Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 06:24
Behavioral task
behavioral1
Sample
28082024_1541_28082024_OFFER-INQUIRY.jar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
28082024_1541_28082024_OFFER-INQUIRY.jar
Resource
win10v2004-20240802-en
General
-
Target
28082024_1541_28082024_OFFER-INQUIRY.jar
-
Size
84KB
-
MD5
ddaffd1e47777bd6ee6f1d89f80dbddb
-
SHA1
66c0dd7372365df8546b63d98f8c2c4eb0759429
-
SHA256
4005216ddf9e092bddda8a78f0babe94746632ef6a64793e1fa0e94f1538a49c
-
SHA512
3fa34856f71640e635b75c1e8365db43f60d164f7122fce6612cf1d22d9ee9ddd9e8fd493076dcc69a5348a6a5d4db345fdbb869716905cb679210b12ba00060
-
SSDEEP
1536:dVu6KIkej8xhZfQk7A0eSaNa650oIDZaQx2fCRMiMUTBEbY4dTe46gX+LFSnUhru:j2r1fH7A0dT6HFfCi
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
java.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\28082024_1541_28082024_OFFER-INQUIRY.jar java.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
java.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\28082024_1541_28082024_OFFER-INQUIRY = "\"C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\28082024_1541_28082024_OFFER-INQUIRY.jar\"" java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\28082024_1541_28082024_OFFER-INQUIRY = "\"C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\28082024_1541_28082024_OFFER-INQUIRY.jar\"" java.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 24 ip-api.com -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WMIC.exeWMIC.exedescription pid Process Token: SeIncreaseQuotaPrivilege 4264 WMIC.exe Token: SeSecurityPrivilege 4264 WMIC.exe Token: SeTakeOwnershipPrivilege 4264 WMIC.exe Token: SeLoadDriverPrivilege 4264 WMIC.exe Token: SeSystemProfilePrivilege 4264 WMIC.exe Token: SeSystemtimePrivilege 4264 WMIC.exe Token: SeProfSingleProcessPrivilege 4264 WMIC.exe Token: SeIncBasePriorityPrivilege 4264 WMIC.exe Token: SeCreatePagefilePrivilege 4264 WMIC.exe Token: SeBackupPrivilege 4264 WMIC.exe Token: SeRestorePrivilege 4264 WMIC.exe Token: SeShutdownPrivilege 4264 WMIC.exe Token: SeDebugPrivilege 4264 WMIC.exe Token: SeSystemEnvironmentPrivilege 4264 WMIC.exe Token: SeRemoteShutdownPrivilege 4264 WMIC.exe Token: SeUndockPrivilege 4264 WMIC.exe Token: SeManageVolumePrivilege 4264 WMIC.exe Token: 33 4264 WMIC.exe Token: 34 4264 WMIC.exe Token: 35 4264 WMIC.exe Token: 36 4264 WMIC.exe Token: SeIncreaseQuotaPrivilege 4264 WMIC.exe Token: SeSecurityPrivilege 4264 WMIC.exe Token: SeTakeOwnershipPrivilege 4264 WMIC.exe Token: SeLoadDriverPrivilege 4264 WMIC.exe Token: SeSystemProfilePrivilege 4264 WMIC.exe Token: SeSystemtimePrivilege 4264 WMIC.exe Token: SeProfSingleProcessPrivilege 4264 WMIC.exe Token: SeIncBasePriorityPrivilege 4264 WMIC.exe Token: SeCreatePagefilePrivilege 4264 WMIC.exe Token: SeBackupPrivilege 4264 WMIC.exe Token: SeRestorePrivilege 4264 WMIC.exe Token: SeShutdownPrivilege 4264 WMIC.exe Token: SeDebugPrivilege 4264 WMIC.exe Token: SeSystemEnvironmentPrivilege 4264 WMIC.exe Token: SeRemoteShutdownPrivilege 4264 WMIC.exe Token: SeUndockPrivilege 4264 WMIC.exe Token: SeManageVolumePrivilege 4264 WMIC.exe Token: 33 4264 WMIC.exe Token: 34 4264 WMIC.exe Token: 35 4264 WMIC.exe Token: 36 4264 WMIC.exe Token: SeIncreaseQuotaPrivilege 1920 WMIC.exe Token: SeSecurityPrivilege 1920 WMIC.exe Token: SeTakeOwnershipPrivilege 1920 WMIC.exe Token: SeLoadDriverPrivilege 1920 WMIC.exe Token: SeSystemProfilePrivilege 1920 WMIC.exe Token: SeSystemtimePrivilege 1920 WMIC.exe Token: SeProfSingleProcessPrivilege 1920 WMIC.exe Token: SeIncBasePriorityPrivilege 1920 WMIC.exe Token: SeCreatePagefilePrivilege 1920 WMIC.exe Token: SeBackupPrivilege 1920 WMIC.exe Token: SeRestorePrivilege 1920 WMIC.exe Token: SeShutdownPrivilege 1920 WMIC.exe Token: SeDebugPrivilege 1920 WMIC.exe Token: SeSystemEnvironmentPrivilege 1920 WMIC.exe Token: SeRemoteShutdownPrivilege 1920 WMIC.exe Token: SeUndockPrivilege 1920 WMIC.exe Token: SeManageVolumePrivilege 1920 WMIC.exe Token: 33 1920 WMIC.exe Token: 34 1920 WMIC.exe Token: 35 1920 WMIC.exe Token: 36 1920 WMIC.exe Token: SeIncreaseQuotaPrivilege 1920 WMIC.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
