Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 00:07
Behavioral task
behavioral1
Sample
testagainomg.jar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
testagainomg.jar
Resource
win10v2004-20250217-en
General
-
Target
testagainomg.jar
-
Size
1.3MB
-
MD5
43615429f9823fbc89845e36a0edfc59
-
SHA1
59e33d3c4bdec878f08077b801afc041a2904b2a
-
SHA256
2835118956d703e6be6ddd25e45532dfba906dcd2c9d9765f6bb71d3fc62fee2
-
SHA512
e3a857e50837ced537dabd2466f434011ee41d34c7077045ab6c563df5a3175c6bb037cf6d37124dfc3e0a3a43b6ac87b7edabd3b9734f2ceedffe4ac830cb20
-
SSDEEP
24576:ZXEQAgHO4iL3gw/a9i5e+j2utxPv/DU4iokhJRAlXDHzRl9RWqL8GfvDcAY:hEQAgHOjsyY+Su/v/kgnRlXWzGflY
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1740874073015.tmp" reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3680 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3680 wrote to memory of 228 3680 java.exe 89 PID 3680 wrote to memory of 228 3680 java.exe 89 PID 3680 wrote to memory of 4980 3680 java.exe 91 PID 3680 wrote to memory of 4980 3680 java.exe 91 PID 4980 wrote to memory of 3768 4980 cmd.exe 93 PID 4980 wrote to memory of 3768 4980 cmd.exe 93 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 228 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\testagainomg.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1740874073015.tmp2⤵
- Views/modifies file attributes
PID:228
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1740874073015.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1740874073015.tmp" /f3⤵
- Adds Run key to start application
PID:3768
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD543615429f9823fbc89845e36a0edfc59
SHA159e33d3c4bdec878f08077b801afc041a2904b2a
SHA2562835118956d703e6be6ddd25e45532dfba906dcd2c9d9765f6bb71d3fc62fee2
SHA512e3a857e50837ced537dabd2466f434011ee41d34c7077045ab6c563df5a3175c6bb037cf6d37124dfc3e0a3a43b6ac87b7edabd3b9734f2ceedffe4ac830cb20