Analysis

  • max time kernel
    128s
  • max time network
    125s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    18/10/2024, 17:26

General

  • Target

    6812964531.exe

  • Size

    67KB

  • MD5

    7de65122a13ab9d81368ee3dff3cc80a

  • SHA1

    ecbb4db641431d4d672e4b88e8d309419fd32f04

  • SHA256

    a73a05a4b6ec6ae1c1ba6d3d12b68cc52b899e2a6dbbaaa1f48f2c260a733123

  • SHA512

    b156d77a665c3256ddfd016e46105b6e87db6a4c1ca77e9bb25b221c368f3cc53dddc7159602cfb926ef0cc9bacac57b6bd41e7e28998883c996727d58d29401

  • SSDEEP

    1536:pr3rob4nqB6veqHnq+Pgm5NN9vbDTc+1vIQ/EXyBej:h7PEg3qcv5PvB/EVj

Malware Config

Signatures

  • Indicator Removal: Clear Persistence 1 TTPs 2 IoCs

    Clear artifacts associated with previously established persistence like scheduletasks on a host.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6812964531.exe
    "C:\Users\Admin\AppData\Local\Temp\6812964531.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1372
    • C:\Program Files\Java\jre-1.8\bin\javaw.exe
      "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\6812964531.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4288
      • C:\Program Files\Java\jre-1.8\bin\java.exe
        java -jar C:\Users\Admin\download_libra.jar
        3⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4596
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:236
          • C:\Windows\system32\cacls.exe
            "C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"
            5⤵
              PID:4760
          • C:\Windows\SYSTEM32\cmd.exe
            cmd /c SCHTASKS /CREATE /F /SC MINUTE /TN OneDrive\OneDriveUpdateTask /RL HIGHEST /TR C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\cache.jar
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2016
            • C:\Windows\system32\schtasks.exe
              SCHTASKS /CREATE /F /SC MINUTE /TN OneDrive\OneDriveUpdateTask /RL HIGHEST /TR C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\cache.jar
              5⤵
              • Scheduled Task/Job: Scheduled Task
              PID:2840
          • C:\Program Files\Java\jre-1.8\bin\javaw.exe
            "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\cache.jar"
            4⤵
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:740
            • C:\Windows\SYSTEM32\cmd.exe
              cmd /c wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1500
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List
                6⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:4436
            • C:\Windows\SYSTEM32\cmd.exe
              cmd /c wmic cpu get name
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2828
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic cpu get name
                6⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:3116
            • C:\Windows\SYSTEM32\cmd.exe
              cmd /c SCHTASKS /DELETE /TN OneDrive\OneDriveUpdateTask /F
              5⤵
              • Indicator Removal: Clear Persistence
              • Suspicious use of WriteProcessMemory
              PID:488
              • C:\Windows\system32\schtasks.exe
                SCHTASKS /DELETE /TN OneDrive\OneDriveUpdateTask /F
                6⤵
                  PID:1892
              • C:\Windows\SYSTEM32\cmd.exe
                cmd /c SCHTASKS /DELETE /TN OneDrive /F
                5⤵
                • Indicator Removal: Clear Persistence
                • Suspicious use of WriteProcessMemory
                PID:3288
                • C:\Windows\system32\schtasks.exe
                  SCHTASKS /DELETE /TN OneDrive /F
                  6⤵
                    PID:5008
                • C:\Windows\SYSTEM32\cmd.exe
                  cmd /c ping localhost -n 5 > nul && rmdir /s /q C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer
                  5⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:2968
                  • C:\Windows\system32\PING.EXE
                    ping localhost -n 5
                    6⤵
                    • System Network Configuration Discovery: Internet Connection Discovery
                    • Runs ping.exe
                    PID:1836

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

          Filesize

          46B

          MD5

          eb5c411a5dde573fa0cbed84e05cc72d

          SHA1

          ce06686b81c0688beaaca46592a99e306e6a7fb5

          SHA256

          3698d090a166d3176dda8110c0c9016bbb13d012b4e8d486846fcb6ed8071bd7

          SHA512

          38f45c1060b83a4d7bc9a499af5bc16a05dafe112e5ac38d11f622facd6bdd104d14a5f5b9227881c6b877a2b8887b7435840a6718ae1551d251dde3ac38ae38

        • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

          Filesize

          46B

          MD5

          ab3a1f9409fae5f40a955dcce73c1c3b

          SHA1

          c8e423ebaeb682624c9129c28d14e3d9b7c2d0d5

          SHA256

          ff2a8c5e921c5dd583531ccc3f2be10a2592737b93e456d64435812d1d273dc7

          SHA512

          01547de74601d6fb5861e98d354529f04dcc1d9766caf1ac44a02eedb3a2678e66a3765cdf815c9aeff81bad07d16da4a6b0a2bdc744d2f6c2161011b048bb16

        • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3870231897-2573482396-1083937135-1000\83aa4cc77f591dfc2374580bbd95f6ba_27b06f29-58d3-4ff3-b1fc-f519e4e4f0ec

          Filesize

          45B

          MD5

          c8366ae350e7019aefc9d1e6e6a498c6

          SHA1

          5731d8a3e6568a5f2dfbbc87e3db9637df280b61

          SHA256

          11e6aca8e682c046c83b721eeb5c72c5ef03cb5936c60df6f4993511ddc61238

          SHA512

          33c980d5a638bfc791de291ebf4b6d263b384247ab27f261a54025108f2f85374b579a026e545f81395736dd40fa4696f2163ca17640dd47f1c42bc9971b18cd

        • C:\Users\Admin\download_libra.jar

          Filesize

          25.9MB

          MD5

          cc95cb5e5b0dc59b23a60719c60f6df8

          SHA1

          6c6d857ef60ecbb86369450524ca9a4a2e7da8ae

          SHA256

          1a59b16b933e9ff8aff37f9766b8ec22ab5519b31f499536118badd84c871d7d

          SHA512

          4152c6cdfc071328f583786dabb3afbff8688d985869449839caa8e3038c0ccae8b411d79a3194c7ae754d14f0c94797b38ba131074de3d419dd000fe1f2c764

        • memory/740-179-0x000001601C3B0000-0x000001601C3B1000-memory.dmp

          Filesize

          4KB

        • memory/740-183-0x000001601C3B0000-0x000001601C3B1000-memory.dmp

          Filesize

          4KB

        • memory/740-178-0x000001601C3B0000-0x000001601C3B1000-memory.dmp

          Filesize

          4KB

        • memory/740-186-0x000001601C3B0000-0x000001601C3B1000-memory.dmp

          Filesize

          4KB

        • memory/740-175-0x000001601C3B0000-0x000001601C3B1000-memory.dmp

          Filesize

          4KB

        • memory/740-174-0x000001601C3B0000-0x000001601C3B1000-memory.dmp

          Filesize

          4KB

        • memory/740-189-0x000001601C3B0000-0x000001601C3B1000-memory.dmp

          Filesize

          4KB

        • memory/740-196-0x000001601C3B0000-0x000001601C3B1000-memory.dmp

          Filesize

          4KB

        • memory/740-207-0x000001601C3B0000-0x000001601C3B1000-memory.dmp

          Filesize

          4KB

        • memory/1372-0-0x0000000000A40000-0x0000000000A5F000-memory.dmp

          Filesize

          124KB

        • memory/4288-91-0x00000204FF440000-0x00000204FF441000-memory.dmp

          Filesize

          4KB

        • memory/4288-111-0x00000204FF440000-0x00000204FF441000-memory.dmp

          Filesize

          4KB

        • memory/4288-49-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-51-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-56-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-55-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-53-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-59-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-60-0x00000204FF440000-0x00000204FF441000-memory.dmp

          Filesize

          4KB

        • memory/4288-66-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-69-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-71-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-74-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-75-0x00000204FF440000-0x00000204FF441000-memory.dmp

          Filesize

          4KB

        • memory/4288-81-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-86-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-44-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-97-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-99-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-102-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-104-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-106-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-108-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-48-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-114-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-116-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-119-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-123-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-40-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-3-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-37-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-12-0x00000204FF440000-0x00000204FF441000-memory.dmp

          Filesize

          4KB

        • memory/4288-148-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-15-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-36-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-19-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-172-0x00000204FF440000-0x00000204FF441000-memory.dmp

          Filesize

          4KB

        • memory/4288-173-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-33-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-29-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-26-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-22-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-25-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-17-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4596-171-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB

        • memory/4596-156-0x0000021A3BE50000-0x0000021A3BE51000-memory.dmp

          Filesize

          4KB

        • memory/4596-147-0x0000021A3BE50000-0x0000021A3BE51000-memory.dmp

          Filesize

          4KB

        • memory/4596-136-0x00007FFC4AE80000-0x00007FFC4B089000-memory.dmp

          Filesize

          2.0MB