Analysis
-
max time kernel
34s -
max time network
40s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-08-2024 15:28
Static task
static1
Behavioral task
behavioral1
Sample
RuneWild.jar
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
RuneWild.jar
Resource
win10v2004-20240802-en
General
-
Target
RuneWild.jar
-
Size
36KB
-
MD5
d9bee69eac95eea0950c589fd53a7dd2
-
SHA1
e6921aadf923c57e2f49855ec544c1dbcf009406
-
SHA256
4c96111aaddafa203db267464ab4028614702e90b949dbdd263d7ffeafc8b88a
-
SHA512
f8e13cfc95444592dd50e2c45bac0671bb8075b6897627159a3d5db70169cb90eca43b1f70332e41f2c6573ae8ce131b5b02a98814de759a9ba2859be6c4b80e
-
SSDEEP
768:cmewJj+SRi4rI8p0GlgDx2Nv5hakj1qwmc8sg8IbRRLuf:cmfF+SRi4rVp7msbhrl8sgBaf
Malware Config
Signatures
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4248 java.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4248 java.exe 4248 java.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4248 wrote to memory of 3504 4248 java.exe 96 PID 4248 wrote to memory of 3504 4248 java.exe 96 PID 4248 wrote to memory of 4772 4248 java.exe 97 PID 4248 wrote to memory of 4772 4248 java.exe 97 PID 4248 wrote to memory of 3444 4248 java.exe 100 PID 4248 wrote to memory of 3444 4248 java.exe 100 PID 3444 wrote to memory of 4888 3444 cmd.exe 102 PID 3444 wrote to memory of 4888 3444 cmd.exe 102 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3504 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\RuneWild.jar1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users/Public/AppData/windll32.dat2⤵
- Views/modifies file attributes
PID:3504
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C "echo %TEMP%"2⤵PID:4772
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\jwmi.vbs2⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\system32\cscript.execscript.exe C:\Users\Admin\AppData\Local\Temp\jwmi.vbs3⤵PID:4888
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262B
MD564c852efe3c2fa37a11e0827735ae4d9
SHA1cd2d9e1fb984fabdfae6e3836d627291212654a5
SHA2563b06ac6711e4b9192bf810b2ab9e63aaabfa9e1768adeab10a2ac09630fef7d2
SHA512c7e1ea21de70920ae98062aab25ffd8dc14768697911defe9e71541795ded8c27d44f8f5dec9aadf0d4e4ffdcb1b37a792cecc9a2a203f62db54fa4098fd6653
-
Filesize
33KB
MD56772e8b166185d68aad224c4277988b6
SHA1d7cc902f6732dfe83c553d684c221054c3fb3e29
SHA2567d8371a7e313de34a0b3118bafb5627ab65fbea0c736a2773bd4ed1e6584611e
SHA5128cc591a45385284c48b75c4a40f1e9ee98d80f2346a831155eecc981e45733e3cb9e44308fae343367df437fd137b837049f7e2ad4cd2cf34df14a390bbb636f
-
Filesize
545B
MD5fcb2db03753017184a29d5ed0bcb3125
SHA13b1c07d08504bc2b4b95119ff8247f511b512476
SHA2560b20b47450f881902be98833bc9f61a974acf7b9c5cfab14b66e5610ea3d1db5
SHA5128ee07688d1d789cfb8271fe8b2ee4cfa8f504d774d32d3b30df92656e316fb0ef5d6b0c17411548daba266323b327fbfc6b8f1df3254af6ade3754d8fe133e8e
-
Filesize
36B
MD5d955e6ec2529f50711b6f12b20433270
SHA137b5d1e0d13e80ace67904cac6a8d00f488425ac
SHA2566ec9eb10d2ea6d31d0974d8d25b2abbb7789b06e0f412830d3e16eba5a2f001f
SHA5121691397421ae42ff2f6602ade532610374ee0999e5953817017c235dac478bfaaa4874356a77c997fa1a1bb3082b88dbb525e8ac7ed5f239718aeb79ec9c8217