Analysis
-
max time kernel
147s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
06-06-2024 14:28
Static task
static1
Behavioral task
behavioral1
Sample
fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe
Resource
win10v2004-20240508-en
General
-
Target
fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe
-
Size
28.6MB
-
MD5
fa4039cebb06666bc73ef733762e63c5
-
SHA1
9cd57c22805f9d0aeb7e91440cef3a94926a8f1b
-
SHA256
fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae
-
SHA512
7cac94dd88cb023fc5f3abbc76e9af179a5380556c1ced492c4eec4ab7e02f67cb60822c1916b97b8ece70ce13fb7d557841607df73e6b631a97f83e95d81ba3
-
SSDEEP
786432:KCfHjIF5ZySaSYUNFXk269g+1yRNLwBlFS:tcHZySlX0242NLYS
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 8 IoCs
pid Process 1336 icacls.exe 1704 icacls.exe 1980 icacls.exe 2216 icacls.exe 1636 icacls.exe 328 icacls.exe 2772 icacls.exe 1340 icacls.exe -
Executes dropped EXE 14 IoCs
pid Process 1432 unpack200.exe 1640 unpack200.exe 2748 unpack200.exe 300 unpack200.exe 1332 unpack200.exe 2244 unpack200.exe 2424 unpack200.exe 2632 unpack200.exe 712 unpack200.exe 1856 unpack200.exe 2412 unpack200.exe 1776 windowslauncher.exe 3044 Remote AccessLauncher.exe 884 Remote Access.exe -
Loads dropped DLL 48 IoCs
pid Process 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 1432 unpack200.exe 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 1640 unpack200.exe 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 2748 unpack200.exe 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 300 unpack200.exe 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 1332 unpack200.exe 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 2244 unpack200.exe 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 2424 unpack200.exe 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 2632 unpack200.exe 712 unpack200.exe 1856 unpack200.exe 2412 unpack200.exe 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 3044 Remote AccessLauncher.exe 3044 Remote AccessLauncher.exe 3044 Remote AccessLauncher.exe 3044 Remote AccessLauncher.exe 3044 Remote AccessLauncher.exe 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 884 Remote Access.exe 884 Remote Access.exe 884 Remote Access.exe 884 Remote Access.exe 884 Remote Access.exe 884 Remote Access.exe 884 Remote Access.exe 884 Remote Access.exe 884 Remote Access.exe 884 Remote Access.exe 884 Remote Access.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 884 Remote Access.exe 884 Remote Access.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1432 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 28 PID 1732 wrote to memory of 1432 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 28 PID 1732 wrote to memory of 1432 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 28 PID 1732 wrote to memory of 1640 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 29 PID 1732 wrote to memory of 1640 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 29 PID 1732 wrote to memory of 1640 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 29 PID 1732 wrote to memory of 2748 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 30 PID 1732 wrote to memory of 2748 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 30 PID 1732 wrote to memory of 2748 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 30 PID 1732 wrote to memory of 300 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 31 PID 1732 wrote to memory of 300 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 31 PID 1732 wrote to memory of 300 