Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24-09-2024 01:48

General

  • Target

    d32fd7b9dae043243301bc041980215535fd5208e252c3aec703d43fb1c98ec2.jar

  • Size

    282KB

  • MD5

    085b0d7b2ab0862abe65c54e50e25415

  • SHA1

    c7c215b0a6fb35394ac65ecf2179a8cba70b0164

  • SHA256

    d32fd7b9dae043243301bc041980215535fd5208e252c3aec703d43fb1c98ec2

  • SHA512

    b23377f973c5c576f04305613d98cfb1a0053ae7239acfe7f6e1a6b7554cf231fbe46caa18db4787e6d59798148e904599d5d2f60863e25d9b1a474ad88f801f

  • SSDEEP

    6144:dBG0lV3jUa3QKplCNuVpfgtSUjH2y5Mobu/uHYNUSG:1lV34sQKpl7VVgB2OM1W4N5G

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\d32fd7b9dae043243301bc041980215535fd5208e252c3aec703d43fb1c98ec2.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Windows\system32\wscript.exe
      wscript C:\Users\Admin\egtqrikcxw.js
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2572
      • C:\Program Files\Java\jre7\bin\javaw.exe
        "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\phszupyysq.txt"
        3⤵
          PID:2056

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\phszupyysq.txt

      Filesize

      209KB

      MD5

      b16ad4531fc12940513b015cbde0ab38

      SHA1

      d88885c20e35467e6b10047cd5c5d5f5f4ab6066

      SHA256

      74a0607b4c9ad73daaf0678a4e0ee4cdf83a39b0f6e955723a92e987ec23c476

      SHA512

      3d7995c8561f660077d585f19c78bb55a66f89eaea360fb6447a78b94983a01746aefdcec66e15befe2e7747954f47259a9b9297c2d51ac820f51790d3503612

    • C:\Users\Admin\egtqrikcxw.js

      Filesize

      454KB

      MD5

      25d23e8cda95e40f2cb3f722dc55961e

      SHA1

      ebf80506c40e3423fb6584fe149637cda5c335b9

      SHA256

      06c27aff5c171b83a7f3e9d2866f1e0101b0ad0cef61bfb9c557e414d182295c

      SHA512

      790f2435de0dd8a2e07c4dd653a13c8837873d65bb30337335cef08852cf748ce173e0fea442277bfb85998d6501e34e66e9d5d38e8ecddc55852444ee6feb5a

    • memory/2056-41-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2056-63-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2056-165-0x0000000002440000-0x00000000026B0000-memory.dmp

      Filesize

      2.4MB

    • memory/2056-19-0x0000000002440000-0x00000000026B0000-memory.dmp

      Filesize

      2.4MB

    • memory/2056-27-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2056-34-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2056-105-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2056-52-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2056-54-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2056-109-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2056-66-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2056-64-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2056-98-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2056-103-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2116-13-0x00000000023C0000-0x0000000002630000-memory.dmp

      Filesize

      2.4MB

    • memory/2116-2-0x00000000023C0000-0x0000000002630000-memory.dmp

      Filesize

      2.4MB

    • memory/2116-12-0x0000000002160000-0x0000000002161000-memory.dmp

      Filesize

      4KB