Analysis
-
max time kernel
254s -
max time network
210s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
21-12-2024 15:19
Static task
static1
Behavioral task
behavioral1
Sample
randar-master-1.0-standalone.jar
Resource
win10ltsc2021-20241211-en
General
-
Target
randar-master-1.0-standalone.jar
-
Size
19.5MB
-
MD5
dd5914f7e4afc8a352b212b984f94584
-
SHA1
028043b7954256aaa25dd88b34f28da2e5083df5
-
SHA256
261ff2e4a698729c1bbce7b42c378a13fb2a330908f372c19dd994e40a90a138
-
SHA512
df1f5ead475779a1489f00e11638a97192c4bd1a8f5102a572e2a187a91d0b2cd0679fd2a245804ce0e63010c22fadf72f0be62be74598427b0fb717012bf3a1
-
SSDEEP
393216:l0e1bYEXDQgvQ6s3FcMbeqpkZzfcK86N+nNq:2o8wcYJs3FcMbeqyZzfcT68ng
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4220 powershell.exe 4220 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4220 powershell.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4220 wrote to memory of 3100 4220 powershell.exe 107 PID 4220 wrote to memory of 3100 4220 powershell.exe 107 PID 4220 wrote to memory of 2508 4220 powershell.exe 108 PID 4220 wrote to memory of 2508 4220 powershell.exe 108 PID 4220 wrote to memory of 3668 4220 powershell.exe 109 PID 4220 wrote to memory of 3668 4220 powershell.exe 109 PID 4220 wrote to memory of 1668 4220 powershell.exe 110 PID 4220 wrote to memory of 1668 4220 powershell.exe 110 PID 4220 wrote to memory of 1852 4220 powershell.exe 111 PID 4220 wrote to memory of 1852 4220 powershell.exe 111
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\randar-master-1.0-standalone.jar1⤵PID:2112
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4100
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe"C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe"2⤵PID:3100
-
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe"C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe" .\randar-master-1.0-standalone.jar2⤵PID:2508
-
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe"C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe" -jar .\randar-master-1.0-standalone.jar2⤵PID:3668
-
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe"C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe" --version2⤵PID:1668
-
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe"C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe" -version2⤵PID:1852
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82