Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2024, 09:06
Behavioral task
behavioral1
Sample
CLOdeCLientV3.jar
Resource
win7-20241010-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
CLOdeCLientV3.jar
Resource
win10v2004-20241007-en
3 signatures
150 seconds
General
-
Target
CLOdeCLientV3.jar
-
Size
639KB
-
MD5
48ab127669aa2f52eb2556bd85a70a56
-
SHA1
73f3a37113027476c77e36b8008e38729bc9874e
-
SHA256
bb75ca9e8f6074ecaf8eabe0f80e309e92d86f244921d8d316bf8dc67249e52c
-
SHA512
3735831cee161115a0c776ec6a5ee05c21db87626e347a557cc32ee1f2004daa262d3235b55b019cfa79a1d7d0e5c244b2ec7d1a9403414562fdb0e233062e38
-
SSDEEP
12288:zDRsQy/e0mlE/43o0kfngI/dR7+NmGN6hng4tmR813uuc2dQS5DDcO:zDmQ2alw4YrngIHCj6hgu/uuhdr5DDcO
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1729415174494.tmp" reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5056 java.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 5056 wrote to memory of 1972 5056 java.exe 88 PID 5056 wrote to memory of 1972 5056 java.exe 88 PID 1972 wrote to memory of 456 1972 cmd.exe 90 PID 1972 wrote to memory of 456 1972 cmd.exe 90
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\CLOdeCLientV3.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1729415174494.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1729415174494.tmp" /f3⤵
- Adds Run key to start application
PID:456
-
-