Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
01-08-2024 21:21
Static task
static1
Behavioral task
behavioral1
Sample
launch.bat
Resource
win10-20240404-en
windows10-1703-x64
2 signatures
150 seconds
General
-
Target
launch.bat
-
Size
50B
-
MD5
11f888c721558d771d9d7e203146102e
-
SHA1
87b76b891ea646de40798dcd2522065f68aaea0d
-
SHA256
9fd1f058d59563dd1dd723608304d989f5ee91b20166755b77a8aa87c795e295
-
SHA512
6023860eeca2a817b3c4866ec74e39bce008a16f6a6fc11bfc63acc2d346f371af579b9ffc2655ad953e2379d3edefb4f1ad658bf2dd99ce7f87efe7407d33bd
Score
7/10
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 824 icacls.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 4288 2064 cmd.exe 74 PID 2064 wrote to memory of 4288 2064 cmd.exe 74 PID 4288 wrote to memory of 824 4288 java.exe 75 PID 4288 wrote to memory of 824 4288 java.exe 75
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\launch.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar Adjust.jar2⤵
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5bdd80cdec28e4eb692a4677eec596a0f
SHA1eff8adf0216d54a96bdc8cb301335a3d11c70c48
SHA256c28797292f995302d0145cb1181a83d417e0163bf5d5b57bab189b575a03d539
SHA512d6215ee7a1cb2d2430c06fb13f4eb5910492d84425822957db9001c75479c38a79ba97431e0146ba1a864c04efcd4664c61fe979a0678606d1a3e2ab5116bfda