Analysis
-
max time kernel
131s -
max time network
133s -
platform
windows11-21h2_x64 -
resource
win11-20250210-en -
resource tags
arch:x64arch:x86image:win11-20250210-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-02-2025 17:21
Behavioral task
behavioral1
Sample
dwwww.jar
Resource
win11-20250210-en
Errors
General
-
Target
dwwww.jar
-
Size
639KB
-
MD5
3e90c45cd2db89f2d40af9a7c7a6c72c
-
SHA1
f128f1df2bcb95d79f8326ced327ac2a9128166f
-
SHA256
6989326966a8f4640f1e6e8de587481608a6228f1bac90d29252448c3a4e2801
-
SHA512
6c4ad0986b96dc0a16818d6fe25ec61b99091ae9828edd43569b9639637ef53ac45ad29b211cc246718e57b72223e4ef69df40e58ca173ff6cc6ab9244292e6c
-
SSDEEP
12288:GvT9Qx/nHxczh4V9Y14/gS/nRr+hrQNqzSg+FmRJY3QuA2JUSOJDIEh:GvhQhRcl4rj/gSZ2eqzzI9QuNJnOJDIg
Malware Config
Signatures
-
Downloads MZ/PE file 1 IoCs
flow pid Process 11 5040 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-55049381-669259793-3707298529-1000\Software\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1739467305385.tmp" reg.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4600 MicrosoftEdgeUpdate.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "225" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2832 shutdown.exe Token: SeRemoteShutdownPrivilege 2832 shutdown.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3960 java.exe 3960 java.exe 3960 java.exe 3960 java.exe 1672 LogonUI.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3960 wrote to memory of 2064 3960 java.exe 84 PID 3960 wrote to memory of 2064 3960 java.exe 84 PID 2064 wrote to memory of 4616 2064 cmd.exe 86 PID 2064 wrote to memory of 4616 2064 cmd.exe 86 PID 3960 wrote to memory of 2832 3960 java.exe 91 PID 3960 wrote to memory of 2832 3960 java.exe 91
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\dwwww.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1739467305385.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1739467305385.tmp" /f3⤵
- Adds Run key to start application
PID:4616
-
-
-
C:\Windows\SYSTEM32\shutdown.exeshutdown /s /t 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7RSt4YkF6Nlk2c1UxMjg5YlM2cWw0VlJMYmtqZkJVR1RNSnNqckhyNDRpST0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIzLjAuNjMxMi4xMjMiIG5leHR2ZXJzaW9uPSIiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjMiIGluc3RhbGxkYXRldGltZT0iMTczOTE4NzUwMCIgb29iZV9pbnN0YWxsX3RpbWU9IjEzMzgzNjU5NjY5NTQwMDAwMCI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjIxNzk4NjIiIHN5c3RlbV91cHRpbWVfdGlja3M9IjUwMDI4NTM1NDgiLz48L2FwcD48L3JlcXVlc3Q-1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4600
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a23855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD530de1d87889faca7e45f7c63ef43b542
SHA156ee196c1de14797aae0ebd1cba3360de2520c88
SHA256e299db8531022956c7d8485ddfb98334fe2590df9c01cfaa3e71a5b614622bf6
SHA51207a672daf9613a2b95f4d986fc7b6ac080f58579dceb415c561f55ea39f746d0f092dfff65c284c8f8154aced01c02271d6402b88fcb0e9a47020b4e6614c5d4
-
Filesize
31KB
MD5edcc151eaa945800f4413a653e525d4a
SHA1c68ee93795e630be88463f95d5fab3ba852c920a
SHA256f270662c31bcd229efc428a8aac98ce403839e4c827472a10897dae70ecd7a94
SHA512f1633e0a2b6f168b39eae14ab10cd46361038379ca400364e8afc03cf7627d9d8641243cdb03350401bdb32c4dec8707e84d899ff5afe5eb5acebcca1c8ce8a4