Analysis
-
max time kernel
0s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
15/06/2024, 21:37
Static task
static1
Behavioral task
behavioral1
Sample
[DL]-Breeze-Forge-Cracked.jar
Resource
win10-20240404-en
General
-
Target
[DL]-Breeze-Forge-Cracked.jar
-
Size
6.4MB
-
MD5
0558e393c43a6a62b97934db9cca3cd9
-
SHA1
fce58385bcb487ff3ba4700402aad893a1bbfd75
-
SHA256
e17e03796f07a79228e86920a21cf1a7dd568e7c1723b65167346959b1517e12
-
SHA512
6c0182355e1b95470e66bc924360a95e76584dfe4edb3df59775f452eb3a09f55957a8192e4ea70903d2d924d649c18f68d3e6408519dfb7f151c66c0cf43526
-
SSDEEP
98304:97J+n9DXUDAiGRtLc2xMEkr594/EqqfdpZkzkZz0liAIxiRuf7a0KSgT07Y9ZKQ:9V+9DGA/MEkX4bO4Wz0liAI2c7+TRKQ
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 32 icacls.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 712 wrote to memory of 32 712 java.exe 73 PID 712 wrote to memory of 32 712 java.exe 73
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\[DL]-Breeze-Forge-Cracked.jar1⤵
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:32
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5057ecb72c419ca2bde28b3c312af7d0d
SHA1be08026d8257236a9d020687ebfacfab16e1c78d
SHA25643605b5d8cb95b263d08f4dadf4e8e93cdc1dceb2747a140a41c25f645d7bf53
SHA51212a1e0af9361f70589d9adbcddf50b810da1a144fdaa8a0b76430c91e35e34325fb03a8b145abeeab3730afeef2907596208a234662dc5de17e66d4839323152