Resubmissions
21/06/2024, 17:58
240621-wkgm1ayfmc 10Analysis
-
max time kernel
139s -
max time network
157s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
06/06/2024, 04:44
Static task
static1
Behavioral task
behavioral1
Sample
Blank-Owner455.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Blank-Owner455.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Blank-Owner455.exe
Resource
win11-20240508-en
General
-
Target
Blank-Owner455.exe
-
Size
1.3MB
-
MD5
0708b141816e1287fb4bfec4c837ef6e
-
SHA1
65884a0d7f3fab21c1e1d9432525f6f9d255744a
-
SHA256
ddf1395c86c239c3c9c930038e69e5992c3d8260a47c96c1a21cdc770dfd5bf4
-
SHA512
cab5388cbad7750362acec225385d62abfb01cf7dcc32c85555334d90c86d84212bcf0dff47ff960003805cb2c4ef962543ae328ffe2fc75f4c156e01ef24e84
-
SSDEEP
24576:8x6//3ra8haNNG+NOYJFYNxNTvliZMa3X3N:MSWMaHtNnKNiOaH3N
Malware Config
Signatures
-
Class file contains resources related to AdWind 1 IoCs
resource yara_rule sample family_adwind4 -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1984 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000\Software\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1717649100089.tmp" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings Blank-Owner455.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4092 OpenWith.exe 4088 javaw.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3668 wrote to memory of 4088 3668 Blank-Owner455.exe 74 PID 3668 wrote to memory of 4088 3668 Blank-Owner455.exe 74 PID 4088 wrote to memory of 1984 4088 javaw.exe 75 PID 4088 wrote to memory of 1984 4088 javaw.exe 75 PID 4088 wrote to memory of 2244 4088 javaw.exe 77 PID 4088 wrote to memory of 2244 4088 javaw.exe 77 PID 4088 wrote to memory of 3620 4088 javaw.exe 79 PID 4088 wrote to memory of 3620 4088 javaw.exe 79 PID 3620 wrote to memory of 2304 3620 cmd.exe 81 PID 3620 wrote to memory of 2304 3620 cmd.exe 81 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2244 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Blank-Owner455.exe"C:\Users\Admin\AppData\Local\Temp\Blank-Owner455.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\MoonRar.jar"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:1984
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1717649100089.tmp3⤵
- Views/modifies file attributes
PID:2244
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1717649100089.tmp" /f"3⤵
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1717649100089.tmp" /f4⤵
- Adds Run key to start application
PID:2304
-
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5c9dcff4aa99c1c41666004a936a335e1
SHA1d94e2e68184e93c63f184535331088f984323cf5
SHA25635f0dc68c1df4698a68a65730eab670a923f033f51976103e79d4ad6733ab5dc
SHA512f097b5b9b6b898e614fcc24bdd1797d7421b52d603defa6206aafcc4f57b9c92346d47c81d6e2a4f54c6cb0fedeea9de9b9be9474ec4729b88aa8b53e4e5651e
-
Filesize
830KB
MD5d8339dcc4a19345bd7cb55def570eef1
SHA1de69d3fe9a794282859c106e9a90e6647c1a0305
SHA2565eec9251dc8001252eec5303f4de828ee5d9dc079680d6d6ce6b192c10a1f7e3
SHA512207e56d4a3d2d60297d01098c23835482187fe444850f9abea8fb0e3f75e18d4c0403f0e893f30b51b307ccae020a512dec94f0963c29b429be5176613425fa7