Analysis
-
max time kernel
135s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 12:10
Static task
static1
Behavioral task
behavioral1
Sample
javax.el-api.jar
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
javax.el-api.jar
Resource
win10v2004-20240426-en
General
-
Target
javax.el-api.jar
-
Size
76KB
-
MD5
d3f4b29e557c5b2c2a3bff5b19081ff7
-
SHA1
9c4c2400f2d8e35c62d636c13012e1f68c370a00
-
SHA256
0b46b36709ecbb9791ac4ba44d16125b9d65b576112afdaaa286052b6e498bc4
-
SHA512
c897eb5530f8c048a761be275aadc4bb7d894c2ad511338bd22435ecc88acc93b68f8231f665eec555559568fd1282cda478750e335eca9fa90a916f33aeecec
-
SSDEEP
1536:I8UAYcjh1DVrPY+32ugN0fqs+cn38Jn9Or0PnEEl02lRIZ:IbAYcl1DFPV329ghsJn9nck0uk
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3544 icacls.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4200 wrote to memory of 3544 4200 java.exe 84 PID 4200 wrote to memory of 3544 4200 java.exe 84
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\javax.el-api.jar1⤵
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:3544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5d3ff5e1fee51c702ee5e96ff5f686da9
SHA19c3a6024220333cb4a859c98bd4448bb57eda51b
SHA256a316907c20fc687ecd2dec7c6f1426a9e2de133168e3523f2c39a690c3c7d9b5
SHA5129ba7d718ca09af88dd7fc5eb1d263dd4e253d31c83ca411bddd21badc305b02c9cfef6fb990c718e77342d54ec15ccd3b5e7da7007dea8bf60726ecc41dc23f8