Overview
overview
10Static
static
102024-08-08.zip
windows10-1703-x64
10163684970...64.exe
windows10-1703-x64
80581756a65...1b.exe
windows10-1703-x64
306fcfd75f4...40.exe
windows10-1703-x64
6083b02e212...c7.exe
windows10-1703-x64
3087a3b8725...c9.jar
windows10-1703-x64
708c7fb6067...a2.exe
windows10-1703-x64
30e85d0a9fc...50.exe
windows10-1703-x64
60f1b66752d...9d.exe
windows10-1703-x64
30f2abe41f4...70.exe
windows10-1703-x64
100f8a6d8705...e5.exe
windows10-1703-x64
101026da21d9...42.exe
windows10-1703-x64
10109927ded1...91.exe
windows10-1703-x64
615c71b616f...79.exe
windows10-1703-x64
1017b5394a5c...70.exe
windows10-1703-x64
101873c4b2bd...d4.exe
windows10-1703-x64
1019efe1624f...3c.exe
windows10-1703-x64
101de0ce90e5...f7.vbe
windows10-1703-x64
11e6ad08c5e...5f.exe
windows10-1703-x64
101f7cedbe04...4c.exe
windows10-1703-x64
1022586df437...62.exe
windows10-1703-x64
1029f90a4f62...e6.xls
windows10-1703-x64
12b34ad054e...da.exe
windows10-1703-x64
102bb032333f...2c.exe
windows10-1703-x64
32bda6048a8...dc.exe
windows10-1703-x64
72c7da6690b...6a.exe
windows10-1703-x64
42caf283566...2e.exe
windows10-1703-x64
10300d87987d...45.exe
windows10-1703-x64
7353a75d0ad...a5.exe
windows10-1703-x64
7391ac1ceed...57.exe
windows10-1703-x64
7d4cb60a0e9...01.hta
windows10-1703-x64
10e0fa6d69b2...1e.msi
windows10-1703-x64
6Analysis
-
max time kernel
123s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
10-08-2024 17:49
Behavioral task
behavioral1
Sample
2024-08-08.zip
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
01636849700a046589f6e2b58ca6b02ec108fd20534973f83737f1749af16e64.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
0581756a656ace2e7d164b1f66846e9d079755bd7a5cead72e73b53ab534531b.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
06fcfd75f456e542f161dc3e74b1c7ccc52e6cded909f5f06e00c847e5bedf40.exe
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
083b02e21246fa17ee9ac50eab39033abd920274259ad848df9eb412d4350ec7.exe
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
087a3b87252a021f6f3696f496d4fd890f28fc31735d8f850aa1184ed7bf59c9.jar
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
08c7fb6067acc8ac207d28ab616c9ea5bc0d394956455d6a3eecb73f8010f7a2.exe
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
0e85d0a9fcf30f823c43e697f99cf61743ef1d29228e160f19005e343f2a5b50.exe
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
0f1b66752dea36f9ad237a452b4bfb2950ab3ce90fcd920c6708f69ee8ce8c9d.exe
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
0f2abe41f47c8287b81f6f5be7983b8486b298d7121bbc8435ccd334a5f7ce70.exe
Resource
win10-20240611-en
Behavioral task
behavioral11
Sample
0f8a6d8705eba15b8958bd7984d9c46f1f5510790249b3fa330740a626ef45e5.exe
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
1026da21d95ab9bc3a5dff5163d8029ea6ca3413e586272074105e4727ab1342.exe
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
109927ded1c6f8ce79192bc804efab8f52e6924d16476236eef82a1631349d91.exe
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
15c71b616f8ff314907e2e9f15601adc81529f6129acd67751bf7d16b4d52479.exe
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
17b5394a5cea17aa14672179b10eb87f650675bbabb6bbf12e5cb62916c62770.exe
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
1873c4b2bde16da1d2e923d66d20eea2536bc824e5134b60f3df4b770edf72d4.exe
Resource
win10-20240404-en
Behavioral task
behavioral17
Sample
19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe
Resource
win10-20240611-en
Behavioral task
behavioral18
Sample
1de0ce90e503e10f763f00b591d48973bb213d3979c517097b252881630257f7.vbe
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
1e6ad08c5ed9b4fdbef86181e8cd01170fe9ec5615d9a37f90e7ea43bcad175f.exe
Resource
win10-20240404-en
Behavioral task
behavioral20
Sample
1f7cedbe04af43e29efdfecce0580ab826b577bd0d7c9f6db3d1c58a8eeffb4c.exe
Resource
win10-20240404-en
Behavioral task
behavioral21
Sample
22586df4379d432c8e5d2d852bbecf70558da09f77ec0f7ac46d28e4928a7462.exe
Resource
win10-20240404-en
Behavioral task
behavioral22
Sample
29f90a4f6266e43e668b41187ef4e8c2acdfccab8a8c898e64349a5432081ce6.xls
Resource
win10-20240404-en
Behavioral task
behavioral23
Sample
2b34ad054e9dde8cbc0abfbe1379a7f0343cb32d92f3411ec2c2ff02ae5673da.exe
