Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 12:26
Behavioral task
behavioral1
Sample
RichiestaOrdine.jar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RichiestaOrdine.jar
Resource
win10v2004-20240802-en
General
-
Target
RichiestaOrdine.jar
-
Size
84KB
-
MD5
5acb5f7762f565fb8048d7eb2f68c30d
-
SHA1
9280824a7f831fee6a4c8b2f737892e9ef91a5ca
-
SHA256
167e8b53c7c1959f05a788d95982ff056591146e7b9711cd9e041347cf21db34
-
SHA512
7e30e4d7a8653a995bef974447e79b44d552fa35e6966315089a2da3d6eeb22e10354ed733ae0b6e3d66ff55f5d7053540faf3784690b661269d29ee8f59d83e
-
SSDEEP
1536:7QKhXzU/FbhBxMOeWNgSmJyQhBFVv4WFJdiM+i8B:EKpU/dSlWNgSm4QJ2kdJ+
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RichiestaOrdine.jar java.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RichiestaOrdine = "\"C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\RichiestaOrdine.jar\"" java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RichiestaOrdine = "\"C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\RichiestaOrdine.jar\"" java.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 ip-api.com -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4468 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3468 WMIC.exe Token: SeSecurityPrivilege 3468 WMIC.exe Token: SeTakeOwnershipPrivilege 3468 WMIC.exe Token: SeLoadDriverPrivilege 3468 WMIC.exe Token: SeSystemProfilePrivilege 3468 WMIC.exe Token: SeSystemtimePrivilege 3468 WMIC.exe Token: SeProfSingleProcessPrivilege 3468 WMIC.exe Token: SeIncBasePriorityPrivilege 3468 WMIC.exe Token: SeCreatePagefilePrivilege 3468 WMIC.exe Token: SeBackupPrivilege 3468 WMIC.exe Token: SeRestorePrivilege 3468 WMIC.exe Token: SeShutdownPrivilege 3468 WMIC.exe Token: SeDebugPrivilege 3468 WMIC.exe Token: SeSystemEnvironmentPrivilege 3468 WMIC.exe Token: SeRemoteShutdownPrivilege 3468 WMIC.exe Token: SeUndockPrivilege 3468 WMIC.exe Token: SeManageVolumePrivilege 3468 WMIC.exe Token: 33 3468 WMIC.exe Token: 34 3468 WMIC.exe Token: 35 3468 WMIC.exe Token: 36 3468 WMIC.exe Token: SeIncreaseQuotaPrivilege 3468 WMIC.exe Token: SeSecurityPrivilege 3468 WMIC.exe Token: SeTakeOwnershipPrivilege 3468 WMIC.exe Token: SeLoadDriverPrivilege 3468 WMIC.exe Token: SeSystemProfilePrivilege 3468 WMIC.exe Token: SeSystemtimePrivilege 3468 WMIC.exe Token: SeProfSingleProcessPrivilege 3468 WMIC.exe Token: SeIncBasePriorityPrivilege 3468 WMIC.exe Token: SeCreatePagefilePrivilege 3468 WMIC.exe Token: SeBackupPrivilege 3468 WMIC.exe Token: SeRestorePrivilege 3468 WMIC.exe Token: SeShutdownPrivilege 3468 WMIC.exe Token: SeDebugPrivilege 3468 WMIC.exe Token: SeSystemEnvironmentPrivilege 3468 WMIC.exe Token: SeRemoteShutdownPrivilege 3468 WMIC.exe Token: SeUndockPrivilege 3468 WMIC.exe Token: SeManageVolumePrivilege 3468 WMIC.exe Token: 33 3468 WMIC.exe Token: 34 3468 WMIC.exe Token: 35 3468 WMIC.exe Token: 36 3468 WMIC.exe Token: SeIncreaseQuotaPrivilege 4612 WMIC.exe Token: SeSecurityPrivilege 4612 WMIC.exe Token: SeTakeOwnershipPrivilege 4612 WMIC.exe Token: SeLoadDriverPrivilege 4612 WMIC.exe Token: SeSystemProfilePrivilege 4612 WMIC.exe Token: SeSystemtimePrivilege 4612 WMIC.exe Token: SeProfSingleProcessPrivilege 4612 WMIC.exe Token: SeIncBasePriorityPrivilege 4612 WMIC.exe Token: SeCreatePagefilePrivilege 4612 WMIC.exe Token: SeBackupPrivilege 4612 WMIC.exe Token: SeRestorePrivilege 4612 WMIC.exe Token: SeShutdownPrivilege 4612 WMIC.exe Token: SeDebugPrivilege 4612 WMIC.exe Token: SeSystemEnvironmentPrivilege 4612 WMIC.exe Token: SeRemoteShutdownPrivilege 4612 WMIC.exe Token: SeUndockPrivilege 4612 WMIC.exe Token: SeManageVolumePrivilege 4612 WMIC.exe Token: 33 4612 WMIC.exe Token: 34 4612 WMIC.exe Token: 35 4612 WMIC.exe Token: 36 4612 WMIC.exe Token: SeIncreaseQuotaPrivilege 4612 WMIC.