Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/03/2025, 12:47

General

  • Target

    SoulLoader2.1.1-fix.jar

  • Size

    2.5MB

  • MD5

    bc0b8f3baa70ce0ddd26603de8c0ce85

  • SHA1

    5d4d9fbb1415c3bcbf0fcbfed53baf748780f6f8

  • SHA256

    4bb33174d50928522e355c96d61b6508a436309c984fb839f6c7cf53c66403d9

  • SHA512

    5d036b4382a98eb99eecfcfa56b3eb879d91c7592bd2fae962e7ecf15cd22e7e34ed8452c98b7cff1def654df37635ab6058dbdc67ff64b8dcc5d2207b46f10c

  • SSDEEP

    49152:IDQrDuHYsHJgaub4h2c1n9wAW5QfAVz8ozBhGPLwjIQgqynlFllNps8Vuc:IsrlsH5E4h2c1TWVoIhkDQg5nlV

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\SoulLoader2.1.1-fix.jar
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1592
    • C:\Windows\SYSTEM32\attrib.exe
      attrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1740833240939.tmp
      2⤵
      • Views/modifies file attributes
      PID:4576
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1740833240939.tmp" /f"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4020
      • C:\Windows\system32\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1740833240939.tmp" /f
        3⤵
        • Adds Run key to start application
        PID:3412
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c "REG DELETE HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /f"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3460
      • C:\Windows\system32\reg.exe
        REG DELETE HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /f
        3⤵
          PID:664
      • C:\Windows\SYSTEM32\cmd.exe
        cmd /c ping localhost -n 6 > nul && del C:\Users\Admin\AppData\Local\Temp\SoulLoader2.1.1-fix.jar
        2⤵
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:1564
        • C:\Windows\system32\PING.EXE
          ping localhost -n 6
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:208

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1740833240939.tmp

      Filesize

      2.5MB

      MD5

      bc0b8f3baa70ce0ddd26603de8c0ce85

      SHA1

      5d4d9fbb1415c3bcbf0fcbfed53baf748780f6f8

      SHA256

      4bb33174d50928522e355c96d61b6508a436309c984fb839f6c7cf53c66403d9

      SHA512

      5d036b4382a98eb99eecfcfa56b3eb879d91c7592bd2fae962e7ecf15cd22e7e34ed8452c98b7cff1def654df37635ab6058dbdc67ff64b8dcc5d2207b46f10c

    • memory/1592-45-0x000002365EE30000-0x000002365EE31000-memory.dmp

      Filesize

      4KB

    • memory/1592-46-0x000002365F0C0000-0x000002365F0D0000-memory.dmp

      Filesize

      64KB

    • memory/1592-21-0x000002365F0E0000-0x000002365F0F0000-memory.dmp

      Filesize

      64KB

    • memory/1592-24-0x000002365F100000-0x000002365F110000-memory.dmp

      Filesize

      64KB

    • memory/1592-20-0x000002365F0D0000-0x000002365F0E0000-memory.dmp

      Filesize

      64KB

    • memory/1592-19-0x000002365F0C0000-0x000002365F0D0000-memory.dmp

      Filesize

      64KB

    • memory/1592-28-0x000002365F120000-0x000002365F130000-memory.dmp

      Filesize

      64KB

    • memory/1592-27-0x000002365F110000-0x000002365F120000-memory.dmp

      Filesize

      64KB

    • memory/1592-30-0x000002365F130000-0x000002365F140000-memory.dmp

      Filesize

      64KB

    • memory/1592-32-0x000002365F140000-0x000002365F150000-memory.dmp

      Filesize

      64KB

    • memory/1592-14-0x000002365EE30000-0x000002365EE31000-memory.dmp

      Filesize

      4KB

    • memory/1592-38-0x000002365F150000-0x000002365F160000-memory.dmp

      Filesize

      64KB

    • memory/1592-37-0x000002365EE50000-0x000002365F0C0000-memory.dmp

      Filesize

      2.4MB

    • memory/1592-42-0x000002365EE30000-0x000002365EE31000-memory.dmp

      Filesize

      4KB

    • memory/1592-22-0x000002365F0F0000-0x000002365F100000-memory.dmp

      Filesize

      64KB

    • memory/1592-44-0x000002365F160000-0x000002365F170000-memory.dmp

      Filesize

      64KB

    • memory/1592-48-0x000002365F0E0000-0x000002365F0F0000-memory.dmp

      Filesize

      64KB

    • memory/1592-47-0x000002365F0D0000-0x000002365F0E0000-memory.dmp

      Filesize

      64KB

    • memory/1592-2-0x000002365EE50000-0x000002365F0C0000-memory.dmp

      Filesize

      2.4MB

    • memory/1592-50-0x000002365F0F0000-0x000002365F100000-memory.dmp

      Filesize

      64KB

    • memory/1592-51-0x000002365F100000-0x000002365F110000-memory.dmp

      Filesize

      64KB

    • memory/1592-53-0x000002365F120000-0x000002365F130000-memory.dmp

      Filesize

      64KB

    • memory/1592-52-0x000002365F110000-0x000002365F120000-memory.dmp

      Filesize

      64KB

    • memory/1592-54-0x000002365F130000-0x000002365F140000-memory.dmp

      Filesize

      64KB

    • memory/1592-55-0x000002365F140000-0x000002365F150000-memory.dmp

      Filesize

      64KB

    • memory/1592-56-0x000002365F150000-0x000002365F160000-memory.dmp

      Filesize

      64KB

    • memory/1592-57-0x000002365F160000-0x000002365F170000-memory.dmp

      Filesize

      64KB

    • memory/1592-62-0x000002365EE30000-0x000002365EE31000-memory.dmp

      Filesize

      4KB

    • memory/1592-63-0x000002365EE50000-0x000002365F0C0000-memory.dmp

      Filesize

      2.4MB

    • memory/1592-65-0x000002365F160000-0x000002365F170000-memory.dmp

      Filesize

      64KB

    • memory/1592-64-0x000002365F150000-0x000002365F160000-memory.dmp

      Filesize

      64KB