Analysis

  • max time kernel
    94s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 01:55

General

  • Target

    bin/DemoApp.bat

  • Size

    7KB

  • MD5

    fb015ab45a48d78d3542fa754efd52d1

  • SHA1

    7578a739d562e3bb66549b8662a7d2349e91219e

  • SHA256

    69acf402f93c5aa3891db97dab1e272af3e5b7dd8f4a434dc242e3bd5369baa7

  • SHA512

    d3e0a6ffb41ddbc4ad3a2c8d805bca2b3d9f004ddf5032d4af8882b993bb135d8d6524d25eda3d5596ec72d05b88100431a7ed1c1c1b82970f87db15352b1a9f

  • SSDEEP

    192:K0Sg9LOdESeRAZ8Kl7/fAD1T1yBBjxDcDY6mjX:Qg9LOdjtZ8qDfAnSto6

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bin\DemoApp.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Users\Admin\AppData\Local\Temp\bin\wrapper.exe
      "C:\Users\Admin\AppData\Local\Temp\bin\wrapper.exe" -c "../conf/demoapp.conf"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2512
      • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
        "C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe" -version
        3⤵
          PID:4692
        • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
          "C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe" -classpath "../lib/wrapperdemo.jar;../lib/wrapper.jar" -Dfile.encoding=Cp1252 org.tanukisoftware.wrapper.bootstrap.WrapperBootstrap 1 org.tanukisoftware.wrapper.demo.DemoApp 0
          3⤵
            PID:4744
          • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
            "C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe" -Dfile.encoding=Cp1252 -Djava.library.path="../lib" -classpath "../lib/wrapperdemo.jar;../lib/wrapper.jar" -Dwrapper.key="fmZbb3Vlt1jRUWJ9" -Dwrapper.port=32000 -Dwrapper.jvm.port.min=31000 -Dwrapper.jvm.port.max=31999 -Dwrapper.pid=2512 -Dwrapper.version="3.5.59" -Dwrapper.native_library="wrapper" -Dwrapper.arch="x86" -Dwrapper.cpu.timeout="10" -Dwrapper.jvmid=1 org.tanukisoftware.wrapper.demo.DemoApp
            3⤵
              PID:5088

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4692-7-0x000001332BEB0000-0x000001332C120000-memory.dmp

          Filesize

          2.4MB

        • memory/4692-17-0x000001332A5F0000-0x000001332A5F1000-memory.dmp

          Filesize

          4KB

        • memory/4692-18-0x000001332BEB0000-0x000001332C120000-memory.dmp

          Filesize

          2.4MB

        • memory/4744-22-0x0000022E81410000-0x0000022E81680000-memory.dmp

          Filesize

          2.4MB

        • memory/4744-32-0x0000022EFF7A0000-0x0000022EFF7A1000-memory.dmp

          Filesize

          4KB

        • memory/4744-33-0x0000022E81410000-0x0000022E81680000-memory.dmp

          Filesize

          2.4MB

        • memory/5088-46-0x0000018474110000-0x0000018474111000-memory.dmp

          Filesize

          4KB

        • memory/5088-52-0x0000018474110000-0x0000018474111000-memory.dmp

          Filesize

          4KB

        • memory/5088-55-0x0000018474110000-0x0000018474111000-memory.dmp

          Filesize

          4KB