Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    26-10-2024 12:30

General

  • Target

    0a0e0d2f9daa0bad25c3defd69a3a6d96a6ac5f325a369761807c06887d3bd9f.jar

  • Size

    329KB

  • MD5

    f1d0370f57f1dffbce1b665e45483da1

  • SHA1

    5cf0a176fcb31e091099a3b661b4bd8eab418cf1

  • SHA256

    0a0e0d2f9daa0bad25c3defd69a3a6d96a6ac5f325a369761807c06887d3bd9f

  • SHA512

    660ba4fe4cbbf9286272054472c07cc041c3eeaa911d68ca0f45b398c202f379b74b2a2443bda6da163ec58ddfc97b615d97869265238d76f5f0b179d09a7a52

  • SSDEEP

    6144:1ieAn4qfVev93QG4B9XQdKuPKwdWBsw3eO8RQrFXg3iWA5iHDX0:1Ra4qfA93BdTk3OeFXg3iDWo

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\0a0e0d2f9daa0bad25c3defd69a3a6d96a6ac5f325a369761807c06887d3bd9f.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1784
    • C:\Windows\system32\regsvr32.exe
      regsvr32 /s C:\Users\Admin\AppData\Local\Temp\\317631.png
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2300
      • C:\Windows\SysWOW64\regsvr32.exe
        /s C:\Users\Admin\AppData\Local\Temp\\317631.png
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\317631.png

    Filesize

    476KB

    MD5

    f32839de7b3209090778a9a4c5e14cce

    SHA1

    ca33599617a5de46cb3e726d66eee9d48e5a78af

    SHA256

    aab9e3d3f923f7c17694df3bd395aea1112f87e63580c1762579c43056d3b2da

    SHA512

    0aff888a6433bbae83bf2f7694158d25ceb6e3c7083b447cfb9241e529df0971d70598eb5005e048f605237def92f1a89c6172095272fd13b5add85cdab20015

  • memory/1784-2-0x00000000026C0000-0x0000000002930000-memory.dmp

    Filesize

    2.4MB

  • memory/1784-12-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/1784-14-0x00000000026C0000-0x0000000002930000-memory.dmp

    Filesize

    2.4MB

  • memory/1876-16-0x0000000000270000-0x00000000002A4000-memory.dmp

    Filesize

    208KB

  • memory/1876-17-0x0000000000270000-0x00000000002A4000-memory.dmp

    Filesize

    208KB