Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
23/03/2025, 15:07
Behavioral task
behavioral1
Sample
test.jar
Resource
win10v2004-20250314-en
General
-
Target
test.jar
-
Size
653KB
-
MD5
9d04910d2605437baa1f4225b0c61e93
-
SHA1
014f9ebd504edb8c0860567b1f0a2b4d9b2e87a1
-
SHA256
5f43bf3d7c1b25b0e1fa9fe34ca476728a042338bf5348fa92354db68bb43a81
-
SHA512
1540969005ecb4e7c34bae3bf40577016e4a2bbe850b3843de6f5a434b04d1511c49727e06457b9da62d712697f5f087d42213b4fb1dff3fffb58b7ae45a221f
-
SSDEEP
12288:KbDVQF/HHxAXx4xNIh4bgK/HR7+p3kNW3OgyNKRRQ3cuA2NYS+NDks:KbRQ1xAh4z7bgKZ2GW33MJcuNNj+NDks
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1742742436716.tmp" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 17 pastebin.com 19 pastebin.com -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 696 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 696 wrote to memory of 448 696 java.exe 90 PID 696 wrote to memory of 448 696 java.exe 90 PID 696 wrote to memory of 4600 696 java.exe 92 PID 696 wrote to memory of 4600 696 java.exe 92 PID 4600 wrote to memory of 4856 4600 cmd.exe 94 PID 4600 wrote to memory of 4856 4600 cmd.exe 94 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 448 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\test.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1742742436716.tmp2⤵
- Views/modifies file attributes
PID:448
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1742742436716.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1742742436716.tmp" /f3⤵
- Adds Run key to start application
PID:4856
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
653KB
MD59d04910d2605437baa1f4225b0c61e93
SHA1014f9ebd504edb8c0860567b1f0a2b4d9b2e87a1
SHA2565f43bf3d7c1b25b0e1fa9fe34ca476728a042338bf5348fa92354db68bb43a81
SHA5121540969005ecb4e7c34bae3bf40577016e4a2bbe850b3843de6f5a434b04d1511c49727e06457b9da62d712697f5f087d42213b4fb1dff3fffb58b7ae45a221f