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 31 PID 1732 wrote to memory of 1332 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 32 PID 1732 wrote to memory of 1332 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 32 PID 1732 wrote to memory of 1332 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 32 PID 1732 wrote to memory of 2244 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 33 PID 1732 wrote to memory of 2244 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 33 PID 1732 wrote to memory of 2244 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 33 PID 1732 wrote to memory of 2424 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 34 PID 1732 wrote to memory of 2424 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 34 PID 1732 wrote to memory of 2424 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 34 PID 1732 wrote to memory of 2632 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 35 PID 1732 wrote to memory of 2632 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 35 PID 1732 wrote to memory of 2632 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 35 PID 1732 wrote to memory of 712 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 36 PID 1732 wrote to memory of 712 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 36 PID 1732 wrote to memory of 712 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 36 PID 1732 wrote to memory of 1856 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 37 PID 1732 wrote to memory of 1856 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 37 PID 1732 wrote to memory of 1856 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 37 PID 1732 wrote to memory of 2412 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 38 PID 1732 wrote to memory of 2412 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 38 PID 1732 wrote to memory of 2412 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 38 PID 1732 wrote to memory of 1776 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 40 PID 1732 wrote to memory of 1776 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 40 PID 1732 wrote to memory of 1776 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 40 PID 1732 wrote to memory of 1368 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 41 PID 1732 wrote to memory of 1368 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 41 PID 1732 wrote to memory of 1368 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 41 PID 1732 wrote to memory of 1336 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 42 PID 1732 wrote to memory of 1336 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 42 PID 1732 wrote to memory of 1336 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 42 PID 1732 wrote to memory of 1704 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 44 PID 1732 wrote to memory of 1704 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 44 PID 1732 wrote to memory of 1704 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 44 PID 1732 wrote to memory of 1980 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 45 PID 1732 wrote to memory of 1980 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 45 PID 1732 wrote to memory of 1980 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 45 PID 1732 wrote to memory of 2216 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 48 PID 1732 wrote to memory of 2216 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 48 PID 1732 wrote to memory of 2216 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 48 PID 1732 wrote