Analysis Overview
SHA256
39ab8b4c44eae3af560333ef83087a2d211e5af82c052b48a8fbb131f5f8850a
Threat Level: Known bad
The file build.jar was found to be: Known bad.
Malicious Activity Summary
Class file contains resources related to AdWind
Adwind family
Adds Run key to start application
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-18 01:04
Signatures
Adwind family
Class file contains resources related to AdWind
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-18 01:04
Reported
2024-11-18 01:08
Platform
win10v2004-20241007-en
Max time kernel
150s
Max time network
154s
Command Line
Signatures
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1731891968317.tmp" | C:\Windows\system32\reg.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 412 wrote to memory of 3068 | N/A | C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe | C:\Windows\SYSTEM32\cmd.exe |
| PID 412 wrote to memory of 3068 | N/A | C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe | C:\Windows\SYSTEM32\cmd.exe |
| PID 3068 wrote to memory of 1492 | N/A | C:\Windows\SYSTEM32\cmd.exe | C:\Windows\system32\reg.exe |
| PID 3068 wrote to memory of 1492 | N/A | C:\Windows\SYSTEM32\cmd.exe | C:\Windows\system32\reg.exe |
Processes
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
java -jar C:\Users\Admin\AppData\Local\Temp\build.jar
C:\Windows\SYSTEM32\cmd.exe
cmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1731891968317.tmp" /f"
C:\Windows\system32\reg.exe
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1731891968317.tmp" /f
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 83.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | who-gabriel.gl.at.ply.gg | udp |
| US | 8.8.8.8:53 | 17.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 147.185.221.23:45700 | who-gabriel.gl.at.ply.gg | tcp |
| US | 8.8.8.8:53 | 23.221.185.147.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.163.202.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.135.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 22.49.80.91.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 19.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | udp |
Files
memory/412-2-0x0000027ECAE00000-0x0000027ECB070000-memory.dmp
memory/412-14-0x0000027EC9630000-0x0000027EC9631000-memory.dmp
memory/412-16-0x0000027ECB070000-0x0000027ECB080000-memory.dmp
memory/412-19-0x0000027ECB080000-0x0000027ECB090000-memory.dmp
memory/412-24-0x0000027ECB0B0000-0x0000027ECB0C0000-memory.dmp
memory/412-22-0x0000027ECB0A0000-0x0000027ECB0B0000-memory.dmp
memory/412-21-0x0000027ECB090000-0x0000027ECB0A0000-memory.dmp
memory/412-26-0x0000027ECB0C0000-0x0000027ECB0D0000-memory.dmp
memory/412-28-0x0000027ECB0D0000-0x0000027ECB0E0000-memory.dmp
memory/412-30-0x0000027ECB0E0000-0x0000027ECB0F0000-memory.dmp
memory/412-33-0x0000027ECAE00000-0x0000027ECB070000-memory.dmp
memory/412-34-0x0000027ECB0F0000-0x0000027ECB100000-memory.dmp
memory/412-36-0x0000027ECB100000-0x0000027ECB110000-memory.dmp
memory/412-41-0x0000027EC9630000-0x0000027EC9631000-memory.dmp
memory/412-42-0x0000027ECB070000-0x0000027ECB080000-memory.dmp
memory/412-43-0x0000027ECB080000-0x0000027ECB090000-memory.dmp
memory/412-45-0x0000027ECB090000-0x0000027ECB0A0000-memory.dmp
memory/412-46-0x0000027ECB0A0000-0x0000027ECB0B0000-memory.dmp
memory/412-47-0x0000027ECB0B0000-0x0000027ECB0C0000-memory.dmp
memory/412-48-0x0000027ECB0C0000-0x0000027ECB0D0000-memory.dmp
memory/412-49-0x0000027ECB0D0000-0x0000027ECB0E0000-memory.dmp
memory/412-50-0x0000027ECB0E0000-0x0000027ECB0F0000-memory.dmp
memory/412-51-0x0000027ECB0F0000-0x0000027ECB100000-memory.dmp
memory/412-52-0x0000027ECB100000-0x0000027ECB110000-memory.dmp
memory/412-56-0x0000027ECB110000-0x0000027ECB120000-memory.dmp
memory/412-58-0x0000027ECB110000-0x0000027ECB120000-memory.dmp
memory/412-63-0x0000027ECB120000-0x0000027ECB130000-memory.dmp
memory/412-65-0x0000027ECB120000-0x0000027ECB130000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-18 01:04
Reported
2024-11-18 01:08
Platform
win7-20241023-en
Max time kernel
120s
Max time network
122s
Command Line
Signatures
Processes
C:\Windows\system32\java.exe
java -jar C:\Users\Admin\AppData\Local\Temp\build.jar
Network
Files
memory/2536-2-0x0000000002600000-0x0000000002870000-memory.dmp
memory/2536-11-0x0000000000340000-0x0000000000341000-memory.dmp
memory/2536-12-0x0000000002600000-0x0000000002870000-memory.dmp