Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-12-2024 21:08

General

  • Target

    AzureSpooferHWID.jar

  • Size

    639KB

  • MD5

    ea029a25bb7bff5f342f58106321f461

  • SHA1

    8a6c20abcc40a57f83c4554284023438ffc89596

  • SHA256

    dbb87b3e7913ccf3c7552c9944aaa3805bfa6e34b6dd92688e74d2a3c7545201

  • SHA512

    838a872b933de658711b5c513c0256c1064ff9e4584f7c67d21723b277e2b1e3693256c1b5bc805d28427634461b0801982ca6c109d236eb7c48fed68b1afac9

  • SSDEEP

    12288:4X/TQv/Jd7+Nl4F7AfW3gO/jRT+dhcNmvYg+NuRz63Qus2NkSUxDMn:4XbQ3T+L41v3gONqomvlQ1QuRN3UxDMn

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\AzureSpooferHWID.jar
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4636
    • C:\Windows\SYSTEM32\attrib.exe
      attrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1734728949706.tmp
      2⤵
      • Views/modifies file attributes
      PID:2452
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1734728949706.tmp" /f"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4344
      • C:\Windows\system32\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1734728949706.tmp" /f
        3⤵
        • Adds Run key to start application
        PID:3792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1734728949706.tmp

    Filesize

    639KB

    MD5

    ea029a25bb7bff5f342f58106321f461

    SHA1

    8a6c20abcc40a57f83c4554284023438ffc89596

    SHA256

    dbb87b3e7913ccf3c7552c9944aaa3805bfa6e34b6dd92688e74d2a3c7545201

    SHA512

    838a872b933de658711b5c513c0256c1064ff9e4584f7c67d21723b277e2b1e3693256c1b5bc805d28427634461b0801982ca6c109d236eb7c48fed68b1afac9

  • memory/4636-48-0x00000193002D0000-0x00000193002E0000-memory.dmp

    Filesize

    64KB

  • memory/4636-29-0x00000193002D0000-0x00000193002E0000-memory.dmp

    Filesize

    64KB

  • memory/4636-20-0x0000019300290000-0x00000193002A0000-memory.dmp

    Filesize

    64KB

  • memory/4636-49-0x00000193002E0000-0x00000193002F0000-memory.dmp

    Filesize

    64KB

  • memory/4636-21-0x00000193002A0000-0x00000193002B0000-memory.dmp

    Filesize

    64KB

  • memory/4636-53-0x0000019372220000-0x0000019372221000-memory.dmp

    Filesize

    4KB

  • memory/4636-26-0x00000193002C0000-0x00000193002D0000-memory.dmp

    Filesize

    64KB

  • memory/4636-50-0x00000193002F0000-0x0000019300300000-memory.dmp

    Filesize

    64KB

  • memory/4636-15-0x0000019300270000-0x0000019300280000-memory.dmp

    Filesize

    64KB

  • memory/4636-32-0x00000193002E0000-0x00000193002F0000-memory.dmp

    Filesize

    64KB

  • memory/4636-38-0x0000019372220000-0x0000019372221000-memory.dmp

    Filesize

    4KB

  • memory/4636-39-0x0000019300000000-0x0000019300270000-memory.dmp

    Filesize

    2.4MB

  • memory/4636-40-0x0000019300270000-0x0000019300280000-memory.dmp

    Filesize

    64KB

  • memory/4636-42-0x0000019300280000-0x0000019300290000-memory.dmp

    Filesize

    64KB

  • memory/4636-43-0x0000019300290000-0x00000193002A0000-memory.dmp

    Filesize

    64KB

  • memory/4636-44-0x00000193002A0000-0x00000193002B0000-memory.dmp

    Filesize

    64KB

  • memory/4636-45-0x00000193002F0000-0x0000019300300000-memory.dmp

    Filesize

    64KB

  • memory/4636-46-0x00000193002B0000-0x00000193002C0000-memory.dmp

    Filesize

    64KB

  • memory/4636-47-0x00000193002C0000-0x00000193002D0000-memory.dmp

    Filesize

    64KB

  • memory/4636-2-0x0000019300000000-0x0000019300270000-memory.dmp

    Filesize

    2.4MB

  • memory/4636-22-0x0000019372220000-0x0000019372221000-memory.dmp

    Filesize

    4KB

  • memory/4636-17-0x0000019300280000-0x0000019300290000-memory.dmp

    Filesize

    64KB

  • memory/4636-24-0x00000193002B0000-0x00000193002C0000-memory.dmp

    Filesize

    64KB

  • memory/4636-55-0x0000019300300000-0x0000019300310000-memory.dmp

    Filesize

    64KB

  • memory/4636-56-0x0000019372220000-0x0000019372221000-memory.dmp

    Filesize

    4KB

  • memory/4636-57-0x0000019300300000-0x0000019300310000-memory.dmp

    Filesize

    64KB

  • memory/4636-60-0x0000019300310000-0x0000019300320000-memory.dmp

    Filesize

    64KB

  • memory/4636-62-0x0000019300310000-0x0000019300320000-memory.dmp

    Filesize

    64KB

  • memory/4636-65-0x0000019300320000-0x0000019300330000-memory.dmp

    Filesize

    64KB

  • memory/4636-67-0x0000019300330000-0x0000019300340000-memory.dmp

    Filesize

    64KB

  • memory/4636-70-0x0000019300340000-0x0000019300350000-memory.dmp

    Filesize

    64KB

  • memory/4636-72-0x0000019300320000-0x0000019300330000-memory.dmp

    Filesize

    64KB

  • memory/4636-73-0x0000019300350000-0x0000019300360000-memory.dmp

    Filesize

    64KB

  • memory/4636-74-0x0000019372220000-0x0000019372221000-memory.dmp

    Filesize

    4KB

  • memory/4636-76-0x0000019300360000-0x0000019300370000-memory.dmp

    Filesize

    64KB

  • memory/4636-80-0x0000019300370000-0x0000019300380000-memory.dmp

    Filesize

    64KB

  • memory/4636-90-0x0000019300330000-0x0000019300340000-memory.dmp

    Filesize

    64KB

  • memory/4636-92-0x0000019300340000-0x0000019300350000-memory.dmp

    Filesize

    64KB

  • memory/4636-93-0x0000019300350000-0x0000019300360000-memory.dmp

    Filesize

    64KB

  • memory/4636-96-0x0000019300360000-0x0000019300370000-memory.dmp

    Filesize

    64KB

  • memory/4636-97-0x0000019300370000-0x0000019300380000-memory.dmp

    Filesize

    64KB