Overview
overview
7Static
static
6asset_pack.jar
windows10-1703-x64
7com.vector...ay.apk
windows10-1703-x64
3config.arm64_v8a.jar
windows10-1703-x64
7config.bn.jar
windows10-1703-x64
7config.en.jar
windows10-1703-x64
7config.gu.jar
windows10-1703-x64
7config.hi.jar
windows10-1703-x64
7config.kn.jar
windows10-1703-x64
7config.mdpi.jar
windows10-1703-x64
7config.mr.jar
windows10-1703-x64
7config.ta.jar
windows10-1703-x64
7config.te.jar
windows10-1703-x64
7BlueStacks..._0.exe
windows10-1703-x64
4BlueStacks..._0.exe
windows10-1703-x64
4Analysis
-
max time kernel
75s -
max time network
82s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
08/09/2024, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
asset_pack.jar
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
com.vectorunit.cobalt.googleplay.apk
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
config.arm64_v8a.jar
Resource
win10-20240611-en
Behavioral task
behavioral4
Sample
config.bn.jar
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
config.en.jar
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
config.gu.jar
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
config.hi.jar
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
config.kn.jar
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
config.mdpi.jar
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
config.mr.jar
Resource
win10-20240611-en
Behavioral task
behavioral11
Sample
config.ta.jar
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
config.te.jar
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
BlueStacks10Installer_0.17.10.6_native_1ad3425415ee2f3e264a6d79df856ea0_0.exe
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
BlueStacksInstaller_5.9.0.1061_native_24ebeaaa739760b7c03556153d168771_0.exe
Resource
win10-20240404-en
General
-
Target
config.te.jar
-
Size
32KB
-
MD5
636c66ab08e90059d6444a23b1288dc8
-
SHA1
1f3642fe9fa4ece84c45cf4ff411648fc227ff15
-
SHA256
b415560e6018f1719a7d2e14a2e8ca726089dac5cee0bd9763949c99fa56b6ed
-
SHA512
7c82c0b794cf973dda043a7f5aa73c824d7d798b78b0de28a86443eef3acaa456decf91884011608f5a2355a8b6a1216d58a4aacb6da9727eeadbfe8714df9c7
-
SSDEEP
768:RvWw585crFshdhJ1e1TQ3VV04+M4x5gAd:F3rFshdhiqV04+M4x+Ad
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4520 icacls.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1296 wrote to memory of 4520 1296 java.exe 75 PID 1296 wrote to memory of 4520 1296 java.exe 75
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\config.te.jar1⤵
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:4520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5b1ecbd28acf241a376e97230f408d58b
SHA1c3daf77420b94e4179a705e3e2bf819940c9726c
SHA256794af68fc9f4429801472c71d5de4161f8c336be964f5f0262570c555285578e
SHA5126996742a247475271b6b622025add9459548a1fb8ea64872c7a76969b49fb22417b2fc11e0343f9c2ae8557912b27848bcb83abb2960faa7ab40d26f090ffb97