Analysis

  • max time kernel
    132s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/06/2024, 16:01

General

  • Target

    DroidJack/DroidJack_lib/httpmime-4.2.5.jar

  • Size

    25KB

  • MD5

    8df1654c39f4116c9f1fcd04f8505bc2

  • SHA1

    6efc2f9df23c2ac4d3b701a11cab9f9fa6a641d4

  • SHA256

    2ef409c599c532ca1e692013582695231bdb9f3956d4ec9ba3ac71300728b382

  • SHA512

    a0f8aafeb69e1fc7616e813e30515997068faba245641c0437dc8c24f5e348ab77457b4d9cafb59a941d5dcdee187ce6d249cf313fe0d09b1b5ce3854b93d357

  • SSDEEP

    384:mBO5kHnxNHhVgjAV+KLz4NqO2ottK/lqEBrtxmxvH6qou3oyExBwI9F:F5QBV4Dy4NtttKdq6xmxZouUx5F

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\DroidJack\DroidJack_lib\httpmime-4.2.5.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:592
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:2920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    492eccdb44fcefe8f6faae771a1e0dd1

    SHA1

    97207e52888b84cc2bef7625a0f86f1c880659d9

    SHA256

    b9fe7a70b17dcbdddd7ab88c4547127845eff77a1558c1eff55ee9eb19f9f25e

    SHA512

    19bdfa46886746b83270a53ec0fbd4e2ce1e55ba499b2084968c22d6107a8adf6c05608006456042a5a909c17a36c7de24b221d1234bc5e518304c7835729fc1

  • memory/592-2-0x0000021607840000-0x0000021607AB0000-memory.dmp

    Filesize

    2.4MB

  • memory/592-11-0x0000021607820000-0x0000021607821000-memory.dmp

    Filesize

    4KB

  • memory/592-13-0x0000021607840000-0x0000021607AB0000-memory.dmp

    Filesize

    2.4MB