Analysis
-
max time kernel
103s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2024, 10:18
Behavioral task
behavioral1
Sample
Netter client.jar
Resource
win10v2004-20241007-en
General
-
Target
Netter client.jar
-
Size
639KB
-
MD5
ac7aa68224aca52f547893fb48e7d1f7
-
SHA1
56b1cbb4a12bef2b25d61a0ee102e7ba09c5faaf
-
SHA256
f8b5f8491d1b59cc6d9cead4dd92f62085852aec00eec234c959cb031c7317d0
-
SHA512
0b8149560e8bef895fc10cc9644370c5b4b89272c9ba11af39325b68cd059661d21171f10929c0fa319e3f716e442e81ca3dbdde096cbbc343eb65de9f6a3012
-
SSDEEP
12288:5nxuQA/s2oDSf4jG8+p3go/NR7+B0uNKVhgA5uRCD3+uU2t0ST7DwL:5nwQMkDm4q/3go3exKVeC3+uJtHT7DwL
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1729419525319.tmp" reg.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3992 java.exe 3992 java.exe 3992 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3992 wrote to memory of 1468 3992 java.exe 89 PID 3992 wrote to memory of 1468 3992 java.exe 89 PID 1468 wrote to memory of 2676 1468 cmd.exe 91 PID 1468 wrote to memory of 2676 1468 cmd.exe 91 PID 3992 wrote to memory of 4400 3992 java.exe 102 PID 3992 wrote to memory of 4400 3992 java.exe 102
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\Netter client.jar"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1729419525319.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1729419525319.tmp" /f3⤵
- Adds Run key to start application
PID:2676
-
-
-
C:\Windows\SYSTEM32\reg.exereg query "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v Home2⤵PID:4400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD561caf13b8da5f35bc3af6e613a729a5c
SHA1ebcb05173f540b0f0419b4b3c394a8e894b66242
SHA256f0805da18005d8d1692c0cf9480188af2394ed3467c676bd9ec45f93b6828f2f
SHA512613da95d2237c318652d9d0af6b07a89aab95c70379b04c7546669c787f492d6123c8e4e5bf42cff7adc722adfa8896e1a9f4ef42b7e279d446956d713e200ac
-
Filesize
27KB
MD54cf140c119d9e6fa600e3220c4269b1e
SHA1460c191e84fb0a4afadfdb79c519f49eb31f31c0
SHA2569fbda1ee81c4408b003ebdf5edaead0dd59c3170bb442034f60d3baa663b4f43
SHA512304e63aa99bfd408a904d886a7a2ffb53f7323e35cd172c734ef8845027022ff90dc4fbb1bb38f35a6a1464cf30deae2492df1715a1f5d510e6dd54e9cf69a9f
-
Filesize
27KB
MD54e8ea84001d3d4bdf705214099d6630e
SHA18e865393a767ccb3fee736091399221a8cb3e6a5
SHA2561b99f903b4352b5b69e3d0978f2b8bb66eb590420fe50d5b9282bfaa0f186b8e
SHA512ec18223bb30a158693f8bd8b583ca92ab0862f127cd7d1c69396d76b93a82d64d6c32e0031729d3d6776797d4f218b10ad6fec94ca70ef06360857507691eb24
-
Filesize
3KB
MD522c3bc2c01f8b0ddf026c14666f721af
SHA17ddd20b43690b186e5b7acecb342f9f571e34779
SHA25685a4b95191d229e7978ad78165d021d00fbdb95f13284f883ed897310f7bf558
SHA51262291f7194d15e22e220222672f2701b9c949677c36b36ef49fb1b3ef0a1762f21f0415625242c0c1d1761f10b98948dae595aeb9c32e33e5956d7cec9e86458