Analysis
-
max time kernel
144s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 22:14
Static task
static1
Behavioral task
behavioral1
Sample
Acrimony v1.0.3.jar
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Acrimony v1.0.3.jar
Resource
win10v2004-20240508-en
General
-
Target
Acrimony v1.0.3.jar
-
Size
153.3MB
-
MD5
b7f8825129b75394874213af64215eb9
-
SHA1
5e80be2e02fb1dd1f14c2f1f14be33b76fbf49cd
-
SHA256
19592ba59bd4dafe3e80d789c69509876eaab375b8e285cf30e3edf10a6f3997
-
SHA512
bb30e834c2f5b0f3970982b494500dfcfc404a8f912982f227dae68368f61649cd953ddd6d176006e9af1717aeb9df045f40eb5af3a504095eac4858ab3bc59f
-
SSDEEP
3145728:JxRrXzNI3KUt3bHVz9RUt3fnT4ExO4F4zWU5rkOipKHj2EHUOubN1wUsegc:9rpuj3DVz9ut746ezLrtHVHIbNAc
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3604 icacls.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3432 wrote to memory of 3604 3432 java.exe 81 PID 3432 wrote to memory of 3604 3432 java.exe 81
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\Acrimony v1.0.3.jar"1⤵
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:3604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5c552700dcc85753f7e7b7d5cbd112e42
SHA1a52318e6660f023a87346c31eac8f51583fdb25a
SHA2560193b277fb590e8cffa673753e55779ede59ade0874a513d9506248208e8726f
SHA512da0a439372f3db81fec1d21efa25e5ce6962e7a77a51b9a9ba2500bc85e9210387eea363ac2f4422f8008e6ecc3e5449d081466c2e3b5021979148fbb6d2306b