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4116 wrote to memory of 5112 4116 java.exe 87 PID 4116 wrote to memory of 5112 4116 java.exe 87 PID 4116 wrote to memory of 4164 4116 java.exe 88 PID 4116 wrote to memory of 4164 4116 java.exe 88 PID 5112 wrote to memory of 4468 5112 cmd.exe 91 PID 5112 wrote to memory of 4468 5112 cmd.exe 91 PID 4164 wrote to memory of 1548 4164 java.exe 94 PID 4164 wrote to memory of 1548 4164 java.exe 94 PID 1548 wrote to memory of 3468 1548 cmd.exe 96 PID 1548 wrote to memory of 3468 1548 cmd.exe 96 PID 4164 wrote to memory of 3628 4164 java.exe 99 PID 4164 wrote to memory of 3628 4164 java.exe 99 PID 3628 wrote to memory of 4612 3628 cmd.exe 101 PID 3628 wrote to memory of 4612 3628 cmd.exe 101 PID 4164 wrote to memory of 2052 4164 java.exe 102 PID 4164 wrote to memory of 2052 4164 java.exe 102 PID 2052 wrote to memory of 4176 2052 cmd.exe 104 PID 2052 wrote to memory of 4176 2052 cmd.exe 104 PID 4164 wrote to memory of 4104 4164 java.exe 105 PID 4164 wrote to memory of 4104 4164 java.exe 105 PID 4104 wrote to memory of 3080 4104 cmd.exe 107 PID 4104 wrote to memory of 3080 4104 cmd.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\RichiestaOrdine.jar1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SYSTEM32\cmd.execmd /c schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\RichiestaOrdine.jar"2⤵
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\RichiestaOrdine.jar"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4468
-
-
-
C:\Program Files\Java\jre-1.8\bin\java.exe"C:\Program Files\Java\jre-1.8\bin\java.exe" -jar "C:\Users\Admin\AppData\Roaming\RichiestaOrdine.jar"2⤵
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list"3⤵
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\System32\Wbem\WMIC.exewmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3468
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list"3⤵
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\System32\Wbem\WMIC.exewmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4612
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list"3⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\System32\Wbem\WMIC.exewmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list4⤵PID:4176
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "wmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list"3⤵
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\System32\Wbem\WMIC.exewmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list4⤵PID:3080
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD55acb5f7762f565fb8048d7eb2f68c30d
SHA19280824a7f831fee6a4c8b2f737892e9ef91a5ca
SHA256167e8b53c7c1959f05a788d95982ff056591146e7b9711cd9e041347cf21db34
SHA5127e30e4d7a8653a995bef974447e79b44d552fa35e6966315089a2da3d6eeb22e10354ed733ae0b6e3d66ff55f5d7053540faf3784690b661269d29ee8f59d83e