Analysis

  • max time kernel
    140s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-10-2024 06:17

General

  • Target

    665ee103449f1ca7130cbbb4e01f635b735e2f250a96c67c050f9a8d4f047c93.jar

  • Size

    639KB

  • MD5

    3d6914a4698beef4fe37de173b66bd76

  • SHA1

    b3e4f83ae46957318cd82270fb15e1017f675cfe

  • SHA256

    665ee103449f1ca7130cbbb4e01f635b735e2f250a96c67c050f9a8d4f047c93

  • SHA512

    0fbb6657e110b181ce9716a8f3d1bc55024b78bdb59a5d06c9d32236773183b56fd0c3d7ac132716db883237f6a4c5d385effa651d1a4962df372b4d40e63526

  • SSDEEP

    12288:CXHdQB/HHFIHt4VBItgzgO/jRb+RTINK/+gChqRxA3cuU2pMSGVDMZ:CX9QxFIN4nDzgOt2eK/H4hcuJpPGVDMZ

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\665ee103449f1ca7130cbbb4e01f635b735e2f250a96c67c050f9a8d4f047c93.jar
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1592
    • C:\Windows\SYSTEM32\attrib.exe
      attrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1728973031640.tmp
      2⤵
      • Views/modifies file attributes
      PID:3056
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1728973031640.tmp" /f"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4656
      • C:\Windows\system32\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1728973031640.tmp" /f
        3⤵
        • Adds Run key to start application
        PID:1020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1728973031640.tmp

    Filesize

    639KB

    MD5

    3d6914a4698beef4fe37de173b66bd76

    SHA1

    b3e4f83ae46957318cd82270fb15e1017f675cfe

    SHA256

    665ee103449f1ca7130cbbb4e01f635b735e2f250a96c67c050f9a8d4f047c93

    SHA512

    0fbb6657e110b181ce9716a8f3d1bc55024b78bdb59a5d06c9d32236773183b56fd0c3d7ac132716db883237f6a4c5d385effa651d1a4962df372b4d40e63526

  • memory/1592-38-0x0000024855EA0000-0x0000024855EA1000-memory.dmp

    Filesize

    4KB

  • memory/1592-19-0x0000024856150000-0x0000024856160000-memory.dmp

    Filesize

    64KB

  • memory/1592-40-0x0000024856130000-0x0000024856140000-memory.dmp

    Filesize

    64KB

  • memory/1592-42-0x0000024856140000-0x0000024856150000-memory.dmp

    Filesize

    64KB

  • memory/1592-24-0x0000024856170000-0x0000024856180000-memory.dmp

    Filesize

    64KB

  • memory/1592-25-0x0000024856180000-0x0000024856190000-memory.dmp

    Filesize

    64KB

  • memory/1592-27-0x0000024856190000-0x00000248561A0000-memory.dmp

    Filesize

    64KB

  • memory/1592-28-0x0000024855EA0000-0x0000024855EA1000-memory.dmp

    Filesize

    4KB

  • memory/1592-31-0x00000248561A0000-0x00000248561B0000-memory.dmp

    Filesize

    64KB

  • memory/1592-15-0x0000024856130000-0x0000024856140000-memory.dmp

    Filesize

    64KB

  • memory/1592-35-0x00000248561B0000-0x00000248561C0000-memory.dmp

    Filesize

    64KB

  • memory/1592-2-0x0000024855EC0000-0x0000024856130000-memory.dmp

    Filesize

    2.4MB

  • memory/1592-55-0x00000248561D0000-0x00000248561E0000-memory.dmp

    Filesize

    64KB

  • memory/1592-17-0x0000024856140000-0x0000024856150000-memory.dmp

    Filesize

    64KB

  • memory/1592-21-0x0000024856160000-0x0000024856170000-memory.dmp

    Filesize

    64KB

  • memory/1592-43-0x0000024856150000-0x0000024856160000-memory.dmp

    Filesize

    64KB

  • memory/1592-44-0x0000024856160000-0x0000024856170000-memory.dmp

    Filesize

    64KB

  • memory/1592-45-0x0000024856170000-0x0000024856180000-memory.dmp

    Filesize

    64KB

  • memory/1592-46-0x0000024856180000-0x0000024856190000-memory.dmp

    Filesize

    64KB

  • memory/1592-47-0x0000024856190000-0x00000248561A0000-memory.dmp

    Filesize

    64KB

  • memory/1592-48-0x00000248561A0000-0x00000248561B0000-memory.dmp

    Filesize

    64KB

  • memory/1592-49-0x00000248561B0000-0x00000248561C0000-memory.dmp

    Filesize

    64KB

  • memory/1592-50-0x00000248561C0000-0x00000248561D0000-memory.dmp

    Filesize

    64KB

  • memory/1592-53-0x0000024855EA0000-0x0000024855EA1000-memory.dmp

    Filesize

    4KB

  • memory/1592-54-0x00000248561C0000-0x00000248561D0000-memory.dmp

    Filesize

    64KB

  • memory/1592-39-0x0000024855EC0000-0x0000024856130000-memory.dmp

    Filesize

    2.4MB