Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2025, 23:54
Behavioral task
behavioral1
Sample
testingprank.jar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
testingprank.jar
Resource
win10v2004-20250217-en
General
-
Target
testingprank.jar
-
Size
1.2MB
-
MD5
8fc2a2aef6de485dfe67368540b044f6
-
SHA1
834f7ccd64b2706207c54c791cee8fbd4efa58a9
-
SHA256
7782cbdf77627890ad47465420b60609ac766314200db8aed313743c50264233
-
SHA512
bfff8ae72a2293be3d4eb2a3172d7e18d477342e5a4f397f0ffa93c9c416974cc16d0af924f9ea8a1766a7a4827680a082653748b59397043b342efc22d70b6e
-
SSDEEP
24576:bXeQWSpM4sX/ggfe/GvV418utZXopD4B+hS2MXt3VBk7QAUy1xwj8kSXVXu7:LeQWSpM5oA94WufoW2O1AUgx/kSm
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1740873274675.tmp" reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4008 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4008 wrote to memory of 4580 4008 java.exe 89 PID 4008 wrote to memory of 4580 4008 java.exe 89 PID 4008 wrote to memory of 3320 4008 java.exe 91 PID 4008 wrote to memory of 3320 4008 java.exe 91 PID 3320 wrote to memory of 4356 3320 cmd.exe 93 PID 3320 wrote to memory of 4356 3320 cmd.exe 93 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4580 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\testingprank.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1740873274675.tmp2⤵
- Views/modifies file attributes
PID:4580
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1740873274675.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1740873274675.tmp" /f3⤵
- Adds Run key to start application
PID:4356
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD58fc2a2aef6de485dfe67368540b044f6
SHA1834f7ccd64b2706207c54c791cee8fbd4efa58a9
SHA2567782cbdf77627890ad47465420b60609ac766314200db8aed313743c50264233
SHA512bfff8ae72a2293be3d4eb2a3172d7e18d477342e5a4f397f0ffa93c9c416974cc16d0af924f9ea8a1766a7a4827680a082653748b59397043b342efc22d70b6e