to memory of 3044 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 50 PID 1732 wrote to memory of 3044 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 50 PID 1732 wrote to memory of 3044 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 50 PID 1732 wrote to memory of 1636 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 51 PID 1732 wrote to memory of 1636 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 51 PID 1732 wrote to memory of 1636 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 51 PID 1732 wrote to memory of 328 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 53 PID 1732 wrote to memory of 328 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 53 PID 1732 wrote to memory of 328 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 53 PID 1732 wrote to memory of 884 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 55 PID 1732 wrote to memory of 884 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 55 PID 1732 wrote to memory of 884 1732 fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe 55 PID 884 wrote to memory of 2772 884 Remote Access.exe 56
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe"C:\Users\Admin\AppData\Local\Temp\fb64281df1cd259149fd9e7eaf2d68a6aa62f405a7214c789c64775babbd24ae.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\bin\unpack200.exe"C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\bin\unpack200.exe" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\lib\crs-agent.jar.p2" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\lib\crs-agent.jar"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1432
-
-
C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\bin\unpack200.exe"C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\bin\unpack200.exe" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\lib\charsets.jar.p2" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\lib\charsets.jar"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1640
-
-
C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\bin\unpack200.exe"C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\bin\unpack200.exe" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\lib\jsse.jar.p2" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\lib\jsse.jar"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2748
-
-
C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\bin\unpack200.exe"C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\bin\unpack200.exe" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\lib\ext\jaccess.jar.p2" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\lib\ext\jaccess.jar"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:300
-
-
C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\bin\unpack200.exe"C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\bin\unpack200.exe" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\lib\ext\sunpkcs11.jar.p2" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\lib\ext\sunpkcs11.jar"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1332
-
-
C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\bin\unpack200.exe"C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\bin\unpack200.exe" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\lib\ext\openjsse.jar.p2" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\lib\ext\openjsse.jar"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2244
-
-
