Overview
overview
7Static
static
1priest-all...UI.jar
windows11-21h2-x64
7priest-all...id.apk
windows11-21h2-x64
3priest-all...op.jar
windows11-21h2-x64
7priest-all...ava.js
windows11-21h2-x64
3priest-all...x.html
windows11-21h2-x64
1priest-all...SE.jar
windows11-21h2-x64
7priest-all...al.jar
windows11-21h2-x64
7priest-all...DP.jad
windows11-21h2-x64
3priest-all...sT.jar
windows11-21h2-x64
7priest-all....3.jar
windows11-21h2-x64
7priest-all...le.jad
windows11-21h2-x64
3priest-all...SE.jar
windows11-21h2-x64
7priest-all....1.jar
windows11-21h2-x64
7priest-all...OT.jar
windows11-21h2-x64
7priest-all....2.jar
windows11-21h2-x64
7priest-all....3.jar
windows11-21h2-x64
7priest-all....3.jar
windows11-21h2-x64
7priest-all....2.jar
windows11-21h2-x64
7Analysis
-
max time kernel
79s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/06/2024, 14:16
Static task
static1
Behavioral task
behavioral1
Sample
priest-allinone/PriEsTGUI.jar
Resource
win11-20240508-en
Behavioral task
behavioral2
Sample
priest-allinone/PriEsTMobile_Android.apk
Resource
win11-20240508-en
Behavioral task
behavioral3
Sample
priest-allinone/PriEsTMobile_Desktop.jar
Resource
win11-20240611-en
Behavioral task
behavioral4
Sample
priest-allinone/deployJava.js
Resource
win11-20240419-en
Behavioral task
behavioral5
Sample
priest-allinone/index.html
Resource
win11-20240611-en
Behavioral task
behavioral6
Sample
priest-allinone/lib/IO_SE.jar
Resource
win11-20240611-en
Behavioral task
behavioral7
Sample
priest-allinone/lib/JMetal.jar
Resource
win11-20240508-en
Behavioral task
behavioral8
Sample
priest-allinone/lib/JamaMIDP.jad
Resource
win11-20240611-en
Behavioral task
behavioral9
Sample
priest-allinone/lib/PriEsT.jar
Resource
win11-20240508-en
Behavioral task
behavioral10
Sample
priest-allinone/lib/PriEsT1.3.jar
Resource
win11-20240611-en
Behavioral task
behavioral11
Sample
priest-allinone/lib/PriEsTMobile.jad
Resource
win11-20240508-en
Behavioral task
behavioral12
Sample
priest-allinone/lib/UI_SE.jar
Resource
win11-20240611-en
Behavioral task
behavioral13
Sample
priest-allinone/lib/beansbinding-1.2.1.jar
Resource
win11-20240419-en
Behavioral task
behavioral14
Sample
priest-allinone/lib/gral-core-0.9-SNAPSHOT.jar
Resource
win11-20240611-en
Behavioral task
behavioral15
Sample
priest-allinone/lib/jama-1.0.2.jar
Resource
win11-20240508-en
Behavioral task
behavioral16
Sample
priest-allinone/lib/javautil1.3.jar
Resource
win11-20240508-en
Behavioral task
behavioral17
Sample
priest-allinone/lib/jmetal1.3.jar
Resource
win11-20240611-en
Behavioral task
behavioral18
Sample
priest-allinone/lib/pca_transform-0.7.2.jar
Resource
win11-20240508-en
General
-
Target
priest-allinone/PriEsTGUI.jar
-
Size
194KB
-
MD5
563a672e61cfb9e7608999398112d7de
-
SHA1
8bbe8416bfe8ad6904731aec490906f775948680
-
SHA256
c4e05418a6dba81ef94458b785b330a92158147f00ad99b9a57151dfd36faf4f
-
SHA512
d7d45a37feee8b27dd3aaadb9ce0f7e5063ff2c4ffc9c71a95e85eca1005ce432061a36410e7a09bb33b6dc4b5b3c45d5e664e6121fee39f84e1fbdc5f031312
-
SSDEEP
6144:OZ4m3GoOkSGKcTt442eT2OdN9vCUs/6SU/:DMIcTta5YnvCtiT/
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4512 icacls.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ java.exe Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ java.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1844 java.exe 1844 java.exe 1844 java.exe 1844 java.exe 1844 java.exe 1844 java.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1844 wrote to memory of 4512 1844 java.exe 78 PID 1844 wrote to memory of 4512 1844 java.exe 78
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\priest-allinone\PriEsTGUI.jar1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:4512
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:4704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD55fe7c82399097d219e7226584c4bb7bb
SHA1ce8292750964095bbeab8b5e0796e57ef27918b5
SHA256c8abf3c05cf8d52aa17b9ce248337dc75ae668b22c7e04253e6eeee66263b18d
SHA512992252e8607a4746e4ecbbd483e99806785e27615b73800f49f1a04f9c6449cef21c69ce2ae9992dbcb9eabaa67cdbf0f4141fcc8c79f2bac1a9b029a58be474