Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 00:03
Behavioral task
behavioral1
Sample
testingprank.jar
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
testingprank.jar
Resource
win10v2004-20250217-en
General
-
Target
testingprank.jar
-
Size
1.2MB
-
MD5
8fc2a2aef6de485dfe67368540b044f6
-
SHA1
834f7ccd64b2706207c54c791cee8fbd4efa58a9
-
SHA256
7782cbdf77627890ad47465420b60609ac766314200db8aed313743c50264233
-
SHA512
bfff8ae72a2293be3d4eb2a3172d7e18d477342e5a4f397f0ffa93c9c416974cc16d0af924f9ea8a1766a7a4827680a082653748b59397043b342efc22d70b6e
-
SSDEEP
24576:bXeQWSpM4sX/ggfe/GvV418utZXopD4B+hS2MXt3VBk7QAUy1xwj8kSXVXu7:LeQWSpM5oA94WufoW2O1AUgx/kSm
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1740873792469.tmp" reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4916 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4916 wrote to memory of 4580 4916 java.exe 90 PID 4916 wrote to memory of 4580 4916 java.exe 90 PID 4916 wrote to memory of 3664 4916 java.exe 92 PID 4916 wrote to memory of 3664 4916 java.exe 92 PID 3664 wrote to memory of 4004 3664 cmd.exe 94 PID 3664 wrote to memory of 4004 3664 cmd.exe 94 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4580 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\testingprank.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1740873792469.tmp2⤵
- Views/modifies file attributes
PID:4580
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1740873792469.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1740873792469.tmp" /f3⤵
- Adds Run key to start application
PID:4004
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD58fc2a2aef6de485dfe67368540b044f6
SHA1834f7ccd64b2706207c54c791cee8fbd4efa58a9
SHA2567782cbdf77627890ad47465420b60609ac766314200db8aed313743c50264233
SHA512bfff8ae72a2293be3d4eb2a3172d7e18d477342e5a4f397f0ffa93c9c416974cc16d0af924f9ea8a1766a7a4827680a082653748b59397043b342efc22d70b6e