Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 07:31
Behavioral task
behavioral1
Sample
robux.jar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
robux.jar
Resource
win10v2004-20241007-en
General
-
Target
robux.jar
-
Size
11.7MB
-
MD5
4ac4a7e055d8124aa3e86b0fbf7f4c96
-
SHA1
38094b0c571b491f4dedf181561d5e50e4d3ca30
-
SHA256
def26eff69c14a0d4e02b23e19956a0020290100c4c13a7dcec1f33a3b39ccbe
-
SHA512
014a4815759642b0e93ea980b4fe721cce343f4e4dbb99666740af7ac8d166ff7562d14567a8d13224a09d76ecf3147e18a031c163a13f87d2b04bd3c25ed846
-
SSDEEP
196608:74vLKMnNjMwJh4/SnSUpSsjiIhA9q7QQz5sG6ERvPb8K8Hd6NkvKiEoqrsmIg:S5MwJyNUIyN7tq2Rb8PHEaCE1mIg
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1732347128472.tmp" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 13 pastebin.com 14 pastebin.com -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2472 java.exe 2472 java.exe 2472 java.exe 2472 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2472 wrote to memory of 5092 2472 java.exe 83 PID 2472 wrote to memory of 5092 2472 java.exe 83 PID 2472 wrote to memory of 4144 2472 java.exe 85 PID 2472 wrote to memory of 4144 2472 java.exe 85 PID 4144 wrote to memory of 4836 4144 cmd.exe 87 PID 4144 wrote to memory of 4836 4144 cmd.exe 87 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 5092 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\robux.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1732347128472.tmp2⤵
- Views/modifies file attributes
PID:5092
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1732347128472.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1732347128472.tmp" /f3⤵
- Adds Run key to start application
PID:4836
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.7MB
MD54ac4a7e055d8124aa3e86b0fbf7f4c96
SHA138094b0c571b491f4dedf181561d5e50e4d3ca30
SHA256def26eff69c14a0d4e02b23e19956a0020290100c4c13a7dcec1f33a3b39ccbe
SHA512014a4815759642b0e93ea980b4fe721cce343f4e4dbb99666740af7ac8d166ff7562d14567a8d13224a09d76ecf3147e18a031c163a13f87d2b04bd3c25ed846