Analysis

  • max time kernel
    133s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-06-2024 12:31

General

  • Target

    macjihuo-2022/micool_macconfig/configfile/yz/active-agt-goland.jar

  • Size

    47KB

  • MD5

    2fa1b1364515dce93eb67c423b570deb

  • SHA1

    2a723c2ef30be4a5c167c6639bf9ec0b9c7e7ca2

  • SHA256

    3acc4e9d91793f6909458a4761b75b6da45c8868e75dca33c9fec63659202995

  • SHA512

    0b6cf7caf6d48419251d0aa1ccf280536eb20b1f108f874a9ce86943601c2317833031578fc869366e3bc40dedfabfd64527598ea63b879bc77f82a9a218766b

  • SSDEEP

    768:Oh7IDIGjwZyHIwcctMtI+xIfo1UC6cB+P9146lp3fbYHfkWvQdptYc4klY:KSIG0ZuIQMtI+xIrTcB034673fbgvYI

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\macjihuo-2022\micool_macconfig\configfile\yz\active-agt-goland.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:1488
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4360,i,17096020621006928097,15544233752327415349,262144 --variations-seed-version --mojo-platform-channel-handle=4584 /prefetch:8
    1⤵
      PID:3164

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

      Filesize

      46B

      MD5

      2268ec75f82d72ffd738cee8f24b7b43

      SHA1

      9dd842ace0e6b515e7fff8f9a9fa9008b1ec7b15

      SHA256

      c824118f582e1ff0ead001530db226b6ca26094274a938095b7ea35196cd519a

      SHA512

      c438a873fc6df5914cd9eb220a9855269ec3b4a2b3e2238b8b32f7579dcdac3cce00c27d33d893644fbb9d32ad9771c71c3c892686d147902127512eef0dcebc

    • memory/2280-2-0x000001ADA9380000-0x000001ADA95F0000-memory.dmp

      Filesize

      2.4MB

    • memory/2280-13-0x000001ADA9360000-0x000001ADA9361000-memory.dmp

      Filesize

      4KB

    • memory/2280-14-0x000001ADA9380000-0x000001ADA95F0000-memory.dmp

      Filesize

      2.4MB