQeyd8qyLBq8eGk1FOX:qdcW6A4LOc1RQyXQ08ZPAytyOX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation wscript.exe -
Loads dropped DLL 1 IoCs
pid Process 8 java.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3456 icacls.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fjfbxljz = "\"C:\\Users\\Admin\\AppData\\Roaming\\fjfbxljz.txt\"" java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fjfbxljz = "\"C:\\Users\\Admin\\AppData\\Roaming\\fjfbxljz.txt\"" java.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1060 schtasks.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4868 wrote to memory of 3456 4868 java.exe 85 PID 4868 wrote to memory of 3456 4868 java.exe 85 PID 4868 wrote to memory of 2624 4868 java.exe 87 PID 4868 wrote to memory of 2624 4868 java.exe 87 PID 2624 wrote to memory of 1192 2624 wscript.exe 88 PID 2624 wrote to memory of 1192 2624 wscript.exe 88 PID 1192 wrote to memory of 220 1192 javaw.exe 99 PID 1192 wrote to memory of 220 1192 javaw.exe 99 PID 2348 wrote to memory of 1060 2348 cmd.exe 105 PID 2348 wrote to memory of 1060 2348 cmd.exe 105 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\48f6788ba8e0405098152cd2417e68fdb87bfc41665ead3883f1b0d67fec202a.jar1⤵
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:3456
-
-
C:\Windows\SYSTEM32\wscript.exewscript C:\Users\Admin\iaoojnaujn.js2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\fjfbxljz.txt"3⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Program Files\Java\jre-1.8\bin\java.exe"C:\Program Files\Java\jre-1.8\bin\java.exe" -jar "C:\Users\Admin\fjfbxljz.txt"4⤵
- Adds Run key to start application
PID:220 -
C:\Windows\SYSTEM32\cmd.execmd /c schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\fjfbxljz.txt"5⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\fjfbxljz.txt"6⤵
- Creates scheduled task(s)
PID:1060
-
-
-
C:\Program Files\Java\jre-1.8\bin\java.exe"C:\Program Files\Java\jre-1.8\bin\java.exe" -jar "C:\Users\Admin\AppData\Roaming\fjfbxljz.txt"5⤵
- Loads dropped DLL
PID:8
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD51eaa2d4a6944d5b978ced2f344f79955
SHA11e94e36a5fef603f0fa947925774553c7945bf70
SHA256784dff33141f0eb3471981fcff7599105861ed48ba3a593d5bdf8f5fd23d93c7
SHA512a3e496f09f485aace2cf7d6eaadbce0e211ee3d4a5f423b971d4f81165b24ad55b7885e2e5578fc5613ada2fca890b97cd9fd6b1afbac0680210a63c9395d6b8
-
Filesize
46B
MD5abeed6827c6b6d90417ecaa3cec6b894
SHA1092d794bb95f10ef1b982bb33c3ab014d1c92ed7
SHA2568bf05daa4fb12e9b2f26b34bff28a6bccd33c49bcdab940023491395261415b3
SHA5124d1fe1528841056b9354df926c923e0b4a55c483bb6fa8938a2b6a27feefc314f794f41bf9745c7170a4b97a79f51052351e17d648dd02ef88796dbc09875719
-
Filesize
241KB
MD5e02979ecd43bcc9061eb2b494ab5af50
SHA13122ac0e751660f646c73b10c4f79685aa65c545
SHA256a66959bec2ef5af730198db9f3b3f7cab0d4ae70ce01bec02bf1d738e6d1ee7a
SHA5121e6f7dcb6a557c9b896412a48dd017c16f7a52fa2b9ab513593c9ecd118e86083979821ca7a3e2f098ee349200c823c759cec6599740dd391cb5f354dc29b372
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1162180587-977231257-2194346871-1000\83aa4cc77f591dfc2374580bbd95f6ba_44d43ff8-91cd-4ca7-92c9-6495b4f546fa
Filesize45B
MD5c8366ae350e7019aefc9d1e6e6a498c6
SHA15731d8a3e6568a5f2dfbbc87e3db9637df280b61
SHA25611e6aca8e682c046c83b721eeb5c72c5ef03cb5936c60df6f4993511ddc61238
SHA51233c980d5a638bfc791de291ebf4b6d263b384247ab27f261a54025108f2f85374b579a026e545f81395736dd40fa4696f2163ca17640dd47f1c42bc9971b18cd
-
Filesize
92KB
MD558a86baacf10b0e009cda66f13f44e00
SHA10530d246742452aa2a8b1096233c81c73dc67668
SHA256188490d674620e42560d91bca3a8b6bf3fd56279d109f6458e01db431e553c3e
SHA5129efcee479fdb05499af11ff7146ae675bdf633dcaa1d3ec55396ceace083f20ddb5fbc0bc5d011b0d3246762e57a292b1451a56b79e86cbb8be7fa4641cebe1c
-
Filesize
209KB
MD53c998a1eb4061c8324d11175722ceaad
SHA1db712475af068245090102a84665da5043ac40ad
SHA256ec3324e7d3fc372b121ce644b6a44466bc58757a666b8f9c2c5584655ab72a40
SHA5125b671101eba9cacaee7ceaf8e9d6328e5364b82b5d37089eee8fbe8deb68065ddd5bce52e345040b7ec4570df8868c86880b63d3eab2f5cbca01a812658144bb