Analysis
-
max time kernel
147s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 07:55
Behavioral task
behavioral1
Sample
robux generator.jar
Resource
win7-20240729-en
windows7-x64
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
robux generator.jar
Resource
win10v2004-20241007-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
robux generator.jar
-
Size
639KB
-
MD5
e3b40be1545bf794b985d480dea75ea9
-
SHA1
eb756ca1f0884bf930875745e48cacda143dce3c
-
SHA256
e1357b820ed4d8ea00357611271a215e90a43873717f55e49390c8a08502193d
-
SHA512
57f3837eb0299cca3c7ec516edfd881fd8f9f42b876290e6ac9e6c2435ebcfd4164e308ca5d5ed2643b26c16f5c7d89846abc0b4264458415bd73872bd7c6592
-
SSDEEP
12288:ufb1Q5/PvZ0r54d9I94vgq//RT+xDQNSjageFORpI34u42hcS2xDQB:ufxQ5Z0V4LLvgqBOGSjbgV4u1hf2xDQB
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1732348525349.tmp" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
java.exepid Process 4016 java.exe 4016 java.exe 4016 java.exe 4016 java.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
java.execmd.exedescription pid Process procid_target PID 4016 wrote to memory of 2008 4016 java.exe 84 PID 4016 wrote to memory of 2008 4016 java.exe 84 PID 2008 wrote to memory of 3812 2008 cmd.exe 86 PID 2008 wrote to memory of 3812 2008 cmd.exe 86
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\robux generator.jar"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1732348525349.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1732348525349.tmp" /f3⤵
- Adds Run key to start application
PID:3812
-
-