Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 00:09
Behavioral task
behavioral1
Sample
testingprank.jar
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
testingprank.jar
Resource
win10v2004-20250217-en
General
-
Target
testingprank.jar
-
Size
1.2MB
-
MD5
8fc2a2aef6de485dfe67368540b044f6
-
SHA1
834f7ccd64b2706207c54c791cee8fbd4efa58a9
-
SHA256
7782cbdf77627890ad47465420b60609ac766314200db8aed313743c50264233
-
SHA512
bfff8ae72a2293be3d4eb2a3172d7e18d477342e5a4f397f0ffa93c9c416974cc16d0af924f9ea8a1766a7a4827680a082653748b59397043b342efc22d70b6e
-
SSDEEP
24576:bXeQWSpM4sX/ggfe/GvV418utZXopD4B+hS2MXt3VBk7QAUy1xwj8kSXVXu7:LeQWSpM5oA94WufoW2O1AUgx/kSm
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1740874168818.tmp" reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3744 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3744 wrote to memory of 1676 3744 java.exe 89 PID 3744 wrote to memory of 1676 3744 java.exe 89 PID 3744 wrote to memory of 1972 3744 java.exe 91 PID 3744 wrote to memory of 1972 3744 java.exe 91 PID 1972 wrote to memory of 4636 1972 cmd.exe 93 PID 1972 wrote to memory of 4636 1972 cmd.exe 93 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1676 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\testingprank.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1740874168818.tmp2⤵
- Views/modifies file attributes
PID:1676
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1740874168818.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1740874168818.tmp" /f3⤵
- Adds Run key to start application
PID:4636
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD58fc2a2aef6de485dfe67368540b044f6
SHA1834f7ccd64b2706207c54c791cee8fbd4efa58a9
SHA2567782cbdf77627890ad47465420b60609ac766314200db8aed313743c50264233
SHA512bfff8ae72a2293be3d4eb2a3172d7e18d477342e5a4f397f0ffa93c9c416974cc16d0af924f9ea8a1766a7a4827680a082653748b59397043b342efc22d70b6e