Resubmissions
18-10-2024 17:25
241018-vzl1la1cqq 1018-10-2024 16:26
241018-txhdyswgqh 1018-10-2024 16:25
241018-tw78zsydrp 318-10-2024 16:22
241018-tvh8gawfqa 3Analysis
-
max time kernel
44s -
max time network
46s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
18-10-2024 16:22
Static task
static1
Behavioral task
behavioral1
Sample
6812964531.exe
Resource
win11-20240802-en
General
-
Target
6812964531.exe
-
Size
67KB
-
MD5
7de65122a13ab9d81368ee3dff3cc80a
-
SHA1
ecbb4db641431d4d672e4b88e8d309419fd32f04
-
SHA256
a73a05a4b6ec6ae1c1ba6d3d12b68cc52b899e2a6dbbaaa1f48f2c260a733123
-
SHA512
b156d77a665c3256ddfd016e46105b6e87db6a4c1ca77e9bb25b221c368f3cc53dddc7159602cfb926ef0cc9bacac57b6bd41e7e28998883c996727d58d29401
-
SSDEEP
1536:pr3rob4nqB6veqHnq+Pgm5NN9vbDTc+1vIQ/EXyBej:h7PEg3qcv5PvB/EVj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
6812964531.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6812964531.exe -
Modifies registry class 1 IoCs
Processes:
java.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1287768749-810021449-2672985988-1000_Classes\Local Settings java.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
java.exepid Process 4380 java.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
6812964531.exejavaw.exejava.execmd.execmd.exedescription pid Process procid_target PID 1436 wrote to memory of 4660 1436 6812964531.exe 78 PID 1436 wrote to memory of 4660 1436 6812964531.exe 78 PID 4660 wrote to memory of 4380 4660 javaw.exe 79 PID 4660 wrote to memory of 4380 4660 javaw.exe 79 PID 4380 wrote to memory of 2012 4380 java.exe 81 PID 4380 wrote to memory of 2012 4380 java.exe 81 PID 2012 wrote to memory of 1696 2012 cmd.exe 83 PID 2012 wrote to memory of 1696 2012 cmd.exe 83 PID 4380 wrote to memory of 4116 4380 java.exe 84 PID 4380 wrote to memory of 4116 4380 java.exe 84 PID 4116 wrote to memory of 1036 4116 cmd.exe 86 PID 4116 wrote to memory of 1036 4116 cmd.exe 86 PID 4380 wrote to memory of 4208 4380 java.exe 87 PID 4380 wrote to memory of 4208 4380 java.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6812964531.exe"C:\Users\Admin\AppData\Local\Temp\6812964531.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\6812964531.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Program Files\Java\jre-1.8\bin\java.exejava -jar C:\Users\Admin\download_libra.jar3⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SYSTEM32\cmd.execmd.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"5⤵PID:1696
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c SCHTASKS /CREATE /F /SC MINUTE /TN OneDrive\OneDriveUpdateTask /RL HIGHEST /TR C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\cache.jar4⤵
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\system32\schtasks.exeSCHTASKS /CREATE /F /SC MINUTE /TN OneDrive\OneDriveUpdateTask /RL HIGHEST /TR C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\cache.jar5⤵
- Scheduled Task/Job: Scheduled Task
PID:1036
-
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\cache.jar"4⤵PID:4208
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD53cd0fbbe5debd9c5ec5725a06eefdcb7
SHA169a5ee599113fd7b86170864deae54af6f3ba515
SHA256fd3e583599065bddb1ce42ce0ddc72d5aad716d987446ecd6995dca0593c4549
SHA512a89a95e0b9195f2d14cccafc5784819bbe66823e98b4f590df1116248900eb01eba0eb2259b28ad344aca78a42363f25a99edd662614f9a0b46cefd4ec8af122
-
Filesize
46B
MD5a822120a2d781c6d24b2ca6bfe5d0d53
SHA12a8106150eb96d076dfaf094d06f6136e3d51542
SHA25687d9cccf0604cf09f8e71c526a7bb15a20a4b7e4ed7e71b3f06375c88fe34358
SHA512633738f5dcf4f24aec49e414b2a0e0e54a795cdee35dc0a9671d88cde65cef1a3a37715c5672dea74e932c346dba183bcac568f307c1ee6f4efaa812d01b880e
-
Filesize
25.9MB
MD5985b88f00a71cca64b06496800ea0b6f
SHA1b7f8cc23a514ddb16611a7606b60d07aabe6ee30
SHA256700460f2cd5fe2f126396e25f594cce96cb22322231bc28d728e3699ce5663a9
SHA512ef72748f431ca9dd0124ad1e01eb0e4afb69dbf778144ef21b37eb2d6dc0466d11152e0a9e66e502bc26ea44ba6b5467e0db51196fd642bf162a5675c30d46fc