Analysis
-
max time kernel
55s -
max time network
62s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
22/10/2024, 22:31
Behavioral task
behavioral1
Sample
zararli.jar
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
zararli.jar
Resource
win10-20240611-en
Behavioral task
behavioral3
Sample
zararli.jar
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
zararli.jar
Resource
win11-20241007-en
General
-
Target
zararli.jar
-
Size
443KB
-
MD5
c920884d4661a437fabfe9b327270fc1
-
SHA1
a7b5c2521ee8bb7b1b4c26e653a35398b6a2d341
-
SHA256
b499348a0d129cbed646d0c92c25af5f640474ddfc5655ab86ece8e99f6934cf
-
SHA512
33659c9745df93f24161124e9644ae7cefce68d924669ea44c4c93b829b9215a7eb26ff4b89cb96ebb519da59838c486b28c425f64b03bf8f41791468af13435
-
SSDEEP
12288:dZM7f1YoGr1NCSmTSosn5/5kYsTfite02bvzeiDFRC:duT6oGhNKfsnpOfj5DPC
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1180 icacls.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 java.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString java.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer java.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\ java.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName java.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3360 java.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3360 wrote to memory of 1180 3360 java.exe 72 PID 3360 wrote to memory of 1180 3360 java.exe 72
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\zararli.jar1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:1180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD538b065b5311dd1b698135c7f2c8a0ff1
SHA1eadcad07cea95bbaa87849b4ce21b51fea27f97e
SHA25625daa8f09fcabb9b8bcf87bfb799e9d83134bc92093542df08135de2002c4448
SHA5123d990df54bbb68e8668be5778cd8c4a5ac99b3a3f8943667ec9d79b7c5fc560d51ee16b9c7b28a76d2a9b756ec6be1f373adb0bc046ee797b4b6c615812419bd