Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 14:06
Behavioral task
behavioral1
Sample
GG.jar
Resource
win10v2004-20241007-en
General
-
Target
GG.jar
-
Size
639KB
-
MD5
2975917970d173042280a2f2a94a90f2
-
SHA1
2ff157cf7f9ea3dcc19061311ff9145ee6d25167
-
SHA256
8283d2afe7813541a82b818e8fd2225c959f1bf193e932e3892814c0fc73a143
-
SHA512
36ddae37956957a822c3ced2cbe0c53ce1cce8f9b89561c557de2cec06bd1c52d4abb6421d35fe18e9e126252ea8c348a91603517ea2ae48fa22800ae99f5a26
-
SSDEEP
12288:rDZ8QS/Wc2VUX43QcUfngg/1R7+9OeNC53gIFmRkF3+us2loSpTD03:rDGQWSVQ4A7nggvaTC5QOv+uRlzpTD03
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1730902005064.tmp" reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
java.exepid process 3688 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
java.execmd.exedescription pid process target process PID 3688 wrote to memory of 4768 3688 java.exe attrib.exe PID 3688 wrote to memory of 4768 3688 java.exe attrib.exe PID 3688 wrote to memory of 3304 3688 java.exe cmd.exe PID 3688 wrote to memory of 3304 3688 java.exe cmd.exe PID 3304 wrote to memory of 2600 3304 cmd.exe reg.exe PID 3304 wrote to memory of 2600 3304 cmd.exe reg.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\GG.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1730902005064.tmp2⤵
- Views/modifies file attributes
PID:4768
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1730902005064.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1730902005064.tmp" /f3⤵
- Adds Run key to start application
PID:2600
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
639KB
MD52975917970d173042280a2f2a94a90f2
SHA12ff157cf7f9ea3dcc19061311ff9145ee6d25167
SHA2568283d2afe7813541a82b818e8fd2225c959f1bf193e932e3892814c0fc73a143
SHA51236ddae37956957a822c3ced2cbe0c53ce1cce8f9b89561c557de2cec06bd1c52d4abb6421d35fe18e9e126252ea8c348a91603517ea2ae48fa22800ae99f5a26