Resource
win10-20240611-en
Behavioral task
behavioral24
Sample
2bb032333f6f2199f35a512aa920a651975ea1b4c3aa7fac0ad69efa2539f42c.exe
Resource
win10-20240404-en
Behavioral task
behavioral25
Sample
2bda6048a888003443cd18df65f75441974ea3dfa04d524c957b0d7c268654dc.exe
Resource
win10-20240404-en
Behavioral task
behavioral26
Sample
2c7da6690be26bd6b5ceea90b233fdd26589d7a72b2a62468903aba887e7ad6a.exe
Resource
win10-20240404-en
Behavioral task
behavioral27
Sample
2caf283566656a13bf71f8ceac3c81f58a049c92a788368323b1ba25d872372e.exe
Resource
win10-20240404-en
Behavioral task
behavioral28
Sample
300d87987d360bd4abc2927a791031f41450cdf547c830902107daceba263a45.exe
Resource
win10-20240611-en
Behavioral task
behavioral29
Sample
353a75d0ad34c89fbdd11ec9cc6f6ea302f5669c5c1326686f7d328e656d1ea5.exe
Resource
win10-20240404-en
Behavioral task
behavioral30
Sample
391ac1ceedd3c960f32890f834a86ba1570ee5a0cc12dcef1714d43bb29fc457.exe
Resource
win10-20240404-en
Behavioral task
behavioral31
Sample
d4cb60a0e93c856f642f862e51cf4af34f626c8d1e1b995b5e9dfb3e72db1101.hta
Resource
win10-20240404-en
Behavioral task
behavioral32
Sample
e0fa6d69b26f18cfdef3bd930d067eca476b3d2cb78d14bec88f05ae87d25b1e.msi
Resource
win10-20240404-en
General
-
Target
087a3b87252a021f6f3696f496d4fd890f28fc31735d8f850aa1184ed7bf59c9.jar
-
Size
275KB
-
MD5
37d9c9c214040d54e8d7219b851ca3f2
-
SHA1
ea8f7ea6f0e3dd53d06c8fc4b7a956ec0642051f
-
SHA256
087a3b87252a021f6f3696f496d4fd890f28fc31735d8f850aa1184ed7bf59c9
-
SHA512
668b42f6f187232bdccf65714904d5e0e64ac792d7264262dc50fe4d5e42149b3b433a5020c0c2460c8ee4e4df4b33122545319c352ceee1577be09cf3b4530e
-
SSDEEP
384:jx+mssvoys0HC4bKgOA1lZJXk0oHA/lpk7TcADrKL1VR3Im:jjs+aoCPbA1rJXuH+2EADrcd3
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windowsdef.jar java.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windowsdep.jar java.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2756 icacls.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1324 tasklist.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000_Classes\Local Settings java.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4060 NOTEPAD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1324 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5028 java.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5028 wrote to memory of 2756 5028 java.exe 75 PID 5028 wrote to memory of 2756 5028 java.exe 75 PID 5028 wrote to memory of 1324 5028 java.exe 77 PID 5028 wrote to memory of 1324 5028 java.exe 77 PID 5028 wrote to memory of 4060 5028 java.exe 80 PID 5028 wrote to memory of 4060 5028 java.exe 80 PID 5028 wrote to memory of 3544 5028 java.exe 81 PID 5028 wrote to memory of 3544 5028 java.exe 81
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\087a3b87252a021f6f3696f496d4fd890f28fc31735d8f850aa1184ed7bf59c9.jar1⤵
- Drops startup file
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:2756
-
-
C:\Windows\SYSTEM32\tasklist.exetasklist.exe2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\Microsoft\087a3b87252a021f6f3696f496d4fd890f28fc31735d8f850aa1184ed7bf59c9.txt2⤵
- Opens file in notepad (likely ransom note)
PID:4060
-
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Roaming\Microsoft\res.jar2⤵PID:3544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD55110c466ad9db869e9c3fc058f67326d
SHA17d7fd7e97b9a92b8c188b2a1d2e454cdabd293fd
SHA25646b072c3d27bb1d9f4e94530996bba84c7391642f44791bf6ff503e3a0949c9e
SHA5128546f70bd203025e6bc5588ef66c9c112e5513da25bf0ebecb8d55556ca0f36e3904ceb711e66dcd9b7e00dbbd8b1eb871452adc0240efe38667bf6fc94bf6b6
-
Filesize
810B
MD5acc02978471f658a75a3f6a4fd9353b0
SHA131eb221afcd84963f70c98f23a6d292a225d9b8d
SHA2567690ec61aba7496ddda1aa248510d99dee886ead9479ff1d1e1b93c682d7922a
SHA5129efa955528a869d66f8a8e408340606456d7da7a5578a92e37195d709b5829d307d98cb1488bacd786f94cb5a9dcc8cf63fcae2140599da0f4fdabd4204a30b7
-
Filesize
525KB
MD5cdb982565c7abd0cd6840eb53d7090de
SHA1a986486e425f78576083820baed5567ff68992f5
SHA2567c85bc4dfad7e620ca79fe79804e83fec0233f2432639cd02ccb3dbe1f8cef72
SHA51226f641a18683820ccd8771d6bff0f03bfc15bbf21c2ea18ee450d28d2461a4fd5b5bd81b985c0129160d568d316a040831d886a6cc2f29901526b74afc54cddf