C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\bin\unpack200.exe"C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\bin\unpack200.exe" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\lib\ext\legacy8ujsse.jar.p2" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\lib\ext\legacy8ujsse.jar"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2424
-
-
C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\bin\unpack200.exe"C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\bin\unpack200.exe" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\lib\ext\cldrdata.jar.p2" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\lib\ext\cldrdata.jar"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2632
-
-
C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\bin\unpack200.exe"C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\bin\unpack200.exe" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\lib\ext\access-bridge-64.jar.p2" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\lib\ext\access-bridge-64.jar"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:712
-
-
C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\bin\unpack200.exe"C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\bin\unpack200.exe" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\lib\ext\sunmscapi.jar.p2" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\lib\ext\sunmscapi.jar"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1856
-
-
C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\bin\unpack200.exe"C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\bin\unpack200.exe" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\lib\rt.jar.p2" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\lib\rt.jar"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2412
-
-
C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\bin\windowslauncher.exe"C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684106-6-app\bin\windowslauncher.exe" "-Xshare:dump"2⤵
- Executes dropped EXE
PID:1776
-
-
C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00084000053-complete\bin\unpack200.exe"C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00084000053-complete\bin\unpack200.exe" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684102-5-app\remoteaccess-jar-with-dependencies.jar.p2" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684102-5-app\remoteaccess-jar-with-dependencies.jar"2⤵PID:1368
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\JWrapper-Remote Access\JWApps\Remote_Access_ConfigureICO.ico" /c /grant *S-1-5-32-545:RX2⤵
- Modifies file permissions
PID:1336
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\JWrapper-Remote Access\JWApps\Remote_Access_ConfigureICO.ico" /c /grant *S-1-5-32-545:RX2⤵
- Modifies file permissions
PID:1704
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\JWrapper-Remote Access\JWApps\JWrapper-Remote Access-UninstallerICO.ico" /c /grant *S-1-5-32-545:RX2⤵
- Modifies file permissions
PID:1980
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\JWrapper-Remote Access\JWApps\JWrapper-Remote Access-UninstallerICO.ico" /c /grant *S-1-5-32-545:RX2⤵
- Modifies file permissions
PID:2216
-
-
C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00084000053-complete\bin\Remote AccessLauncher.exe"C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00084000053-complete\bin\Remote AccessLauncher.exe" -cp "C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00102236242-complete\remoteaccess-jar-with-dependencies.jar" -Xmx256m -Xms5m -XX:MinHeapFreeRatio=15 -XX:MaxHeapFreeRatio=30 -XX:MaxGCPauseMillis=500 -Djava.util.Arrays.useLegacyMergeSort=true -Djava.net.preferIPv4Stack=true -Dapple.awt.UIElement=true -Xrs -Dsun.java2d.dpiaware=true -Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2,TLSv1.3 -Dsun.awt.fontconfig=fontconfig.properties jwrapper.JWrapper "C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00102236242-complete\unrestricted\JWLaunchProperties-1717684113932-0"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3044
