Analysis

  • max time kernel
    1484s
  • max time network
    1497s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240611-en
  • resource tags

    arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19/06/2024, 14:16

General

  • Target

    priest-allinone/lib/IO_SE.jar

  • Size

    198KB

  • MD5

    c0893de9f986ed61c25690570aab3216

  • SHA1

    27198bea31c07f242a1205a9c47532756444df80

  • SHA256

    90d6c886a1343d088ef831cde1f39b884d01d991eae3b7259ae9ee7b379c37e8

  • SHA512

    aa795f527ac43e77fb64eb28d1df8d7166c9d602798cabe8b51afff5e63ba8c6c7d14ed687b58019a071d16c063dc0d259ba9dc68bec1e444ebb5e85933afda9

  • SSDEEP

    3072:mC6gl7ccpP6GUH8NA5/KnKlETMEJmEpvsSvuO0h2oDxkJ3ZldWUwrFUynQ/UT1Ft:mGl9WEh/UZ

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\priest-allinone\lib\IO_SE.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:3708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    c6516aed6024a894ed9c109d2904ed38

    SHA1

    1d9598eb38b931f1715ed11e2b409cc15fd7e503

    SHA256

    95c89de716ceebdfb26bbf251d86c79292462481a123869f43703f9d6492b449

    SHA512

    05e4fa9843a98cbfedd3e889c90e2650dd4d1ab6575925f893af75e5a1e5cf33c909cdc4f293ea99ae97acaa74cff29e548fa2184a5046e6a69bb964fcadf91d

  • memory/2056-2-0x0000023B8A4C0000-0x0000023B8A730000-memory.dmp

    Filesize

    2.4MB

  • memory/2056-12-0x0000023B88BD0000-0x0000023B88BD1000-memory.dmp

    Filesize

    4KB

  • memory/2056-13-0x0000023B8A4C0000-0x0000023B8A730000-memory.dmp

    Filesize

    2.4MB