Resubmissions
21-06-2024 17:58
240621-wkgm1ayfmc 10Analysis
-
max time kernel
528s -
max time network
537s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
06-06-2024 04:44
Static task
static1
Behavioral task
behavioral1
Sample
Blank-Owner455.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Blank-Owner455.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Blank-Owner455.exe
Resource
win11-20240508-en
General
-
Target
Blank-Owner455.exe
-
Size
1.3MB
-
MD5
0708b141816e1287fb4bfec4c837ef6e
-
SHA1
65884a0d7f3fab21c1e1d9432525f6f9d255744a
-
SHA256
ddf1395c86c239c3c9c930038e69e5992c3d8260a47c96c1a21cdc770dfd5bf4
-
SHA512
cab5388cbad7750362acec225385d62abfb01cf7dcc32c85555334d90c86d84212bcf0dff47ff960003805cb2c4ef962543ae328ffe2fc75f4c156e01ef24e84
-
SSDEEP
24576:8x6//3ra8haNNG+NOYJFYNxNTvliZMa3X3N:MSWMaHtNnKNiOaH3N
Malware Config
Signatures
-
Class file contains resources related to AdWind 1 IoCs
resource yara_rule sample family_adwind4 -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3984 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000\Software\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1717649098661.tmp" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000_Classes\Local Settings Blank-Owner455.exe Key created \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4616 OpenWith.exe 1780 javaw.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1120 wrote to memory of 1780 1120 Blank-Owner455.exe 82 PID 1120 wrote to memory of 1780 1120 Blank-Owner455.exe 82 PID 1780 wrote to memory of 3984 1780 javaw.exe 83 PID 1780 wrote to memory of 3984 1780 javaw.exe 83 PID 1780 wrote to memory of 5100 1780 javaw.exe 85 PID 1780 wrote to memory of 5100 1780 javaw.exe 85 PID 1780 wrote to memory of 2436 1780 javaw.exe 87 PID 1780 wrote to memory of 2436 1780 javaw.exe 87 PID 2436 wrote to memory of 3924 2436 cmd.exe 89 PID 2436 wrote to memory of 3924 2436 cmd.exe 89 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 5100 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Blank-Owner455.exe"C:\Users\Admin\AppData\Local\Temp\Blank-Owner455.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\MoonRar.jar"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:3984
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1717649098661.tmp3⤵
- Views/modifies file attributes
PID:5100
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1717649098661.tmp" /f"3⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1717649098661.tmp" /f4⤵
- Adds Run key to start application
PID:3924
-
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD50da1b5c9d8ba0b5c9ed7bbde977d7a1b
SHA1cf5193295373187006dc013d5f029c0fc89f0bd6
SHA256fbaf5fbe07b5cd1e1ed5d043d454e63c94f31d4e45f5033b3eef2b7d54685ae0
SHA5121e7ef9818164d914ddec001764acea4f35a16318276ee2075788de3c4cfe54081d6cdbd53a5a9cd1b21afa7f42df35b5917b32e217ffc5557160c662e171c05d
-
Filesize
830KB
MD5d8339dcc4a19345bd7cb55def570eef1
SHA1de69d3fe9a794282859c106e9a90e6647c1a0305
SHA2565eec9251dc8001252eec5303f4de828ee5d9dc079680d6d6ce6b192c10a1f7e3
SHA512207e56d4a3d2d60297d01098c23835482187fe444850f9abea8fb0e3f75e18d4c0403f0e893f30b51b307ccae020a512dec94f0963c29b429be5176613425fa7
-
Filesize
41KB
MD523ce59da9ae0a95c1d5d377e771d1102
SHA17caab2ede86e624f7f1a3b30d6f01898946cc7d7
SHA2564b0ead345a36035e04aaf62c99b9299cd22b34e5b0bfcfe9c5f7d14eebcb8fbc
SHA51206e74ec7527525012d832dd08ae33f4e2cf242656a69586ab3c8260bfc8331efd508ad0e4ffa4f49405e2b37766b9e248f3a9b59798a3173595804cc0e3c4a75