Overview
overview
8Static
static
1Burpy/.git...sample
windows10-1703-x64
3Burpy/.git...sample
windows10-1703-x64
3Burpy/.git...sample
windows10-1703-x64
3Burpy/.git...sample
windows10-1703-x64
3Burpy/.git...sample
windows10-1703-x64
3Burpy/.git...sample
windows10-1703-x64
3Burpy/.git...sample
windows10-1703-x64
3Burpy/.git...sample
windows10-1703-x64
3Burpy/.git...sample
windows10-1703-x64
3Burpy/.git...sample
windows10-1703-x64
3Burpy/.git...sample
windows10-1703-x64
3Burpy/.git...sample
windows10-1703-x64
3Burpy/.git...sample
windows10-1703-x64
3Burpy/.git...sample
windows10-1703-x64
3Burpy/Burp...en.jar
windows10-1703-x64
7Burpy/Linux_setup.sh
windows10-1703-x64
3Burpy/Wind...up.ps1
windows10-1703-x64
8Burpy/burp...pro.sh
windows10-1703-x64
3Burpy/keygen.jar
windows10-1703-x64
7Burpy/loader.jar
windows10-1703-x64
7Resubmissions
12-08-2024 17:47
240812-wdcepssark 8Analysis
-
max time kernel
133s -
max time network
145s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
12-08-2024 17:47
Static task
static1
Behavioral task
behavioral1
Sample
Burpy/.git/hooks/applypatch-msg.sample
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Burpy/.git/hooks/commit-msg.sample
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Burpy/.git/hooks/fsmonitor-watchman.sample
Resource
win10-20240611-en
Behavioral task
behavioral4
Sample
Burpy/.git/hooks/post-update.sample
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
Burpy/.git/hooks/pre-applypatch.sample
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
Burpy/.git/hooks/pre-commit.sample
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
Burpy/.git/hooks/pre-merge-commit.sample
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
Burpy/.git/hooks/pre-push.sample
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
Burpy/.git/hooks/pre-rebase.sample
Resource
win10-20240611-en
Behavioral task
behavioral10
Sample
Burpy/.git/hooks/pre-receive.sample
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
Burpy/.git/hooks/prepare-commit-msg.sample
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
Burpy/.git/hooks/push-to-checkout.sample
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
Burpy/.git/hooks/sendemail-validate.sample
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
Burpy/.git/hooks/update.sample
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
Burpy/BurpLoaderKeygen.jar
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
Burpy/Linux_setup.sh
Resource
win10-20240404-en
Behavioral task
behavioral17
Sample
Burpy/Windows_setup.ps1
Resource
win10-20240404-en
Behavioral task
behavioral18
Sample
Burpy/burpsuite_pro.sh
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
Burpy/keygen.jar
Resource
win10-20240404-en
Behavioral task
behavioral20
Sample
Burpy/loader.jar
Resource
win10-20240404-en
General
-
Target
Burpy/keygen.jar
-
Size
63KB
-
MD5
a4ead4abf81293e88cc2247302c19877
-
SHA1
13be3e844fbe07e524f33682af5aab7cb24b8f73
-
SHA256
7ce1ac8090ec484d8b21a81d97866ffa55a761e63a2daf831488a34475b434c5
-
SHA512
f139166520dad00dce2faf5efa4151f0b1375e1df417c1389863b6fa36b9d2d343efb3ceae6ddc40aed447491da3b3e228d97bc7fee103231f15b092a6295e35
-
SSDEEP
1536:yCdJN7TYDPdMUHwG+j5FOwLq9hpIThxE7afiW5zLtXE:9N7LUujewL4fkx2afiQzLt0
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
java.exepid process 2448 java.exe 2448 java.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
