Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/03/2025, 00:17

General

  • Target

    testagain132313123213123213123123213.jar

  • Size

    639KB

  • MD5

    96852f89ca1f862e62eaa3206885c2d9

  • SHA1

    5f983369fb36cb9f342bf5ebeb3707e6ea572334

  • SHA256

    501a11b1922d5f9b698361f3d2a98ebc5917c5ff403d3a016f71bf8a6abeea56

  • SHA512

    f8770c39aebe7d4cdded7ddc862c3937e0f561e8f44e918d349e2fe551c545efc16d74fde6a3dffcab7465ee0028bd36d9dc7bb864f89d473f691b363fdfa701

  • SSDEEP

    12288:p7JGQs/8GMzqn4jyk6BfgY/9RT+Z4WNmh5gEtOR6L3KuQ2hASb3DIT:p7UQYgzS4ePfgYn+Bmh2KLKu9hbb3DIT

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\testagain132313123213123213123123213.jar
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:416
    • C:\Windows\SYSTEM32\attrib.exe
      attrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1740874668386.tmp
      2⤵
      • Views/modifies file attributes
      PID:212
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1740874668386.tmp" /f"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5092
      • C:\Windows\system32\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1740874668386.tmp" /f
        3⤵
        • Adds Run key to start application
        PID:4692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1740874668386.tmp

    Filesize

    639KB

    MD5

    96852f89ca1f862e62eaa3206885c2d9

    SHA1

    5f983369fb36cb9f342bf5ebeb3707e6ea572334

    SHA256

    501a11b1922d5f9b698361f3d2a98ebc5917c5ff403d3a016f71bf8a6abeea56

    SHA512

    f8770c39aebe7d4cdded7ddc862c3937e0f561e8f44e918d349e2fe551c545efc16d74fde6a3dffcab7465ee0028bd36d9dc7bb864f89d473f691b363fdfa701

  • memory/416-37-0x000001EC3AE00000-0x000001EC3AE01000-memory.dmp

    Filesize

    4KB

  • memory/416-48-0x000001EC3C930000-0x000001EC3C940000-memory.dmp

    Filesize

    64KB

  • memory/416-20-0x000001EC3C8D0000-0x000001EC3C8E0000-memory.dmp

    Filesize

    64KB

  • memory/416-21-0x000001EC3C8E0000-0x000001EC3C8F0000-memory.dmp

    Filesize

    64KB

  • memory/416-23-0x000001EC3C8F0000-0x000001EC3C900000-memory.dmp

    Filesize

    64KB

  • memory/416-25-0x000001EC3C900000-0x000001EC3C910000-memory.dmp

    Filesize

    64KB

  • memory/416-27-0x000001EC3C910000-0x000001EC3C920000-memory.dmp

    Filesize

    64KB

  • memory/416-15-0x000001EC3C8B0000-0x000001EC3C8C0000-memory.dmp

    Filesize

    64KB

  • memory/416-31-0x000001EC3AE00000-0x000001EC3AE01000-memory.dmp

    Filesize

    4KB

  • memory/416-32-0x000001EC3C920000-0x000001EC3C930000-memory.dmp

    Filesize

    64KB

  • memory/416-35-0x000001EC3C930000-0x000001EC3C940000-memory.dmp

    Filesize

    64KB

  • memory/416-2-0x000001EC3C640000-0x000001EC3C8B0000-memory.dmp

    Filesize

    2.4MB

  • memory/416-17-0x000001EC3C8C0000-0x000001EC3C8D0000-memory.dmp

    Filesize

    64KB

  • memory/416-40-0x000001EC3C8C0000-0x000001EC3C8D0000-memory.dmp

    Filesize

    64KB

  • memory/416-38-0x000001EC3C640000-0x000001EC3C8B0000-memory.dmp

    Filesize

    2.4MB

  • memory/416-42-0x000001EC3C8D0000-0x000001EC3C8E0000-memory.dmp

    Filesize

    64KB

  • memory/416-43-0x000001EC3C8E0000-0x000001EC3C8F0000-memory.dmp

    Filesize

    64KB

  • memory/416-44-0x000001EC3C8F0000-0x000001EC3C900000-memory.dmp

    Filesize

    64KB

  • memory/416-45-0x000001EC3C900000-0x000001EC3C910000-memory.dmp

    Filesize

    64KB

  • memory/416-46-0x000001EC3C910000-0x000001EC3C920000-memory.dmp

    Filesize

    64KB

  • memory/416-47-0x000001EC3C920000-0x000001EC3C930000-memory.dmp

    Filesize

    64KB

  • memory/416-39-0x000001EC3C8B0000-0x000001EC3C8C0000-memory.dmp

    Filesize

    64KB

  • memory/416-51-0x000001EC3C940000-0x000001EC3C950000-memory.dmp

    Filesize

    64KB

  • memory/416-52-0x000001EC3AE00000-0x000001EC3AE01000-memory.dmp

    Filesize

    4KB

  • memory/416-53-0x000001EC3C940000-0x000001EC3C950000-memory.dmp

    Filesize

    64KB