Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
26-10-2024 12:30
Static task
static1
Behavioral task
behavioral1
Sample
0a0e0d2f9daa0bad25c3defd69a3a6d96a6ac5f325a369761807c06887d3bd9f.jar
Resource
win7-20241023-en
General
-
Target
0a0e0d2f9daa0bad25c3defd69a3a6d96a6ac5f325a369761807c06887d3bd9f.jar
-
Size
329KB
-
MD5
f1d0370f57f1dffbce1b665e45483da1
-
SHA1
5cf0a176fcb31e091099a3b661b4bd8eab418cf1
-
SHA256
0a0e0d2f9daa0bad25c3defd69a3a6d96a6ac5f325a369761807c06887d3bd9f
-
SHA512
660ba4fe4cbbf9286272054472c07cc041c3eeaa911d68ca0f45b398c202f379b74b2a2443bda6da163ec58ddfc97b615d97869265238d76f5f0b179d09a7a52
-
SSDEEP
6144:1ieAn4qfVev93QG4B9XQdKuPKwdWBsw3eO8RQrFXg3iWA5iHDX0:1Ra4qfA93BdTk3OeFXg3iDWo
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1876 regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1784 wrote to memory of 2300 1784 java.exe 31 PID 1784 wrote to memory of 2300 1784 java.exe 31 PID 1784 wrote to memory of 2300 1784 java.exe 31 PID 1784 wrote to memory of 2300 1784 java.exe 31 PID 1784 wrote to memory of 2300 1784 java.exe 31 PID 2300 wrote to memory of 1876 2300 regsvr32.exe 32 PID 2300 wrote to memory of 1876 2300 regsvr32.exe 32 PID 2300 wrote to memory of 1876 2300 regsvr32.exe 32 PID 2300 wrote to memory of 1876 2300 regsvr32.exe 32 PID 2300 wrote to memory of 1876 2300 regsvr32.exe 32 PID 2300 wrote to memory of 1876 2300 regsvr32.exe 32 PID 2300 wrote to memory of 1876 2300 regsvr32.exe 32
Processes
-
C:\Windows\system32\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\0a0e0d2f9daa0bad25c3defd69a3a6d96a6ac5f325a369761807c06887d3bd9f.jar1⤵
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\\317631.png2⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\\317631.png3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1876
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476KB
MD5f32839de7b3209090778a9a4c5e14cce
SHA1ca33599617a5de46cb3e726d66eee9d48e5a78af
SHA256aab9e3d3f923f7c17694df3bd395aea1112f87e63580c1762579c43056d3b2da
SHA5120aff888a6433bbae83bf2f7694158d25ceb6e3c7083b447cfb9241e529df0971d70598eb5005e048f605237def92f1a89c6172095272fd13b5add85cdab20015