Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25/03/2025, 22:46
Behavioral task
behavioral1
Sample
ccc9f5a8463054f7540bb2b7aff55ccf4523c2c50f31a61cfb5c6c703d162d20.jar
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ccc9f5a8463054f7540bb2b7aff55ccf4523c2c50f31a61cfb5c6c703d162d20.jar
Resource
win10v2004-20250314-en
General
-
Target
ccc9f5a8463054f7540bb2b7aff55ccf4523c2c50f31a61cfb5c6c703d162d20.jar
-
Size
71KB
-
MD5
838346240204f348e716e6de63fc189b
-
SHA1
00a415cd130cd41ca837fd337143dc127a15f4a9
-
SHA256
ccc9f5a8463054f7540bb2b7aff55ccf4523c2c50f31a61cfb5c6c703d162d20
-
SHA512
f6a67a00baeeff621b7113d6b80de57d7d9b43a638ea80b65eb4ceb63c1e4d4d43cd584464d97afc28f1f77affd381b6a87de6ccc911c59223bd9aaeee055ba7
-
SSDEEP
1536:cRk7T0CzBrcurk1uRpMCoEiMlPIaHm9JPyaRCEodWaZTnGIZG8hluD9JakQ2a:cRkn0CzBrmypMCo7nbNRNocMTGIQ8h0I
Malware Config
Signatures
-
Adwind family
-
JAR file contains resources related to AdWind 1 IoCs
This JAR file potentially contains loader stubs used by the AdWind RAT.
resource yara_rule behavioral1/files/0x0008000000018b50-16.dat family_adwind_stub -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1048 attrib.exe 2932 attrib.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Edge9 = "\"C:\\Program Files\\Java\\jre7\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\Edge11\\Edge10.jar\"" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Edge9 = "\"C:\\Program Files\\Java\\jre7\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\Edge11\\Edge10.jar\"" reg.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Edge11\Desktop.ini java.exe File opened for modification C:\Users\Admin\AppData\Roaming\Edge11\Desktop.ini attrib.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 568 reg.exe 2208 reg.exe 2552 reg.exe 2224 reg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2548 java.exe 3064 javaw.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2548 wrote to memory of 568 2548 java.exe 31 PID 2548 wrote to memory of 568 2548 java.exe 31 PID 2548 wrote to memory of 568 2548 java.exe 31 PID 2548 wrote to memory of 2208 2548 java.exe 32 PID 2548 wrote to memory of 2208 2548 java.exe 32 PID 2548 wrote to memory of 2208 2548 java.exe 32 PID 2548 wrote to memory of 2932 2548 java.exe 33 PID 2548 wrote to memory of 2932 2548 java.exe 33 PID 2548 wrote to memory of 2932 2548 java.exe 33 PID 2548 wrote to memory of 1048 2548 java.exe 34 PID 2548 wrote to memory of 1048 2548 java.exe 34 PID 2548 wrote to memory of 1048 2548 java.exe 34 PID 2548 wrote to memory of 3064 2548 java.exe 35 PID 2548 wrote to memory of 3064 2548 java.exe 35 PID 2548 wrote to memory of 3064 2548 java.exe 35 PID 3064 wrote to memory of 2552 3064 javaw.exe 36 PID 3064 wrote to memory of 2552 3064 javaw.exe 36 PID 3064 wrote to memory of 2552 3064 javaw.exe 36 PID 3064 wrote to memory of 2224 3064 javaw.exe 38 PID 3064 wrote to memory of 2224 3064 javaw.exe 38 PID 3064 wrote to memory of 2224 3064 javaw.exe 38 PID 3064 wrote to memory of 832 3064 javaw.exe 40 PID 3064 wrote to memory of 832 3064 javaw.exe 40 PID 3064 wrote to memory of 832 3064 javaw.exe 40 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 2932 attrib.exe 1048 attrib.exe 832 attrib.exe
Processes
-
C:\Windows\system32\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\ccc9f5a8463054f7540bb2b7aff55ccf4523c2c50f31a61cfb5c6c703d162d20.jar1⤵
- Drops desktop.ini file(s)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Edge9 /t REG_SZ /d "\"C:\Program Files\Java\jre7\bin\javaw.exe\" -jar \"C:\Users\Admin\AppData\Roaming\Edge11\Edge10.jar\"" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:568
-
-
C:\Windows\system32\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Edge9 /f2⤵
- Modifies registry key
PID:2208
-
-
C:\Windows\system32\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Roaming\Edge11\*.*"2⤵
- Sets file to hidden
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:2932
-
-
C:\Windows\system32\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Roaming\Edge11"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1048
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\Edge11\Edge10.jar"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Edge9 /t REG_SZ /d "\"C:\Program Files\Java\jre7\bin\javaw.exe\" -jar \"C:\Users\Admin\AppData\Roaming\Edge11\Edge10.jar\"" /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:2552
-
-
C:\Windows\system32\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Edge9 /f3⤵
- Modifies registry key
PID:2224
-
-
C:\Windows\system32\attrib.exeattrib +H C:\Users\Admin\.Plugins33⤵
- Views/modifies file attributes
PID:832
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63B
MD5e783bdd20a976eaeaae1ff4624487420
SHA1c2a44fab9df00b3e11582546b16612333c2f9286
SHA2562f65fa9c7ed712f493782abf91467f869419a2f8b5adf23b44019c08190fa3f3
SHA5128c883678e4625ef44f4885b8c6d7485196774f9cb0b9eee7dd18711749bcae474163df9965effcd13ecd1a33cd7265010c152f8504d6013e4f4d85d68a901a80
-
Filesize
71KB
MD5838346240204f348e716e6de63fc189b
SHA100a415cd130cd41ca837fd337143dc127a15f4a9
SHA256ccc9f5a8463054f7540bb2b7aff55ccf4523c2c50f31a61cfb5c6c703d162d20
SHA512f6a67a00baeeff621b7113d6b80de57d7d9b43a638ea80b65eb4ceb63c1e4d4d43cd584464d97afc28f1f77affd381b6a87de6ccc911c59223bd9aaeee055ba7