Analysis
-
max time kernel
139s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16/10/2024, 05:49
Behavioral task
behavioral1
Sample
f99bcea6642af814c6faaa19cf737798783c435b15b8d48931f349217c854657.jar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f99bcea6642af814c6faaa19cf737798783c435b15b8d48931f349217c854657.jar
Resource
win10v2004-20241007-en
General
-
Target
f99bcea6642af814c6faaa19cf737798783c435b15b8d48931f349217c854657.jar
-
Size
1.9MB
-
MD5
09cc5b17f01a4f73dfae4f4171ad023d
-
SHA1
e8c444beba97b20e6b2b4522391f0a440b34998b
-
SHA256
f99bcea6642af814c6faaa19cf737798783c435b15b8d48931f349217c854657
-
SHA512
b36f936a47983106519d42244abe920447cd24117995d70c7c74d0cdbc4fb58cebde55ccd238b055b8d4a6b7c8a0e562af7d736ef414a8293a4c66612514b510
-
SSDEEP
49152:ZohH8h4LsMSxH9SolgXHrdNWWa919jkPj23dassdzkuO+JNGzmJy2BiUL:ZohHULMSxdSolgXr3ACYdadU2BiUL
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1729057791431.tmp" reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2344 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2344 wrote to memory of 3788 2344 java.exe 88 PID 2344 wrote to memory of 3788 2344 java.exe 88 PID 2344 wrote to memory of 3948 2344 java.exe 90 PID 2344 wrote to memory of 3948 2344 java.exe 90 PID 3948 wrote to memory of 736 3948 cmd.exe 92 PID 3948 wrote to memory of 736 3948 cmd.exe 92 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3788 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\f99bcea6642af814c6faaa19cf737798783c435b15b8d48931f349217c854657.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1729057791431.tmp2⤵
- Views/modifies file attributes
PID:3788
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1729057791431.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1729057791431.tmp" /f3⤵
- Adds Run key to start application
PID:736
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD509cc5b17f01a4f73dfae4f4171ad023d
SHA1e8c444beba97b20e6b2b4522391f0a440b34998b
SHA256f99bcea6642af814c6faaa19cf737798783c435b15b8d48931f349217c854657
SHA512b36f936a47983106519d42244abe920447cd24117995d70c7c74d0cdbc4fb58cebde55ccd238b055b8d4a6b7c8a0e562af7d736ef414a8293a4c66612514b510