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\JWrapper-Remote Access\JWApps\Remote_Access_ConfigureICO.ico" /c /grant *S-1-5-32-545:RX2⤵
- Modifies file permissions
PID:1636
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\JWrapper-Remote Access\JWApps\JWrapper-Remote Access-UninstallerICO.ico" /c /grant *S-1-5-32-545:RX2⤵
- Modifies file permissions
PID:328
-
-
C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00084000053-complete\bin\Remote Access.exe"C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00084000053-complete\bin\Remote Access.exe" -cp "C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00102236242-complete\remoteaccess-jar-with-dependencies.jar" -Xmx256m -Xms5m -XX:MinHeapFreeRatio=15 -XX:MaxHeapFreeRatio=30 -XX:MaxGCPauseMillis=500 -Djava.util.Arrays.useLegacyMergeSort=true -Djava.net.preferIPv4Stack=true -Dapple.awt.UIElement=true -Xrs -Dsun.java2d.dpiaware=true -Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2,TLSv1.3 -Dsun.awt.fontconfig=fontconfig.properties jwrapper.JWrapper "C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00102236242-complete\unrestricted\JWLaunchProperties-1717684114356-1"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\serviceconfig.xml" /c /grant *S-1-5-32-545:RX3⤵
- Modifies file permissions
PID:2772
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\serviceconfig.xml" /c /grant *S-1-5-32-545:RX3⤵
- Modifies file permissions
PID:1340
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395B
MD5a946f6883966606308b8c583bc32bd2c
SHA1491fa9d872f8cc34d1bd60102b05aad7370e1e74
SHA2568cbee822069d7cda7d225c0752489bf282b6f770aa21f86d0e125f0651a8927a
SHA51216cbc6bab4d4dee67eb54a95239cced28a47d035a829fe21786f3cfa741fc6ebd863db7797315c5cb79fcb734dc7c0021e5f62908da4dc0322e3edf4add5f8e2
-
Filesize
13B
MD58199887131477d02232d372bc808cfd5
SHA1c172ffd15c0fb02432429632272a066b8516e077
SHA256e4c596fe101978f244b8f74be616d62bbaae083f881928da51255b0dba50d440
SHA5128623a7e6bb4673572c47035280cecbf09d02a71de54f86a2a3376de080df33af8dbe0d2e5c460779a899ca3d51e5b4c7b1a264ed4089af40b05c187524606026
-
C:\ProgramData\JWrapper-Remote Access\JWrapper-JWrapper-00102236230-complete\unrestricted\JWrapper-Remote Access-splash.png
Filesize9KB
MD5519e771bd88ed6412d06cbf9dc0b03bb
SHA18dc16c70266d8ac763706dede48309b9cbece1e0
SHA256a3a7f0dfbb7a487756a77493cffa4d1451274c1ec7efc1e4aef37938656e31c9
SHA5123d7f6263812dfe6da4bbd468e6999e7b305a08497ff25639d6274e6120e3da53ba1e7dee7e50bc752342a654bdabfba157e42b1774699ef13263467a9382cbd3
-
Filesize
11B
MD52a63324b3049e610efe09d2168c150c5
SHA10721afd49db4edfc68c9356a1b46a8dc9f3c38ee
SHA2561ed7f01050bff23c74d9cf214c6b535de0e8d913a96d7270c902bc96c7e8ca59
SHA51257fe0de7b79b7fb10c89b26edc070e4363b52e5522e696a5f962d76f2af60070625e78c688249574bdbe5c5289f5617804f9cd4b775da00452a0754613068b57
-
C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00102236242-complete\unrestricted\jwLastRun
Filesize13B
MD58ef6e42c684536c1b4e40d8d776b063e
SHA18f2df4eef5230255965f30b2d57f52491374df2e
SHA2562de8702ed8f38699cc0308dfd8f1435fbde2bd348df38316f4a8ee3405ce7a13
SHA512da17f724f805c239c4abbed6f00c5f0931bf0a886acd3c01c625fbf8f7982cb0ae290c29c93260387835e09ddf93a2de0fabf22ffd335b04bc78dfb7e4253a4c
