Analysis

  • max time kernel
    126s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/03/2025, 23:16

General

  • Target

    main.jar

  • Size

    639KB

  • MD5

    9074ab4b94d39d3f3226fcbfd73f3688

  • SHA1

    16a9405665108bc33f687d99fcbec619b891aa72

  • SHA256

    5368591e13775ea45d841fc87584b30187f83230f712c99b4726c31b5f218942

  • SHA512

    34912a8c5a1d2064dd4f73cd4a600317964dc34680232b4d99793b8d36b49780bf2c4a137421a490f511e6d6f2a9d1d2e110e8ff5d0fc461f507713e043d6f89

  • SSDEEP

    12288:snbTQX/JN/6JJ4Vvo3ODga/PRz+NJUNmz8gKZ6Rbi3kuQ2VMSctDYi:sn3Qvv6r4pPDgaxKImzBQJku9VPctDYi

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\main.jar
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2884
    • C:\Windows\SYSTEM32\attrib.exe
      attrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1740870983931.tmp
      2⤵
      • Views/modifies file attributes
      PID:2064
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1740870983931.tmp" /f"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1012
      • C:\Windows\system32\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1740870983931.tmp" /f
        3⤵
        • Adds Run key to start application
        PID:3708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1740870983931.tmp

    Filesize

    639KB

    MD5

    9074ab4b94d39d3f3226fcbfd73f3688

    SHA1

    16a9405665108bc33f687d99fcbec619b891aa72

    SHA256

    5368591e13775ea45d841fc87584b30187f83230f712c99b4726c31b5f218942

    SHA512

    34912a8c5a1d2064dd4f73cd4a600317964dc34680232b4d99793b8d36b49780bf2c4a137421a490f511e6d6f2a9d1d2e110e8ff5d0fc461f507713e043d6f89

  • memory/2884-46-0x0000028080290000-0x00000280802A0000-memory.dmp

    Filesize

    64KB

  • memory/2884-47-0x00000280802A0000-0x00000280802B0000-memory.dmp

    Filesize

    64KB

  • memory/2884-17-0x0000028080270000-0x0000028080280000-memory.dmp

    Filesize

    64KB

  • memory/2884-24-0x00000280802B0000-0x00000280802C0000-memory.dmp

    Filesize

    64KB

  • memory/2884-26-0x00000280802C0000-0x00000280802D0000-memory.dmp

    Filesize

    64KB

  • memory/2884-49-0x00000280802C0000-0x00000280802D0000-memory.dmp

    Filesize

    64KB

  • memory/2884-22-0x0000028080290000-0x00000280802A0000-memory.dmp

    Filesize

    64KB

  • memory/2884-28-0x00000280802D0000-0x00000280802E0000-memory.dmp

    Filesize

    64KB

  • memory/2884-30-0x00000280802E0000-0x00000280802F0000-memory.dmp

    Filesize

    64KB

  • memory/2884-14-0x00000280F5E40000-0x00000280F5E41000-memory.dmp

    Filesize

    4KB

  • memory/2884-34-0x00000280802F0000-0x0000028080300000-memory.dmp

    Filesize

    64KB

  • memory/2884-38-0x0000028080000000-0x0000028080270000-memory.dmp

    Filesize

    2.4MB

  • memory/2884-39-0x0000028080300000-0x0000028080310000-memory.dmp

    Filesize

    64KB

  • memory/2884-42-0x00000280F5E40000-0x00000280F5E41000-memory.dmp

    Filesize

    4KB

  • memory/2884-44-0x0000028080280000-0x0000028080290000-memory.dmp

    Filesize

    64KB

  • memory/2884-43-0x0000028080270000-0x0000028080280000-memory.dmp

    Filesize

    64KB

  • memory/2884-45-0x00000280F5E40000-0x00000280F5E41000-memory.dmp

    Filesize

    4KB

  • memory/2884-2-0x0000028080000000-0x0000028080270000-memory.dmp

    Filesize

    2.4MB

  • memory/2884-18-0x0000028080280000-0x0000028080290000-memory.dmp

    Filesize

    64KB

  • memory/2884-48-0x00000280802B0000-0x00000280802C0000-memory.dmp

    Filesize

    64KB

  • memory/2884-23-0x00000280802A0000-0x00000280802B0000-memory.dmp

    Filesize

    64KB

  • memory/2884-50-0x00000280802D0000-0x00000280802E0000-memory.dmp

    Filesize

    64KB

  • memory/2884-53-0x00000280F5E40000-0x00000280F5E41000-memory.dmp

    Filesize

    4KB

  • memory/2884-55-0x00000280F5E40000-0x00000280F5E41000-memory.dmp

    Filesize

    4KB

  • memory/2884-56-0x00000280802E0000-0x00000280802F0000-memory.dmp

    Filesize

    64KB

  • memory/2884-57-0x0000028080310000-0x0000028080320000-memory.dmp

    Filesize

    64KB

  • memory/2884-58-0x00000280F5E40000-0x00000280F5E41000-memory.dmp

    Filesize

    4KB

  • memory/2884-59-0x00000280802F0000-0x0000028080300000-memory.dmp

    Filesize

    64KB

  • memory/2884-63-0x0000028080320000-0x0000028080330000-memory.dmp

    Filesize

    64KB

  • memory/2884-62-0x0000028080300000-0x0000028080310000-memory.dmp

    Filesize

    64KB

  • memory/2884-64-0x0000028080000000-0x0000028080270000-memory.dmp

    Filesize

    2.4MB

  • memory/2884-70-0x0000028080320000-0x0000028080330000-memory.dmp

    Filesize

    64KB

  • memory/2884-69-0x0000028080310000-0x0000028080320000-memory.dmp

    Filesize

    64KB

  • memory/2884-68-0x0000028080300000-0x0000028080310000-memory.dmp

    Filesize

    64KB

  • memory/2884-67-0x00000280802F0000-0x0000028080300000-memory.dmp

    Filesize

    64KB

  • memory/2884-66-0x00000280802E0000-0x00000280802F0000-memory.dmp

    Filesize

    64KB

  • memory/2884-65-0x00000280802D0000-0x00000280802E0000-memory.dmp

    Filesize

    64KB