Analysis

  • max time kernel
    1485s
  • max time network
    1498s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240611-en
  • resource tags

    arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19/06/2024, 14:16

General

  • Target

    priest-allinone/lib/UI_SE.jar

  • Size

    1.4MB

  • MD5

    0662d519df5b945d1500e23eb1ab1a98

  • SHA1

    56092b77e64fdc47e4d1ef080cc00ac5583f5ded

  • SHA256

    cf78b06c05115d65ffc4915100b6a62c0aa5dd439b525ff69a12e4daeb0ac129

  • SHA512

    e57583ab8873c8db29c7c18668c4396a33a021f8352cc3d44f0792a636a7592994e780cc9d7e0e3c92c4709d8fa95ca63573aab381748f4a9129453256abdf28

  • SSDEEP

    12288:wQSXwdz7ti9HnDrUth6k1qVDRT1cexMaynDFkPWBl2f7alRJu5bkvu2Vxod6WBKD:wQKsuHSJ1qzCtasFk+D2zeykUzcO0

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\priest-allinone\lib\UI_SE.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4760
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:4088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    601697c776688cdc8536145ed175d3a9

    SHA1

    08640f8e01e77193574d9d3a0aa19a7f23daeaa8

    SHA256

    b39399d02b3a97c6aecc757b8ff4f0615cc8ae3e516ed59143b81c28bc0e22c5

    SHA512

    365e01040452cf5f79cbbaf01e1543d2a0200cb3c6391c0de34189457f6540f4334154f5d98127024b4913efd87885e0c3c57bd1de2e6ff430b95a2847688b02

  • memory/4760-2-0x000001F16B370000-0x000001F16B5E0000-memory.dmp

    Filesize

    2.4MB

  • memory/4760-12-0x000001F169B80000-0x000001F169B81000-memory.dmp

    Filesize

    4KB

  • memory/4760-13-0x000001F16B370000-0x000001F16B5E0000-memory.dmp

    Filesize

    2.4MB