-
C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684102-5-app\JWAuxiliaryArchive-Remote Access_linutils32
Filesize1B
MD593b885adfe0da089cdf634904fd59f71
SHA15ba93c9db0cff93f52b521d7420e43f6eda2784f
SHA2566e340b9cffb37a989ca544e6bb780a2c78901d3fb33738768511a30617afa01d
SHA512b8244d028981d693af7b456af8efa4cad63d282e19ff14942c246e50d9351d22704a802a71c3580b6370de4ceb293c324a8423342557d4e5c38438f0e36910ee
-
C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684102-5-app\remoteaccess-jar-with-dependencies.jar
Filesize20.6MB
MD5b37dcf579f99510eea0c422fb41c0d10
SHA17a950eaa09e53c70bd865fd8c203876adf61085e
SHA2569f5c71749dcead72a3eb4554c32f84428bc708ff39d605ba00a9510e49210648
SHA5127593b32dd028d8ab0f67e7d58a2fc60657854de139293197eb28989aa23ccb16d09fb3b055fe2b921a4e76560296af53e01bca7053126ca9607ff44de40e4a63
-
C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1717684102-5-app\remoteaccess-jar-with-dependencies.jar.p2
Filesize16.5MB
MD510978f35923c5289803866ea500a9738
SHA1d3f0b12b4c8df0303454e061b5228d649f2a1e46
SHA2567720c9ca4db8524abcf17705b9751ecfa435c6a059d62ad6654226f9c11adc36
SHA512a016c64118b32cab917014add3e4723c3c5653a141b0e5c972ef407328a6799f6c3a6aeb3f2d348688a49fc54fc8ced0f6d1f13e1cd9f1a742d32490931525ed
-
Filesize
809KB
MD5366fd6f3a451351b5df2d7c4ecf4c73a
SHA150db750522b9630757f91b53df377fd4ed4e2d66
SHA256ae3cb6c6afba9a4aa5c85f66023c35338ca579b30326dd02918f9d55259503d5
SHA5122de764772b68a85204b7435c87e9409d753c2196cf5b2f46e7796c99a33943e167f62a92e8753eaa184cd81fb14361e83228eb1b474e0c3349ed387ec93e6130
-
Filesize
2.9MB
MD595c96b758db5b270c574027da01826e7
SHA19546a1e1817847d185fda77ed807ef5c93beb5e1
SHA256a5054fc62377f0eb99fe75e17f3c08ed5fb64f120e0797e6722f51db176aa87f
SHA512b973fe482d769078a24417c840287292634a38e6f049ba4a8d1f91a9e0d246f42f18a2e869f211bb2a9f7f079d060a59bc7b258cd01761cafd70df09d8877b6a
-
Filesize
1022KB
MD518c2b0d47a25b263c555edc4305b3a62
SHA18a76193e200e5cefe782c617966282157a535087
SHA25662bcb3385c37e914be0ed0eb4e4c41f4b01a4a6123c784a8838aef53f35674fd
SHA512f805973fc99d46cd485806d9e4b5a4acf6462d9e900245a3e0208cbded18f78f8e1afb9ca29ed82876ecede79342932c1a4e2645a719ff1408f213f0c4c4b50a
-
Filesize
145KB
MD5d1f7a7fb0a46eda64b92d27bf48ff07c
SHA1e26e4f4b326e4e1e3a47a27b10f4f7335efecaf3
SHA2562ee219b2825d2174e5a03ff15a7bc3fa2a72d6322672abb2bc3be2ba7153f550
SHA5126034451481dcf2d4483e5edaae6c60197cb3a7f6c0ec726c7b0f8209632523d24ed7e4548df2942ed18e93c2cdd08a8d4be483d5329dd400aa97543de2b865e0
-
Filesize
83KB
MD57618098477e433a3297beec060e38554
SHA1e57585e7f78f8290a534bae6bbe85e89bf59b671
SHA25675e2fcd8e5db747c4f2619c67e9a6898b083318dbab0b4276052593a9ed22825
SHA512fc46a67c3c7e3bcb0f3e8e2611a749692fe4c2cdf1ac89b9e5013ddc6f58bbab4d012e58cd85901f0d171c8ff5e9e5ca3c08811abac38d89776f67dd1b72b56e
-
Filesize
191KB
MD54d15b4682bd758875cbdafeff2fe6bf7
SHA1741e6dd1ed48fe2d60db86e55653f8c3a0ae94f8
SHA2565eb097f8dafde9fde128f4551ecba725e8343b637a7564a7fe70b2eb35c9e983
SHA51298758c04d675bf9712f1622d8fb4b04199980e0beda3aec5e81d8d41d3f7cd2f0de1e0e89c42d79235e02bc12b332e90912b4f843c35e9c5b8380c91cef7060f
-
Filesize
68KB
MD5a9c19296cfff6730388171354874280e
SHA148db4034cd603d01603921f19bc623cb08e9c96c
SHA256e752dca0e0913fa722aa507538976e66e5425db6b3ef36001013b4398066b2b9
SHA51296517ff57b0328385b59a1f479e377e0563e316264fd6f9ca0c542c7c0b8669fe012e531ec4724fe85164dd950230c2bbbb1156408c67816832ea1163031231b
-
Filesize
3.7MB
MD5a2215ebc2eb45090237ab049407ff166
SHA1fa8780bb08079fa5a068257809c538b0b58afebd
SHA256b75092d771cee147d756f462e8b21dc846abc59199a3abda1ea2a04305e4117e