java.execmd.exejava.execmd.execmd.execmd.execmd.exedescription pid Process procid_target PID 736 wrote to memory of 2568 736 java.exe 86 PID 736 wrote to memory of 2568 736 java.exe 86 PID 736 wrote to memory of 1932 736 java.exe 88 PID 736 wrote to memory of 1932 736 java.exe 88 PID 2568 wrote to memory of 5096 2568 cmd.exe 90 PID 2568 wrote to memory of 5096 2568 cmd.exe 90 PID 1932 wrote to memory of 856 1932 java.exe 97 PID 1932 wrote to memory of 856 1932 java.exe 97 PID 856 wrote to memory of 4264 856 cmd.exe 99 PID 856 wrote to memory of 4264 856 cmd.exe 99 PID 1932 wrote to memory of 2504 1932 java.exe 100 PID 1932 wrote to memory of 2504 1932 java.exe 100 PID 2504 wrote to memory of 1920 2504 cmd.exe 102 PID 2504 wrote to memory of 1920 2504 cmd.exe 102 PID 1932 wrote to memory of 4140 1932 java.exe 103 PID 1932 wrote to memory of 4140 1932 java.exe 103 PID 4140 wrote to memory of 224 4140 cmd.exe 105 PID 4140 wrote to memory of 224 4140 cmd.exe 105 PID 1932 wrote to memory of 3404 1932 java.exe 106 PID 1932 wrote to memory of 3404 1932 java.exe 106 PID 3404 wrote to memory of 2524 3404 cmd.exe 108 PID 3404 wrote to memory of 2524 3404 cmd.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\28082024_1541_28082024_OFFER-INQUIRY.jar1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SYSTEM32\cmd.execmd /c schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\28082024_1541_28082024_OFFER-INQUIRY.jar"2⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\28082024_1541_28082024_OFFER-INQUIRY.jar"3⤵
- Scheduled Task/Job: Scheduled Task
PID:5096
-
-
-
C:\Program Files\Java\jre-1.8\bin\java.exe"C:\Program Files\Java\jre-1.8\bin\java.exe" -jar "C:\Users\Admin\AppData\Roaming\28082024_1541_28082024_OFFER-INQUIRY.jar"2⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list"3⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\System32\Wbem\WMIC.exewmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4264
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list"3⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\System32\Wbem\WMIC.exewmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list"3⤵
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\System32\Wbem\WMIC.exewmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list4⤵PID:224
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "wmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list"3⤵
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\System32\Wbem\WMIC.exewmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list4⤵PID:2524
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\28082024_1541_28082024_OFFER-INQUIRY.jar
Filesize84KB
MD5ddaffd1e47777bd6ee6f1d89f80dbddb
SHA166c0dd7372365df8546b63d98f8c2c4eb0759429
SHA2564005216ddf9e092bddda8a78f0babe94746632ef6a64793e1fa0e94f1538a49c
SHA5123fa34856f71640e635b75c1e8365db43f60d164f7122fce6612cf1d22d9ee9ddd9e8fd493076dcc69a5348a6a5d4db345fdbb869716905cb679210b12ba00060
-
Filesize
46B
MD511bd2392a66f5326926df2205372664c
SHA1c794edd5fbc6ae996ea67fef0283413fa48ba353
SHA2562d92de194e46371a51f9ffcb112035edbb49406fda4b694a597fcb2cafb91d00
SHA5128c051d91a9853e9e7d27667cfbdec3f51295372cffcf4647c29603ab7362400207a477eb94beafef38e632f626134b692ee22280d6f97860b3bd8239e0684e28