Analysis

  • max time kernel
    77s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-06-2024 01:17

General

  • Target

    GlobalProtect64/.install4j/user/flatlaf.jar

  • Size

    567KB

  • MD5

    de36b2deec6741f742cfc65e7b4942c9

  • SHA1

    b340f36ab424075477f28076053383f5496b5f0f

  • SHA256

    0dec40ef8e67d1fe6140832808be2cf85bb5110b78266a6117b0be068bb343d4

  • SHA512

    91c82273f0998ab1b16403089807704e392ba8002cabfcb53f5c4958c2aeca3d1caf2911aeaadc486a124b133ebd14104f9ff695c766ab3d625e5d0bb49cc24f

  • SSDEEP

    12288:0j1dtDcKKsj/WgXc8dXX+PHjBbhPX+yj0xcNheuE+zl/:0j1ncKKsVrXUvOyj0SNhWSl/

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\GlobalProtect64\.install4j\user\flatlaf.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:1144

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    c7bddcb9f330dfebc56291e1470502ca

    SHA1

    9f09aaf61da0f19dba8e4267d50519b83bf32acd

    SHA256

    72eab6ed5310bb012abc14710fff5940565aa310db239d68935d504f2d22734a

    SHA512

    163b9d7c575d87d64b6da6cc2fda7b680f7823a7183577124ff2658791517085a8fd009115c6914d314de832db63b9ce9efafb2cd60ca3b1652f7860a46dacd9

  • memory/1616-2-0x0000017E22E70000-0x0000017E230E0000-memory.dmp

    Filesize

    2.4MB

  • memory/1616-12-0x0000017E215C0000-0x0000017E215C1000-memory.dmp

    Filesize

    4KB

  • memory/1616-13-0x0000017E22E70000-0x0000017E230E0000-memory.dmp

    Filesize

    2.4MB