Analysis
-
max time kernel
0s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
25/08/2024, 17:17
Static task
static1
Behavioral task
behavioral1
Sample
SchubiAuth-2.0.jar
Resource
win10-20240404-en
General
-
Target
SchubiAuth-2.0.jar
-
Size
8KB
-
MD5
39368eb96dc7f369932ee951a96a0894
-
SHA1
417c840ed495d26d2fa073c66ecba11f3ebd393e
-
SHA256
ee9056514ae2661be8d8ade35c23e168f08f38503e97c03f53cd3f781f1bc5c1
-
SHA512
5e1db3a1c0f1b047bf57e7359ab22c16317c02b0eefc1e00ea2e113d296d2eedf25b5423f170784a2469adb354870971d03326ef982457c4ffaf3e20b5fff83f
-
SSDEEP
192:bSS1ou5lLgEUUWMsiizdYUMI4SjA+JhkD/i20zINkdja:bSS1oOdgjfimbMI45D/CbG
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 780 icacls.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4688 wrote to memory of 780 4688 java.exe 74 PID 4688 wrote to memory of 780 4688 java.exe 74
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\SchubiAuth-2.0.jar1⤵
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5c85120e45455a082cfcc59d60d4a9237
SHA1f4f65501eb42779e49804d41db5fab9cc614f7f6
SHA2564f2399d38cc6d0633bf6b2293ef9fde8b73a54ae56f856f1215ee0041ade2519
SHA5122449e2448e06622a42d052b4879d31091b7972a70be80f8b5fcfce6128deaf967a0c33f2ec2bdfa23e21124297ca1680cffa5f2e92a538838d0f09b68cc56320