Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15/10/2024, 06:16
Behavioral task
behavioral1
Sample
88ed9bf98dcee8fac802a3464ceac54ba2e5d0cc3367590ade74b66f643de4b8.jar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
88ed9bf98dcee8fac802a3464ceac54ba2e5d0cc3367590ade74b66f643de4b8.jar
Resource
win10v2004-20241007-en
General
-
Target
88ed9bf98dcee8fac802a3464ceac54ba2e5d0cc3367590ade74b66f643de4b8.jar
-
Size
1.9MB
-
MD5
adc8e85c37e61d770ff0f101c2a99dda
-
SHA1
706ca1f3ddd80a9b8502098f40983a3e4a7e4d73
-
SHA256
88ed9bf98dcee8fac802a3464ceac54ba2e5d0cc3367590ade74b66f643de4b8
-
SHA512
7daad76e27b1023f9f60e7bd66b01c9de653e599f8db3fbd940003d7f4d575359734e01c185354a5d7c8aa65b46b7fb6726b08c3d9c766e0fc5957e7a5f96fb4
-
SSDEEP
49152:7sTw/UxeMW8Nh8iXaIdyCt96Z4zhCD65n/w3EqDnEwzFd47qe:7sE/UIMVN+iXZyCt9k4zhz/2Ec5F8
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1728972974600.tmp" reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5068 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5068 wrote to memory of 4320 5068 java.exe 88 PID 5068 wrote to memory of 4320 5068 java.exe 88 PID 5068 wrote to memory of 4224 5068 java.exe 90 PID 5068 wrote to memory of 4224 5068 java.exe 90 PID 4224 wrote to memory of 3740 4224 cmd.exe 92 PID 4224 wrote to memory of 3740 4224 cmd.exe 92 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4320 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\88ed9bf98dcee8fac802a3464ceac54ba2e5d0cc3367590ade74b66f643de4b8.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1728972974600.tmp2⤵
- Views/modifies file attributes
PID:4320
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1728972974600.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1728972974600.tmp" /f3⤵
- Adds Run key to start application
PID:3740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5adc8e85c37e61d770ff0f101c2a99dda
SHA1706ca1f3ddd80a9b8502098f40983a3e4a7e4d73
SHA25688ed9bf98dcee8fac802a3464ceac54ba2e5d0cc3367590ade74b66f643de4b8
SHA5127daad76e27b1023f9f60e7bd66b01c9de653e599f8db3fbd940003d7f4d575359734e01c185354a5d7c8aa65b46b7fb6726b08c3d9c766e0fc5957e7a5f96fb4