Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20241023-en -
resource tags
arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system -
submitted
16-11-2024 06:15
Behavioral task
behavioral1
Sample
built.jar
Resource
win11-20241023-en
General
-
Target
built.jar
-
Size
639KB
-
MD5
6b5b829c063142549a57c945b056ad3f
-
SHA1
07ad97d0e1252a28ec1ab8fbfb0bddc647a3df5a
-
SHA256
b568557f6219bf59cd785dd1b9f73a1ed9bf99b1f09a1b4f450a3b06214093d4
-
SHA512
8c59065dc07ee1b3fabeefea90355cf3c361de96b094f6eee194df14afb9e87041fde8bf1d729e4fc5610a829e9382e06e9054676104ae6a7157c1deef99c44f
-
SSDEEP
12288:eXn5Q1/rD5kTN49145MbgO/LR7+BvINKnigyJiRN83cu82RcSStDkl:eX5QlJkh4TzbgOFmSKnjAhcuBRfStDkl
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000\Software\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1731737718352.tmp" reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1188 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1188 wrote to memory of 4268 1188 java.exe 81 PID 1188 wrote to memory of 4268 1188 java.exe 81 PID 1188 wrote to memory of 3408 1188 java.exe 83 PID 1188 wrote to memory of 3408 1188 java.exe 83 PID 3408 wrote to memory of 4568 3408 cmd.exe 85 PID 3408 wrote to memory of 4568 3408 cmd.exe 85 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4268 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\built.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1731737718352.tmp2⤵
- Views/modifies file attributes
PID:4268
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1731737718352.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1731737718352.tmp" /f3⤵
- Adds Run key to start application
PID:4568
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
639KB
MD56b5b829c063142549a57c945b056ad3f
SHA107ad97d0e1252a28ec1ab8fbfb0bddc647a3df5a
SHA256b568557f6219bf59cd785dd1b9f73a1ed9bf99b1f09a1b4f450a3b06214093d4
SHA5128c59065dc07ee1b3fabeefea90355cf3c361de96b094f6eee194df14afb9e87041fde8bf1d729e4fc5610a829e9382e06e9054676104ae6a7157c1deef99c44f