Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2025, 15:05
Behavioral task
behavioral1
Sample
Liberiumm.jar
Resource
win7-20240903-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
Liberiumm.jar
Resource
win10v2004-20241007-en
3 signatures
150 seconds
General
-
Target
Liberiumm.jar
-
Size
639KB
-
MD5
d60a8fbd8c28e615e60d5a014943e7f0
-
SHA1
d12e14a1d16d2c47b0ea1da552e80026cc6e1fe6
-
SHA256
e2434515d267e57d6e06d3bdcb2d49993665b0ab4956076b69f767f9456fa5ad
-
SHA512
75759922451008772794f72e5ab549c51edb731815034fe006b89b2d619e85664514d06880422e9e29d5dc9699a359d9c90b5478fe93886923f80ec037557131
-
SSDEEP
12288:R/5mQA/MWAjyX4DuEmBPgY/9Rj+pUeNK9hgQZ2R6r3eu82lMSjLDwk:R/IQMsjm4q3PgYnuBK9e6PeuBlPjLDwk
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1736089523400.tmp" reg.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3680 java.exe 3680 java.exe 3680 java.exe 3680 java.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3680 wrote to memory of 4872 3680 java.exe 83 PID 3680 wrote to memory of 4872 3680 java.exe 83 PID 4872 wrote to memory of 4608 4872 cmd.exe 85 PID 4872 wrote to memory of 4608 4872 cmd.exe 85
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\Liberiumm.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1736089523400.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1736089523400.tmp" /f3⤵
- Adds Run key to start application
PID:4608
-
-