Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27/12/2024, 14:32
Behavioral task
behavioral1
Sample
333.jar
Resource
win7-20240903-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
333.jar
Resource
win10v2004-20241007-en
3 signatures
150 seconds
General
-
Target
333.jar
-
Size
11.7MB
-
MD5
fd2217da47a9ca22ef38b61b1e523de3
-
SHA1
d71ce79a1e8560fbad38e4e9da803a92e4abb349
-
SHA256
8f7e47b012498c42c68c7f829d2e09ba74cf425311f4540263b34d3724b6002a
-
SHA512
ac40b69ef5545638db80da99e0393af9f25cd212481a315edf6016d4c733d3ec3e007560b553593e70452194c48466bdc604ca7bd7b845a336b4a537e7012994
-
SSDEEP
196608:HqDhMcdsRYgKpdMUnFFoT5+Nt2w1Vk4ApjCKjm/fbzJuxsYaUizoYbAYfCNDV:S6YPXDFolETkRrm7zMxXFCoH1NDV
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1735309963704.tmp" reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2840 java.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2840 wrote to memory of 368 2840 java.exe 84 PID 2840 wrote to memory of 368 2840 java.exe 84 PID 368 wrote to memory of 1780 368 cmd.exe 86 PID 368 wrote to memory of 1780 368 cmd.exe 86
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\333.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1735309963704.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1735309963704.tmp" /f3⤵
- Adds Run key to start application
PID:1780
-
-