Analysis

  • max time kernel
    12s
  • max time network
    12s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-12-2024 17:33

General

  • Target

    detectme.jar

  • Size

    639KB

  • MD5

    a99a202ee3273d799c10ade5da4e3d7d

  • SHA1

    df1c1a64564b478f8c8974ad2d888bfcbaf61dce

  • SHA256

    000f5973a255104e1586fa0f941b8b756d0b2b1959f268a1b51bc4d2bff95439

  • SHA512

    30e8d6f73cbea5854094130a58fe21d73ad0a11f6408892ec38602a69faa9741ebe02977abc9a7a4b4c19970c929bb398feeb741aa2c8c46528170304ba2a5b7

  • SSDEEP

    12288:yHXNQx/nHlYn94VRIdADgO/TRb+BzYNavegixaRhQ38uE2JMS2FD8F:yH9QhFY94HTDgOd2+avnYx8uZJP2FD8F

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\detectme.jar
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Windows\SYSTEM32\attrib.exe
      attrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1733160829614.tmp
      2⤵
      • Views/modifies file attributes
      PID:1972
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1733160829614.tmp" /f"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4084
      • C:\Windows\system32\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1733160829614.tmp" /f
        3⤵
        • Adds Run key to start application
        PID:3368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1733160829614.tmp

    Filesize

    639KB

    MD5

    a99a202ee3273d799c10ade5da4e3d7d

    SHA1

    df1c1a64564b478f8c8974ad2d888bfcbaf61dce

    SHA256

    000f5973a255104e1586fa0f941b8b756d0b2b1959f268a1b51bc4d2bff95439

    SHA512

    30e8d6f73cbea5854094130a58fe21d73ad0a11f6408892ec38602a69faa9741ebe02977abc9a7a4b4c19970c929bb398feeb741aa2c8c46528170304ba2a5b7

  • memory/2108-56-0x000001EE2B630000-0x000001EE2B640000-memory.dmp

    Filesize

    64KB

  • memory/2108-20-0x000001EE2B580000-0x000001EE2B590000-memory.dmp

    Filesize

    64KB

  • memory/2108-21-0x000001EE2B590000-0x000001EE2B5A0000-memory.dmp

    Filesize

    64KB

  • memory/2108-2-0x000001EE2B2F0000-0x000001EE2B560000-memory.dmp

    Filesize

    2.4MB

  • memory/2108-23-0x000001EE2B5A0000-0x000001EE2B5B0000-memory.dmp

    Filesize

    64KB

  • memory/2108-25-0x000001EE2B5B0000-0x000001EE2B5C0000-memory.dmp

    Filesize

    64KB

  • memory/2108-28-0x000001EE2B5C0000-0x000001EE2B5D0000-memory.dmp

    Filesize

    64KB

  • memory/2108-27-0x000001EE2B2D0000-0x000001EE2B2D1000-memory.dmp

    Filesize

    4KB

  • memory/2108-30-0x000001EE2B5D0000-0x000001EE2B5E0000-memory.dmp

    Filesize

    64KB

  • memory/2108-17-0x000001EE2B570000-0x000001EE2B580000-memory.dmp

    Filesize

    64KB

  • memory/2108-51-0x000001EE2B590000-0x000001EE2B5A0000-memory.dmp

    Filesize

    64KB

  • memory/2108-40-0x000001EE2B5F0000-0x000001EE2B600000-memory.dmp

    Filesize

    64KB

  • memory/2108-58-0x000001EE2B5A0000-0x000001EE2B5B0000-memory.dmp

    Filesize

    64KB

  • memory/2108-43-0x000001EE2B570000-0x000001EE2B580000-memory.dmp

    Filesize

    64KB

  • memory/2108-44-0x000001EE2B600000-0x000001EE2B610000-memory.dmp

    Filesize

    64KB

  • memory/2108-42-0x000001EE2B560000-0x000001EE2B570000-memory.dmp

    Filesize

    64KB

  • memory/2108-45-0x000001EE2B2D0000-0x000001EE2B2D1000-memory.dmp

    Filesize

    4KB

  • memory/2108-47-0x000001EE2B610000-0x000001EE2B620000-memory.dmp

    Filesize

    64KB

  • memory/2108-50-0x000001EE2B580000-0x000001EE2B590000-memory.dmp

    Filesize

    64KB

  • memory/2108-52-0x000001EE2B620000-0x000001EE2B630000-memory.dmp

    Filesize

    64KB

  • memory/2108-35-0x000001EE2B5E0000-0x000001EE2B5F0000-memory.dmp

    Filesize

    64KB

  • memory/2108-16-0x000001EE2B560000-0x000001EE2B570000-memory.dmp

    Filesize

    64KB

  • memory/2108-39-0x000001EE2B2F0000-0x000001EE2B560000-memory.dmp

    Filesize

    2.4MB

  • memory/2108-59-0x000001EE2B640000-0x000001EE2B650000-memory.dmp

    Filesize

    64KB

  • memory/2108-61-0x000001EE2B5B0000-0x000001EE2B5C0000-memory.dmp

    Filesize

    64KB

  • memory/2108-62-0x000001EE2B650000-0x000001EE2B660000-memory.dmp

    Filesize

    64KB

  • memory/2108-63-0x000001EE2B2D0000-0x000001EE2B2D1000-memory.dmp

    Filesize

    4KB

  • memory/2108-66-0x000001EE2B660000-0x000001EE2B670000-memory.dmp

    Filesize

    64KB

  • memory/2108-65-0x000001EE2B5C0000-0x000001EE2B5D0000-memory.dmp

    Filesize

    64KB

  • memory/2108-70-0x000001EE2B670000-0x000001EE2B680000-memory.dmp

    Filesize

    64KB

  • memory/2108-69-0x000001EE2B5D0000-0x000001EE2B5E0000-memory.dmp

    Filesize

    64KB

  • memory/2108-74-0x000001EE2B5E0000-0x000001EE2B5F0000-memory.dmp

    Filesize

    64KB

  • memory/2108-75-0x000001EE2B5F0000-0x000001EE2B600000-memory.dmp

    Filesize

    64KB

  • memory/2108-76-0x000001EE2B600000-0x000001EE2B610000-memory.dmp

    Filesize

    64KB

  • memory/2108-77-0x000001EE2B610000-0x000001EE2B620000-memory.dmp

    Filesize

    64KB

  • memory/2108-78-0x000001EE2B620000-0x000001EE2B630000-memory.dmp

    Filesize

    64KB

  • memory/2108-79-0x000001EE2B630000-0x000001EE2B640000-memory.dmp

    Filesize

    64KB

  • memory/2108-86-0x000001EE2B670000-0x000001EE2B680000-memory.dmp

    Filesize

    64KB

  • memory/2108-85-0x000001EE2B660000-0x000001EE2B670000-memory.dmp

    Filesize

    64KB

  • memory/2108-84-0x000001EE2B650000-0x000001EE2B660000-memory.dmp

    Filesize

    64KB

  • memory/2108-83-0x000001EE2B640000-0x000001EE2B650000-memory.dmp

    Filesize

    64KB

  • memory/2108-82-0x000001EE2B570000-0x000001EE2B580000-memory.dmp

    Filesize

    64KB

  • memory/2108-80-0x000001EE2B2F0000-0x000001EE2B560000-memory.dmp

    Filesize

    2.4MB

  • memory/2108-81-0x000001EE2B560000-0x000001EE2B570000-memory.dmp

    Filesize

    64KB