Analysis

  • max time kernel
    13s
  • max time network
    16s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/06/2024, 20:13

General

  • Target

    horse-stonks-1.0.1.jar

  • Size

    13KB

  • MD5

    7bd0f94f8c73c9be570b11390e6320b5

  • SHA1

    6b24fa888ef741f19b7d06b4bc9b36d91f20f921

  • SHA256

    5284b06687680de15fcc1d568421acbddfe212a9f259a86e6ee0888989ef5667

  • SHA512

    8a5bff1be5364f6f56882e48e61c49f1bd0c7383a2917243759f5135448f84e38e0b9d01350bbb6b3cc067b2c9eea334d1c8cab07b6f4909cfa932fbac120219

  • SSDEEP

    384:lf70BSPMFx6aK1hLncQleKTHz3Aum4aQsSCNhph:lj0Bx6aKXPHz3JSSSvh

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\horse-stonks-1.0.1.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4172
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:1540

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

          Filesize

          46B

          MD5

          2a8a87a8232c7113352ddb80de56946a

          SHA1

          baab73d0ab8fcd17e083101113512c783c1b5abe

          SHA256

          c4bdaa0a40d3fcd9f869e85494b99cc8dd56a0177c73c5be38dee076ca3463c4

          SHA512

          ed7b301d4f8c9bb879b1d46d76781aae830b1d6617e9cd6ed442a27e322e62be3d26ab670f5d891c03cd5c7e7d4f801e3635369dd878a08ef564080789f35fbf

        • memory/4172-2-0x0000017E53360000-0x0000017E535D0000-memory.dmp

          Filesize

          2.4MB

        • memory/4172-12-0x0000017E51A90000-0x0000017E51A91000-memory.dmp

          Filesize

          4KB

        • memory/4172-13-0x0000017E53360000-0x0000017E535D0000-memory.dmp

          Filesize

          2.4MB