java.exedescription pid process target process PID 2448 wrote to memory of 2028 2448 java.exe icacls.exe PID 2448 wrote to memory of 2028 2448 java.exe icacls.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\Burpy\keygen.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:2028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestampFilesize
46B
MD51c19b4a0d7572825049fe8008ed54705
SHA1ca59c5dd41e0feaebab0dd8a54dedc6af663e839
SHA2561aae6caa9e0da868daf1aaac80476e5b6d9ed8216cc62378676861ca0fdce4e2
SHA512a22ed6d399a3111391587ede469d61964a490b3d8943d2f825aefc6b7c521f7cd09670e6117ad301b9a90235345c9925419781bdaee6c575a45a8c83a9c8b1bc
-
memory/2448-44-0x0000020B5F060000-0x0000020B5F070000-memory.dmpFilesize
64KB
-
memory/2448-20-0x0000020B5F060000-0x0000020B5F070000-memory.dmpFilesize
64KB
-
memory/2448-45-0x0000020B5F110000-0x0000020B5F120000-memory.dmpFilesize
64KB
-
memory/2448-2-0x0000020B5EDE0000-0x0000020B5F050000-memory.dmpFilesize
2.4MB
-
memory/2448-24-0x0000020B5F080000-0x0000020B5F090000-memory.dmpFilesize
64KB
-
memory/2448-23-0x0000020B5F070000-0x0000020B5F080000-memory.dmpFilesize
64KB
-
memory/2448-27-0x0000020B5F090000-0x0000020B5F0A0000-memory.dmpFilesize
64KB
-
memory/2448-29-0x0000020B5F0A0000-0x0000020B5F0B0000-memory.dmpFilesize
64KB
-
memory/2448-30-0x0000020B5F0B0000-0x0000020B5F0C0000-memory.dmpFilesize
64KB
-
memory/2448-33-0x0000020B5F0C0000-0x0000020B5F0D0000-memory.dmpFilesize
64KB
-
memory/2448-34-0x0000020B5F0D0000-0x0000020B5F0E0000-memory.dmpFilesize
64KB
-
memory/2448-39-0x0000020B5F0F0000-0x0000020B5F100000-memory.dmpFilesize
64KB
-
memory/2448-38-0x0000020B5F0E0000-0x0000020B5F0F0000-memory.dmpFilesize
64KB
-
memory/2448-37-0x0000020B5EDE0000-0x0000020B5F050000-memory.dmpFilesize
2.4MB
-
memory/2448-41-0x0000020B5F050000-0x0000020B5F060000-memory.dmpFilesize
64KB
-
memory/2448-42-0x0000020B5F100000-0x0000020B5F110000-memory.dmpFilesize
64KB
-
memory/2448-18-0x0000020B5F050000-0x0000020B5F060000-memory.dmpFilesize
64KB
-
memory/2448-48-0x0000020B5F070000-0x0000020B5F080000-memory.dmpFilesize
64KB
-
memory/2448-16-0x0000020B5D4E0000-0x0000020B5D4E1000-memory.dmpFilesize
4KB
-
memory/2448-49-0x0000020B5F120000-0x0000020B5F130000-memory.dmpFilesize
64KB
-
memory/2448-52-0x0000020B5D4E0000-0x0000020B5D4E1000-memory.dmpFilesize
4KB
-
memory/2448-53-0x0000020B5F080000-0x0000020B5F090000-memory.dmpFilesize
64KB
-
memory/2448-54-0x0000020B5F130000-0x0000020B5F140000-memory.dmpFilesize
64KB
-
memory/2448-57-0x0000020B5F140000-0x0000020B5F150000-memory.dmpFilesize
64KB
-
memory/2448-56-0x0000020B5F090000-0x0000020B5F0A0000-memory.dmpFilesize
64KB
-
memory/2448-59-0x0000020B5F0A0000-0x0000020B5F0B0000-memory.dmpFilesize
64KB
-
memory/2448-61-0x0000020B5F0B0000-0x0000020B5F0C0000-memory.dmpFilesize
64KB
-
memory/2448-62-0x0000020B5F0C0000-0x0000020B5F0D0000-memory.dmpFilesize
64KB
-
memory/2448-63-0x0000020B5F0D0000-0x0000020B5F0E0000-memory.dmpFilesize
64KB
-
memory/2448-64-0x0000020B5F0E0000-0x0000020B5F0F0000-memory.dmpFilesize
64KB
-
memory/2448-65-0x0000020B5F0F0000-0x0000020B5F100000-memory.dmpFilesize
64KB
-
memory/2448-66-0x0000020B5F100000-0x0000020B5F110000-memory.dmpFilesize
64KB
-
memory/2448-67-0x0000020B5F110000-0x0000020B5F120000-memory.dmpFilesize
64KB
-
memory/2448-68-0x0000020B5F120000-0x0000020B5F130000-memory.dmpFilesize
64KB
-
memory/2448-69-0x0000020B5F130000-0x0000020B5F140000-memory.dmpFilesize
64KB
-
memory/2448-70-0x0000020B5F140000-0x0000020B5F150000-memory.dmpFilesize
64KB