Analysis

  • max time kernel
    418s
  • max time network
    437s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-08-2024 10:48

General

  • Target

    latest.jar

  • Size

    25.9MB

  • MD5

    0824e9c297b8e0f9f48bff844899b43a

  • SHA1

    2fd34807dafcd2e679ead6502ab4682aca173e2d

  • SHA256

    49eb42200c865b5e82a5dfb41b43b43217e4563991f16692d5948924205a99c9

  • SHA512

    548d3a00179a3a5bb83dcc768af22527781af43e1dab25198f49f6d161a40cb383ddd1076ff7dcfe387658af2cf7a4ff96c046f0317f773f83682ee7d6090558

  • SSDEEP

    786432:wgVPWViING8Mhkvlm/s+o+ze/ddN/vxKFjIj:wgdghNGfCNSeHjIk

Malware Config

Signatures

  • Indicator Removal: Clear Persistence 1 TTPs 2 IoCs

    Clear artifacts associated with previously established persistence like scheduletasks on a host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\latest.jar
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4508
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:220
      • C:\Windows\system32\cacls.exe
        "C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"
        3⤵
          PID:5096
      • C:\Windows\SYSTEM32\cmd.exe
        cmd /c SCHTASKS /CREATE /SC MINUTE /TN OneDrive\OneDriveUpdateTask /RL HIGHEST /TR C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\cache.jar
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2544
        • C:\Windows\system32\schtasks.exe
          SCHTASKS /CREATE /SC MINUTE /TN OneDrive\OneDriveUpdateTask /RL HIGHEST /TR C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\cache.jar
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2532
      • C:\Program Files\Java\jre-1.8\bin\javaw.exe
        "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\cache.jar"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2988
        • C:\Windows\SYSTEM32\cmd.exe
          cmd /c wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1672
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:748
        • C:\Windows\SYSTEM32\cmd.exe
          cmd /c wmic cpu get name
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1012
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic cpu get name
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2460
        • C:\Windows\SYSTEM32\cmd.exe
          cmd /c SCHTASKS /DELETE /TN OneDrive\OneDriveUpdateTask /F
          3⤵
          • Indicator Removal: Clear Persistence
          • Suspicious use of WriteProcessMemory
          PID:1940
          • C:\Windows\system32\schtasks.exe
            SCHTASKS /DELETE /TN OneDrive\OneDriveUpdateTask /F
            4⤵
              PID:3616
          • C:\Windows\SYSTEM32\cmd.exe
            cmd /c SCHTASKS /DELETE /TN OneDrive /F
            3⤵
            • Indicator Removal: Clear Persistence
            • Suspicious use of WriteProcessMemory
            PID:4048
            • C:\Windows\system32\schtasks.exe
              SCHTASKS /DELETE /TN OneDrive /F
              4⤵
                PID:2084
            • C:\Windows\SYSTEM32\cmd.exe
              cmd /c ping localhost -n 5 > nul && rmdir /s /q C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer
              3⤵
              • System Network Configuration Discovery: Internet Connection Discovery
              • Suspicious use of WriteProcessMemory
              PID:4460
              • C:\Windows\system32\PING.EXE
                ping localhost -n 5
                4⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:5016

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

          Filesize

          46B

          MD5

          ab971da613eff140ccec9a7f2e082996

          SHA1

          99c5974a01320ddb6f3073e65fe360c0ebebde48

          SHA256

          44f4f088c958e038c6cb5acfec6bc6f82d599a9cbeffc8e0751235226aeb7942

          SHA512

          552a81625aa4f138625e47cb9fc4b3a073c667240f7f5e9b1783dc43d5cf3caa5bbc95d81669c555588004de45944e1875a730936b4ae184db78910acc880f33

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\cache.jar

          Filesize

          25.9MB

          MD5

          0824e9c297b8e0f9f48bff844899b43a

          SHA1

          2fd34807dafcd2e679ead6502ab4682aca173e2d

          SHA256

          49eb42200c865b5e82a5dfb41b43b43217e4563991f16692d5948924205a99c9

          SHA512

          548d3a00179a3a5bb83dcc768af22527781af43e1dab25198f49f6d161a40cb383ddd1076ff7dcfe387658af2cf7a4ff96c046f0317f773f83682ee7d6090558

        • memory/2988-32-0x00000235061B0000-0x00000235061B1000-memory.dmp

          Filesize

          4KB

        • memory/2988-37-0x00000235061B0000-0x00000235061B1000-memory.dmp

          Filesize

          4KB

        • memory/2988-42-0x00000235061B0000-0x00000235061B1000-memory.dmp

          Filesize

          4KB

        • memory/4508-2-0x000001E3B5970000-0x000001E3B5BE0000-memory.dmp

          Filesize

          2.4MB

        • memory/4508-11-0x000001E3B40B0000-0x000001E3B40B1000-memory.dmp

          Filesize

          4KB

        • memory/4508-18-0x000001E3B40B0000-0x000001E3B40B1000-memory.dmp

          Filesize

          4KB

        • memory/4508-31-0x000001E3B5970000-0x000001E3B5BE0000-memory.dmp

          Filesize

          2.4MB