Analysis

  • max time kernel
    12s
  • max time network
    15s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:19

General

  • Target

    adsadas.jar

  • Size

    639KB

  • MD5

    7f07c7218711599cce097d0b8a62b58b

  • SHA1

    6585d85f088390d674c4a68b7a89587a96642ad5

  • SHA256

    bb4f53538256b6e885a21772afed9ebb70163bcc32a5a1b78c1251f68bd1a186

  • SHA512

    e11cb233be1aedd1f21fbac9e64749bf8dfa77a4f5b98952b29a556d6c9d246295508a52c82fbba70043a3862df9b6a2f061a6d8bbaf685b30dcb5d564cd5f49

  • SSDEEP

    12288:MXLbQP/h1fiJ54V3Q3+TgC/3R7+9ZcNmT8gaJSRbS3suo2dMS0dDwj2:MXPQXHib4p3TgCJSwmTBQJsuFdP0dDwK

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\adsadas.jar
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4212
    • C:\Windows\SYSTEM32\attrib.exe
      attrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1731291603516.tmp
      2⤵
      • Views/modifies file attributes
      PID:2656
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1731291603516.tmp" /f"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3212
      • C:\Windows\system32\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1731291603516.tmp" /f
        3⤵
        • Adds Run key to start application
        PID:3136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1731291603516.tmp

    Filesize

    639KB

    MD5

    7f07c7218711599cce097d0b8a62b58b

    SHA1

    6585d85f088390d674c4a68b7a89587a96642ad5

    SHA256

    bb4f53538256b6e885a21772afed9ebb70163bcc32a5a1b78c1251f68bd1a186

    SHA512

    e11cb233be1aedd1f21fbac9e64749bf8dfa77a4f5b98952b29a556d6c9d246295508a52c82fbba70043a3862df9b6a2f061a6d8bbaf685b30dcb5d564cd5f49

  • memory/4212-50-0x0000019A37390000-0x0000019A373A0000-memory.dmp

    Filesize

    64KB

  • memory/4212-75-0x0000019A37370000-0x0000019A37380000-memory.dmp

    Filesize

    64KB

  • memory/4212-23-0x0000019A37310000-0x0000019A37320000-memory.dmp

    Filesize

    64KB

  • memory/4212-22-0x0000019A37300000-0x0000019A37310000-memory.dmp

    Filesize

    64KB

  • memory/4212-19-0x0000019A372F0000-0x0000019A37300000-memory.dmp

    Filesize

    64KB

  • memory/4212-25-0x0000019A37320000-0x0000019A37330000-memory.dmp

    Filesize

    64KB

  • memory/4212-46-0x0000019A372E0000-0x0000019A372F0000-memory.dmp

    Filesize

    64KB

  • memory/4212-31-0x0000019A37350000-0x0000019A37360000-memory.dmp

    Filesize

    64KB

  • memory/4212-30-0x0000019A37340000-0x0000019A37350000-memory.dmp

    Filesize

    64KB

  • memory/4212-33-0x0000019A357D0000-0x0000019A357D1000-memory.dmp

    Filesize

    4KB

  • memory/4212-15-0x0000019A372D0000-0x0000019A372E0000-memory.dmp

    Filesize

    64KB

  • memory/4212-40-0x0000019A37360000-0x0000019A37370000-memory.dmp

    Filesize

    64KB

  • memory/4212-39-0x0000019A37060000-0x0000019A372D0000-memory.dmp

    Filesize

    2.4MB

  • memory/4212-43-0x0000019A37370000-0x0000019A37380000-memory.dmp

    Filesize

    64KB

  • memory/4212-42-0x0000019A372D0000-0x0000019A372E0000-memory.dmp

    Filesize

    64KB

  • memory/4212-44-0x0000019A357D0000-0x0000019A357D1000-memory.dmp

    Filesize

    4KB

  • memory/4212-48-0x0000019A37380000-0x0000019A37390000-memory.dmp

    Filesize

    64KB

  • memory/4212-55-0x0000019A373A0000-0x0000019A373B0000-memory.dmp

    Filesize

    64KB

  • memory/4212-27-0x0000019A37330000-0x0000019A37340000-memory.dmp

    Filesize

    64KB

  • memory/4212-18-0x0000019A372E0000-0x0000019A372F0000-memory.dmp

    Filesize

    64KB

  • memory/4212-47-0x0000019A372F0000-0x0000019A37300000-memory.dmp

    Filesize

    64KB

  • memory/4212-54-0x0000019A37310000-0x0000019A37320000-memory.dmp

    Filesize

    64KB

  • memory/4212-53-0x0000019A37300000-0x0000019A37310000-memory.dmp

    Filesize

    64KB

  • memory/4212-58-0x0000019A373B0000-0x0000019A373C0000-memory.dmp

    Filesize

    64KB

  • memory/4212-59-0x0000019A357D0000-0x0000019A357D1000-memory.dmp

    Filesize

    4KB

  • memory/4212-63-0x0000019A373C0000-0x0000019A373D0000-memory.dmp

    Filesize

    64KB

  • memory/4212-62-0x0000019A37320000-0x0000019A37330000-memory.dmp

    Filesize

    64KB

  • memory/4212-65-0x0000019A37330000-0x0000019A37340000-memory.dmp

    Filesize

    64KB

  • memory/4212-66-0x0000019A373D0000-0x0000019A373E0000-memory.dmp

    Filesize

    64KB

  • memory/4212-71-0x0000019A373E0000-0x0000019A373F0000-memory.dmp

    Filesize

    64KB

  • memory/4212-70-0x0000019A37350000-0x0000019A37360000-memory.dmp

    Filesize

    64KB

  • memory/4212-69-0x0000019A37340000-0x0000019A37350000-memory.dmp

    Filesize

    64KB

  • memory/4212-72-0x0000019A357D0000-0x0000019A357D1000-memory.dmp

    Filesize

    4KB

  • memory/4212-74-0x0000019A37360000-0x0000019A37370000-memory.dmp

    Filesize

    64KB

  • memory/4212-2-0x0000019A37060000-0x0000019A372D0000-memory.dmp

    Filesize

    2.4MB

  • memory/4212-76-0x0000019A37380000-0x0000019A37390000-memory.dmp

    Filesize

    64KB

  • memory/4212-77-0x0000019A37390000-0x0000019A373A0000-memory.dmp

    Filesize

    64KB

  • memory/4212-78-0x0000019A373A0000-0x0000019A373B0000-memory.dmp

    Filesize

    64KB

  • memory/4212-79-0x0000019A373B0000-0x0000019A373C0000-memory.dmp

    Filesize

    64KB

  • memory/4212-80-0x0000019A373C0000-0x0000019A373D0000-memory.dmp

    Filesize

    64KB