SHA512543efc2f87d7469d72c01d748176cacdfe160956c28721a5255266af40856c752a05ac75e9bc1b46faeb785e7a6323744e882ac996a8f3eb8bca4248154f3e7f
-
Filesize
3.9MB
MD5c70a80c9ac49fa51b2b77fc62a7b839d
SHA13e1a26f783c86fd60f03c7f3f2df7b739f621bc5
SHA2564431aec1f1ab898589de8487b57de2598b4659ae671d02859c3900da509b0b26
SHA51233f8fcb9192c4f08a7814e2af68b566c4695deef58feb5237d4f9e1daa315910c119102db19ab02e99adc8a7cd29def4a6440cf55c68717c994c6d6ac832fe9a
-
Filesize
42KB
MD5bdb0f2c26bc783803269facb7d43ec0f
SHA173afc0c4510fe6394e9359c4a6b495ed9f7d692d
SHA2564fde6b2f2c746db62ab5930b4abcecc966131535a83f2cc93067011d7071e6fd
SHA5124714127ffa2ef2b4a1789e70d7ade04056f3547d36016b82c7a49881367428a9c664e8f1b32817781c12fd4965dca9320dc9762ac829dbe90164ca1bd5f80ccd
-
Filesize
35KB
MD5171c05d2fefe375032a6babc7dd11515
SHA1dec20c83b6168dd5d3bb4935322e39e7c46ba3d8
SHA25629977238c33d12c08aef17139daed8d7ecf97b4f502c40a791062915705ebe52
SHA5129a84fb352224542453863c53f6dbf72829ea019b9d2a771420414daec27920a84e1ba3e6d3161d9b6b447b0ad6ff7088ca9bf1ba266be4757f113661efe03ce5
-
Filesize
418KB
MD580558729bb2edfc3b03b8dee73d527b4
SHA1521d59e97a3e254ecd9dd06b213ac0fda4c2983a
SHA256f17139ecb92b94a2a3909a5a2f2c8a5feee9afaf25e8cd2b5a8ab0fd3dd73c9e
SHA51280e5785beb2de61ea8cc9882e94e3abf99917556467ebf935297a9e0f7376b313850cdb0ffea2d98ada9db8c6b3a6104572399667e8cfde0cd537775e445b0ad
-
Filesize
271KB
MD53b997068ed80236ba82703b7c8275621
SHA163d2bbca29231220d5beb285c9cf263b4c93acb9
SHA25640799e64da3944f75ddb8e9a378c7d37fe8c94183f173717b2f08dad865cf89d
SHA512c67ca18a538ea12e0032728e575f25b11da6b847ec3eccceb59c53d18eddbc4d711d4684e8f60ed0da6e7149ab31a9f8c04ef45f5c5792ceb749c3f7e5b7ddb4
-
Filesize
1.3MB
MD5a2dd6baced76fe17ef8db6d6a6dca1ec
SHA126e46d9fb59464f895da1474ed0c545831311bd0
SHA25647545a341a3e7b99164150d000607e10b7b3a16caf3320090fc1e5c6128c13e1
SHA512a9472630786ca3369c3e1d9303b5430eb744c962d7287b95d75caaf00d15ef735c985e5093cc2d36dabfccaab2782210f71eec1be3cd1cc05886eaa969ddc947
-
Filesize
580KB
MD5558a800e89bc6c647e2909a0c91dd9f8
SHA18fcfec1b4e704661ff0c7599e0ee2ec60c69088c
SHA256ec51166a6f4796de2283de2a59e9143d953fe37bf9abbc71873a3978dbec85db
SHA51219e585b8d1c13ab511ee66615442fb2bce3bb529225b623271a8f27a58d76d541434ac02b619d55bbca03f1f9adae94745bc1f2504eadc7f00220b49ba6c13bf
-
Filesize
42KB
MD5199a840d4c8163628bc069703282476f
SHA11cd2bea3fedc312a9b470871fe87c8f301f8ef32
SHA256fd7de375f7cf8bb4edef258b73ec78966394318df262d4cb2a22bcbeb127f8e4
SHA51201fda70b4d77c221dd63d2a4e9eab587c667e8af22e920a44b64eb6208c8e96d9044d96a407a05849c2357fc2a9aa3264495ac6559df6df1e2ddfadd088d5aef
-
Filesize
21KB
MD54ea26f1be03d62f5170c551398913c5c
SHA1b633de9990e519dd878b5eb20e4f4d0441f96aca
SHA2569bf43b7dd1e1aa0270e6c250674a8c0d651ab85463ab0337bf09f04e574b6183
SHA512e8a0604ff89f570b2291e2192e4e9853981c867f60d471829e7d286c1b9c51db9afc31b52ca5e0428a2bc1c44ff7d875e1fdb7d6efb413b92d979b6f49aedfb2
-
Filesize
263KB
MD5af127a77a8798a63de54967af500c655
SHA1b4b82b535dd619607288fdfb739d1d56d6cc6c68
SHA256911970a9929e5e8a16d17ecb2884f81d5f7963636d327846e58139cbfae04fa8
SHA512b2a94cae4f434130ba579e3131abee5866b444ad7b1e7b51c1bec037c56324ee51e4fcd9ac4b2cbb9ebf17f0df414809a6c718250968921e789e6f45025abd4b
-
Filesize
164KB
MD5593de57a7abd58e4f31ac663254f85e0
SHA10684301a3b0433b51eba019c20560090d79eda15
SHA2563490e4a3ce662daeccc19aee199e22833f60a5e0f3743ffc99a80ba9b7be169c
SHA5122389ccc97199d64ac81d61c0de67ea25dadec0bc60b741de1247e1b718e5559a7348eb7e52e98e9ed7e20970495409fd8b075dc9d7f3ec1fd0f8733fcbacc19b
-
Filesize
1.8MB
MD5f6f84176ef383688b6c8eba60336a57c
SHA1f2c7e6a66c7c34d4c0005c89a533454eecf9b007
