Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27/12/2024, 14:29
Behavioral task
behavioral1
Sample
321312.jar
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
321312.jar
Resource
win10v2004-20241007-en
General
-
Target
321312.jar
-
Size
5.5MB
-
MD5
565b98a633b78c64e6b88b8025fb70bf
-
SHA1
d4a45d28dd6f2a63139fdafb468ac50a71eca08b
-
SHA256
20d636bb1117d15081d84f4fa154b7e2763142eb16e23b20fc94c31fe1f5c9f9
-
SHA512
246c59f6479805dd53a16fb4ed98f98ddde2ed06343bc6b612eb72ff94648be8ad75d3b97bcd199bd49e50835f61897effa148a826d840705200fa5e175c8890
-
SSDEEP
98304:l5UnU2WgbhtIa9tRYZPGNr7BWXHgVeILUzF60LQavxDL+U3VHO0gA:XUnjWgX1YFG1QXanUk0/DL+U3VHfgA
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1735309757383.tmp" reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3016 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3016 wrote to memory of 3340 3016 java.exe 84 PID 3016 wrote to memory of 3340 3016 java.exe 84 PID 3016 wrote to memory of 2676 3016 java.exe 86 PID 3016 wrote to memory of 2676 3016 java.exe 86 PID 2676 wrote to memory of 3428 2676 cmd.exe 88 PID 2676 wrote to memory of 3428 2676 cmd.exe 88 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3340 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\321312.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1735309757383.tmp2⤵
- Views/modifies file attributes
PID:3340
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1735309757383.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1735309757383.tmp" /f3⤵
- Adds Run key to start application
PID:3428
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD5565b98a633b78c64e6b88b8025fb70bf
SHA1d4a45d28dd6f2a63139fdafb468ac50a71eca08b
SHA25620d636bb1117d15081d84f4fa154b7e2763142eb16e23b20fc94c31fe1f5c9f9
SHA512246c59f6479805dd53a16fb4ed98f98ddde2ed06343bc6b612eb72ff94648be8ad75d3b97bcd199bd49e50835f61897effa148a826d840705200fa5e175c8890