Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/10/2024, 06:16

General

  • Target

    88ed9bf98dcee8fac802a3464ceac54ba2e5d0cc3367590ade74b66f643de4b8.jar

  • Size

    1.9MB

  • MD5

    adc8e85c37e61d770ff0f101c2a99dda

  • SHA1

    706ca1f3ddd80a9b8502098f40983a3e4a7e4d73

  • SHA256

    88ed9bf98dcee8fac802a3464ceac54ba2e5d0cc3367590ade74b66f643de4b8

  • SHA512

    7daad76e27b1023f9f60e7bd66b01c9de653e599f8db3fbd940003d7f4d575359734e01c185354a5d7c8aa65b46b7fb6726b08c3d9c766e0fc5957e7a5f96fb4

  • SSDEEP

    49152:7sTw/UxeMW8Nh8iXaIdyCt96Z4zhCD65n/w3EqDnEwzFd47qe:7sE/UIMVN+iXZyCt9k4zhz/2Ec5F8

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\88ed9bf98dcee8fac802a3464ceac54ba2e5d0cc3367590ade74b66f643de4b8.jar
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5068
    • C:\Windows\SYSTEM32\attrib.exe
      attrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1728972974600.tmp
      2⤵
      • Views/modifies file attributes
      PID:4320
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1728972974600.tmp" /f"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4224
      • C:\Windows\system32\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1728972974600.tmp" /f
        3⤵
        • Adds Run key to start application
        PID:3740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1728972974600.tmp

    Filesize

    1.9MB

    MD5

    adc8e85c37e61d770ff0f101c2a99dda

    SHA1

    706ca1f3ddd80a9b8502098f40983a3e4a7e4d73

    SHA256

    88ed9bf98dcee8fac802a3464ceac54ba2e5d0cc3367590ade74b66f643de4b8

    SHA512

    7daad76e27b1023f9f60e7bd66b01c9de653e599f8db3fbd940003d7f4d575359734e01c185354a5d7c8aa65b46b7fb6726b08c3d9c766e0fc5957e7a5f96fb4

  • memory/5068-37-0x00000128A70E0000-0x00000128A70E1000-memory.dmp

    Filesize

    4KB

  • memory/5068-48-0x00000128A73F0000-0x00000128A7400000-memory.dmp

    Filesize

    64KB

  • memory/5068-21-0x00000128A7390000-0x00000128A73A0000-memory.dmp

    Filesize

    64KB

  • memory/5068-23-0x00000128A73B0000-0x00000128A73C0000-memory.dmp

    Filesize

    64KB

  • memory/5068-22-0x00000128A73A0000-0x00000128A73B0000-memory.dmp

    Filesize

    64KB

  • memory/5068-25-0x00000128A73C0000-0x00000128A73D0000-memory.dmp

    Filesize

    64KB

  • memory/5068-26-0x00000128A70E0000-0x00000128A70E1000-memory.dmp

    Filesize

    4KB

  • memory/5068-28-0x00000128A73D0000-0x00000128A73E0000-memory.dmp

    Filesize

    64KB

  • memory/5068-17-0x00000128A7380000-0x00000128A7390000-memory.dmp

    Filesize

    64KB

  • memory/5068-32-0x00000128A73E0000-0x00000128A73F0000-memory.dmp

    Filesize

    64KB

  • memory/5068-34-0x00000128A73F0000-0x00000128A7400000-memory.dmp

    Filesize

    64KB

  • memory/5068-2-0x00000128A7100000-0x00000128A7370000-memory.dmp

    Filesize

    2.4MB

  • memory/5068-16-0x00000128A7370000-0x00000128A7380000-memory.dmp

    Filesize

    64KB

  • memory/5068-40-0x00000128A7380000-0x00000128A7390000-memory.dmp

    Filesize

    64KB

  • memory/5068-38-0x00000128A7100000-0x00000128A7370000-memory.dmp

    Filesize

    2.4MB

  • memory/5068-42-0x00000128A7390000-0x00000128A73A0000-memory.dmp

    Filesize

    64KB

  • memory/5068-43-0x00000128A73A0000-0x00000128A73B0000-memory.dmp

    Filesize

    64KB

  • memory/5068-44-0x00000128A73B0000-0x00000128A73C0000-memory.dmp

    Filesize

    64KB

  • memory/5068-45-0x00000128A73C0000-0x00000128A73D0000-memory.dmp

    Filesize

    64KB

  • memory/5068-46-0x00000128A73D0000-0x00000128A73E0000-memory.dmp

    Filesize

    64KB

  • memory/5068-47-0x00000128A73E0000-0x00000128A73F0000-memory.dmp

    Filesize

    64KB

  • memory/5068-39-0x00000128A7370000-0x00000128A7380000-memory.dmp

    Filesize

    64KB

  • memory/5068-51-0x00000128A7400000-0x00000128A7410000-memory.dmp

    Filesize

    64KB

  • memory/5068-52-0x00000128A70E0000-0x00000128A70E1000-memory.dmp

    Filesize

    4KB

  • memory/5068-53-0x00000128A7400000-0x00000128A7410000-memory.dmp

    Filesize

    64KB