SHA2563dab1640802f083348c4ab929bfe2e4c8fe7757236b4550a81679d93cf0ed114
SHA512aeaf0da0334882b80b28de29d5f2a0e40ba8ae8d1fcd67e67ab0a3ee8b2948d2e6df6c153ea860871d5cf2ec5b97484a6c3050b9446e6d2249c353dd488dd5b8
-
Filesize
365KB
MD5048afc64953480883554a6b3135de599
SHA1a7c088c61b0178661012f10802e2de4d3eaec762
SHA256e935fa86aed1296e44c9b59aeee8d75fd8670d6ce23c1ed418e9af8cc862e9e2
SHA512d6adba78de8fb253f350d1098c54d0824a01e212c6499d8a666a26ed450cea4a2f6413ac9f47717d7781f25d5ac4bac61e094ab1ba199d556ea8e789fdd48224
-
Filesize
15.7MB
MD5d538beef841a0bf0bd057e663fa74048
SHA13f1a1351b0e66357f7a2f9f9bc85c1a7606f2fa3
SHA256d97e1a6356e7531e94c1a4457d9e3f41141408a397d4b06f5618d34cb50b423b
SHA5123aefd51aea1c1274ac2cd5b9716d8b198b79fe39d5d4b218ed3a23d159a75c9c35f13a59f0d9bdbc41b3d72eab23454fc7478868df6831fcabf64727125508bb
-
Filesize
631KB
MD54f901dd298645b5caad860c7dc40b867
SHA18c808f043689a0bc7dbad6054041ff1f1f73685b
SHA256eef69dd45c9b023b80083869a4a6071ef7be38eb9fc70b07ff0044135485e1f2
SHA5128e40c5b827d5ea7a4f38718bae7706b1f1468e3a78176151b339d370072e8bf44fb5854f3390c97da6f376205d289ca2866e9f6df3ea254cec2ccf7724d0b558
-
Filesize
243KB
MD53bc9749f5118f7d5f8c652cb59a60787
SHA1a570885b6085bb29ae31acf9b806ae7563ca2f56
SHA256061e2aa6fe2e27b6f2595b4703486c9bfb603cb276b780bc43f63b1f1b844198
SHA512fadfed1fc1ac700149bcce4343720465fc6fa5a96b4da48a7dfffcc0f3ccfc01593688f86d19a4da80bec8370130478fb6336110173d46282c38c443d723e661
-
Filesize
156KB
MD5c15b283310fcf536e39d816db8349990
SHA13db459debe6ebb1cd186e6b34687c62311367546
SHA25612687c8b9bc286807d3bcff6c26465a483900b05aa0da6d15871ea5e9a1ed96e
SHA5126c2193ad240a26fe12481057d9ce274c0bdd6e3f9491d9b7c611cff1fb5fb8aead309136076511c1e8037e2bbc5f930ea396f7ddfc1c08256f0356967b97228d
-
Filesize
96KB
MD51c5ae3178f47607de9674521c4ee26f2
SHA1f8991b430a2b8ded0982595e0ac50a2b9623d30d
SHA25608f3a8c065d952fcc5cae7a912adc46fe4d02029207b170feaae5410784fc851
SHA512b070cf3563025e6105acf04c872eb234b5891c99ed50db91050b329de55c9ee4339d3f2fdbac184901e6869c861d3cfe079d9eb88bd786183e3f7937b84c8cb8
-
Filesize
8.6MB
MD52bd9330f2caff97fe12f4a330ae1f107
SHA13ab7e69839c584a16328d773a657245e19f32847
SHA256f8473f869f6ce88126eabb6ae4b1b765caf2780faabfb734287f33fa9af9df1e
SHA512aa3b99ac1ec80e4dc665ebcd5262cc6818f62734e9063ecf4b1bf6ec099c391d1eeb26108677a841b28ec2c558322dc3b114b75206d0aee196f659a263540c46
-
Filesize
48KB
MD538bdc89172aca98a8df57cc6b0e5e8db
SHA12448538975c6daf00f4014d166ebb014d2374e8f
SHA256981dafa227a6ff4e1bf9a38d94800b28f1e39adc6fe5f76b9362206bd7346ebe
SHA5129fc3d626948f0990a311e3710786f6028e66cf75d6926c3d433526a349c93492cf7b7b1bfe7499eb88970e5342fd0201b58b7f227bfc009057dea7517b67b29f
-
Filesize
77KB
MD5a9040ad98ad82934efbac3de57f9acc2
SHA1904e1b26aa21b7e7c065706ac4065ec43310b2a0
SHA256cf661a6d7172f64f3a7d9559eba32c3363ea26a913ae56420a0a184a42198320
SHA512848678c637349d59b5947a50ae6736882b260f00b31ed6b39d205a28bd9d9415e43bc7499c8cc5b3f1dc2b6b476f964583aa3bdb8fffbc6f35f363bad3d694ae
-
Filesize
195KB
MD5ffae954c09033df1ebcd4fe056b183f2
SHA1ee369cf9a6d4ab2f91a05fe84bf790fdda873669
SHA2562f5955b1d5bfd13f0c3b70c5a261df5d524a849a45c0d31f64478188cbe82665
SHA512be00fc9c0242d27e0f8cca0a0af39bcee502683dd0246e7453b6b4aebccd81ea221a4b14ccef48244920a180bc268132f7ca4584efa46a648a7bec9c1a7da3d4
-
Filesize
169KB
MD5a46bb5fba9e69463fb89039d19fea2b0
SHA1a96561051f7cd1d10c87bfad290c5131191686d3
SHA256214b6e8108349c7bb4944b4d20bbc44c8b2e55ed69dc28f8651e44bf72dd9dcf
SHA51205a6fd898bd21a9714516def4b564cba252d633ddefa582ffb1920d5ba9fe551d8bc168dd78e4658524aee8e91b2e815d3f800b89357a61d133d90a65653cfcc