Analysis
-
max time kernel
12s -
max time network
15s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:19
Behavioral task
behavioral1
Sample
adsadas.jar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
adsadas.jar
Resource
win10v2004-20241007-en
General
-
Target
adsadas.jar
-
Size
639KB
-
MD5
7f07c7218711599cce097d0b8a62b58b
-
SHA1
6585d85f088390d674c4a68b7a89587a96642ad5
-
SHA256
bb4f53538256b6e885a21772afed9ebb70163bcc32a5a1b78c1251f68bd1a186
-
SHA512
e11cb233be1aedd1f21fbac9e64749bf8dfa77a4f5b98952b29a556d6c9d246295508a52c82fbba70043a3862df9b6a2f061a6d8bbaf685b30dcb5d564cd5f49
-
SSDEEP
12288:MXLbQP/h1fiJ54V3Q3+TgC/3R7+9ZcNmT8gaJSRbS3suo2dMS0dDwj2:MXPQXHib4p3TgCJSwmTBQJsuFdP0dDwK
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1731291603516.tmp" reg.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4212 java.exe 4212 java.exe 4212 java.exe 4212 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4212 wrote to memory of 2656 4212 java.exe 87 PID 4212 wrote to memory of 2656 4212 java.exe 87 PID 4212 wrote to memory of 3212 4212 java.exe 89 PID 4212 wrote to memory of 3212 4212 java.exe 89 PID 3212 wrote to memory of 3136 3212 cmd.exe 91 PID 3212 wrote to memory of 3136 3212 cmd.exe 91 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2656 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\adsadas.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1731291603516.tmp2⤵
- Views/modifies file attributes
PID:2656
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1731291603516.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1731291603516.tmp" /f3⤵
- Adds Run key to start application
PID:3136
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
639KB
MD57f07c7218711599cce097d0b8a62b58b
SHA16585d85f088390d674c4a68b7a89587a96642ad5
SHA256bb4f53538256b6e885a21772afed9ebb70163bcc32a5a1b78c1251f68bd1a186
SHA512e11cb233be1aedd1f21fbac9e64749bf8dfa77a4f5b98952b29a556d6c9d246295508a52c82fbba70043a3862df9b6a2f061a6d8bbaf685b30dcb5d564cd5f49