Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-06-2024 16:01

General

  • Target

    DroidJack/DroidJack_lib/httpclient-4.2.5.jar

  • Size

    423KB

  • MD5

    23bd23d9d6327dd01fa41c12f15bf9bc

  • SHA1

    3bfeb9062b12d5b340445336790dbc14c59c2d79

  • SHA256

    56b4aae1bd9c66e1f890279dde75e81d226c97e302de97dafc081adeab956bbc

  • SHA512

    e043ba153c74f65eb5185ab7e672cd7ba21cae95673b00447deb6abe0e6c4c72ae50c2ed784d020bf2558539b51f09d18e2481b617ccd887a4994adc2712effb

  • SSDEEP

    6144:o3rUaqSQdbq34UBXmWeM9oUxVKzvEF1Wx2FMDtwiQJ+khG/UBE14CFmDt12l:o3w2QdeI6+MpOEFs1t7i+eG/7dSty

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\DroidJack\DroidJack_lib\httpclient-4.2.5.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:5116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    a0c08533fee1bc04fc16fca5f91c45d0

    SHA1

    3cc2b404625d1dde4a08c0123894226a916d7199

    SHA256

    ae9f13e072985fc83747e621961599c0b353f2034abc9322025588264b4a3b78

    SHA512

    4e404a864223363eade6ce2d81abd425dc2e3630a0b2420b27af2e420c2444a936c39ca4a4ba0731609d2209b5594a66de943f3ab8eda40125f0f0b9fb384ab0

  • memory/2924-2-0x00000186B9D10000-0x00000186B9F80000-memory.dmp

    Filesize

    2.4MB

  • memory/2924-12-0x00000186B84B0000-0x00000186B84B1000-memory.dmp

    Filesize

    4KB

  • memory/2924-13-0x00000186B9D10000-0x00000186B9F80000-memory.dmp

    Filesize

    2.4MB