Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2025, 22:34
Behavioral task
behavioral1
Sample
ccc9f5a8463054f7540bb2b7aff55ccf4523c2c50f31a61cfb5c6c703d162d20.jar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ccc9f5a8463054f7540bb2b7aff55ccf4523c2c50f31a61cfb5c6c703d162d20.jar
Resource
win10v2004-20250314-en
General
-
Target
ccc9f5a8463054f7540bb2b7aff55ccf4523c2c50f31a61cfb5c6c703d162d20.jar
-
Size
71KB
-
MD5
838346240204f348e716e6de63fc189b
-
SHA1
00a415cd130cd41ca837fd337143dc127a15f4a9
-
SHA256
ccc9f5a8463054f7540bb2b7aff55ccf4523c2c50f31a61cfb5c6c703d162d20
-
SHA512
f6a67a00baeeff621b7113d6b80de57d7d9b43a638ea80b65eb4ceb63c1e4d4d43cd584464d97afc28f1f77affd381b6a87de6ccc911c59223bd9aaeee055ba7
-
SSDEEP
1536:cRk7T0CzBrcurk1uRpMCoEiMlPIaHm9JPyaRCEodWaZTnGIZG8hluD9JakQ2a:cRkn0CzBrmypMCo7nbNRNocMTGIQ8h0I
Malware Config
Signatures
-
Adwind family
-
JAR file contains resources related to AdWind 1 IoCs
This JAR file potentially contains loader stubs used by the AdWind RAT.
resource yara_rule behavioral2/files/0x00080000000240b7-16.dat family_adwind_stub -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 3328 attrib.exe 1216 attrib.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Edge9 = "\"C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\Edge11\\Edge10.jar\"" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Edge9 = "\"C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\Edge11\\Edge10.jar\"" reg.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Edge11\Desktop.ini java.exe File opened for modification C:\Users\Admin\AppData\Roaming\Edge11\Desktop.ini attrib.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 212 reg.exe 4440 reg.exe 3728 reg.exe 3660 reg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4552 java.exe 1760 javaw.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4552 wrote to memory of 212 4552 java.exe 90 PID 4552 wrote to memory of 212 4552 java.exe 90 PID 4552 wrote to memory of 4440 4552 java.exe 92 PID 4552 wrote to memory of 4440 4552 java.exe 92 PID 4552 wrote to memory of 3328 4552 java.exe 94 PID 4552 wrote to memory of 3328 4552 java.exe 94 PID 4552 wrote to memory of 1216 4552 java.exe 95 PID 4552 wrote to memory of 1216 4552 java.exe 95 PID 4552 wrote to memory of 1760 4552 java.exe 96 PID 4552 wrote to memory of 1760 4552 java.exe 96 PID 1760 wrote to memory of 3728 1760 javaw.exe 99 PID 1760 wrote to memory of 3728 1760 javaw.exe 99 PID 1760 wrote to memory of 3660 1760 javaw.exe 101 PID 1760 wrote to memory of 3660 1760 javaw.exe 101 PID 1760 wrote to memory of 2428 1760 javaw.exe 103 PID 1760 wrote to memory of 2428 1760 javaw.exe 103 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 3328 attrib.exe 1216 attrib.exe 2428 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\ccc9f5a8463054f7540bb2b7aff55ccf4523c2c50f31a61cfb5c6c703d162d20.jar1⤵
- Drops desktop.ini file(s)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SYSTEM32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Edge9 /t REG_SZ /d "\"C:\Program Files\Java\jre-1.8\bin\javaw.exe\" -jar \"C:\Users\Admin\AppData\Roaming\Edge11\Edge10.jar\"" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:212
-
-
C:\Windows\SYSTEM32\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Edge9 /f2⤵
- Modifies registry key
PID:4440
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Roaming\Edge11\*.*"2⤵
- Sets file to hidden
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:3328
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Roaming\Edge11"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1216
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\Edge11\Edge10.jar"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SYSTEM32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Edge9 /t REG_SZ /d "\"C:\Program Files\Java\jre-1.8\bin\javaw.exe\" -jar \"C:\Users\Admin\AppData\Roaming\Edge11\Edge10.jar\"" /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:3728
-
-
C:\Windows\SYSTEM32\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Edge9 /f3⤵
- Modifies registry key
PID:3660
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\.Plugins33⤵
- Views/modifies file attributes
PID:2428
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5fa75b8fe7e4c47f7dfd783a7ba6a3477
SHA117c83adb55b3609d0429d0e891b4c1ffdfa631bb
SHA2564928df97072dba596385ed2f186d61fe95ca94a5a8f40971bd68bfeaa9056930
SHA512cd8d55f52f1f080e1cd6f9de0408e9379b5a45b5bcb99ab36b0d17cd52ca4dda73581e8b8959a5cc1d6e0beed9119838a2cfef7f375121aa65c9e1c4e9be5515
-
Filesize
63B
MD5e783bdd20a976eaeaae1ff4624487420
SHA1c2a44fab9df00b3e11582546b16612333c2f9286
SHA2562f65fa9c7ed712f493782abf91467f869419a2f8b5adf23b44019c08190fa3f3
SHA5128c883678e4625ef44f4885b8c6d7485196774f9cb0b9eee7dd18711749bcae474163df9965effcd13ecd1a33cd7265010c152f8504d6013e4f4d85d68a901a80
-
Filesize
71KB
MD5838346240204f348e716e6de63fc189b
SHA100a415cd130cd41ca837fd337143dc127a15f4a9
SHA256ccc9f5a8463054f7540bb2b7aff55ccf4523c2c50f31a61cfb5c6c703d162d20
SHA512f6a67a00baeeff621b7113d6b80de57d7d9b43a638ea80b65eb4ceb63c1e4d4d43cd584464d97afc28f1f77affd381b6a87de6ccc911c59223bd9aaeee055ba7