Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2025, 22:46
Behavioral task
behavioral1
Sample
ccc9f5a8463054f7540bb2b7aff55ccf4523c2c50f31a61cfb5c6c703d162d20.jar
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ccc9f5a8463054f7540bb2b7aff55ccf4523c2c50f31a61cfb5c6c703d162d20.jar
Resource
win10v2004-20250314-en
General
-
Target
ccc9f5a8463054f7540bb2b7aff55ccf4523c2c50f31a61cfb5c6c703d162d20.jar
-
Size
71KB
-
MD5
838346240204f348e716e6de63fc189b
-
SHA1
00a415cd130cd41ca837fd337143dc127a15f4a9
-
SHA256
ccc9f5a8463054f7540bb2b7aff55ccf4523c2c50f31a61cfb5c6c703d162d20
-
SHA512
f6a67a00baeeff621b7113d6b80de57d7d9b43a638ea80b65eb4ceb63c1e4d4d43cd584464d97afc28f1f77affd381b6a87de6ccc911c59223bd9aaeee055ba7
-
SSDEEP
1536:cRk7T0CzBrcurk1uRpMCoEiMlPIaHm9JPyaRCEodWaZTnGIZG8hluD9JakQ2a:cRkn0CzBrmypMCo7nbNRNocMTGIQ8h0I
Malware Config
Signatures
-
Adwind family
-
JAR file contains resources related to AdWind 1 IoCs
This JAR file potentially contains loader stubs used by the AdWind RAT.
resource yara_rule behavioral2/files/0x000400000001da2c-16.dat family_adwind_stub -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2024 attrib.exe 4572 attrib.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Edge9 = "\"C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\Edge11\\Edge10.jar\"" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Edge9 = "\"C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\Edge11\\Edge10.jar\"" reg.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Edge11\Desktop.ini attrib.exe File created C:\Users\Admin\AppData\Roaming\Edge11\Desktop.ini java.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 4588 reg.exe 4824 reg.exe 6140 reg.exe 4604 reg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2376 java.exe 4632 javaw.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2376 wrote to memory of 4604 2376 java.exe 90 PID 2376 wrote to memory of 4604 2376 java.exe 90 PID 2376 wrote to memory of 4588 2376 java.exe 92 PID 2376 wrote to memory of 4588 2376 java.exe 92 PID 2376 wrote to memory of 2024 2376 java.exe 93 PID 2376 wrote to memory of 2024 2376 java.exe 93 PID 2376 wrote to memory of 4572 2376 java.exe 95 PID 2376 wrote to memory of 4572 2376 java.exe 95 PID 2376 wrote to memory of 4632 2376 java.exe 97 PID 2376 wrote to memory of 4632 2376 java.exe 97 PID 4632 wrote to memory of 4824 4632 javaw.exe 99 PID 4632 wrote to memory of 4824 4632 javaw.exe 99 PID 4632 wrote to memory of 6140 4632 javaw.exe 101 PID 4632 wrote to memory of 6140 4632 javaw.exe 101 PID 4632 wrote to memory of 2420 4632 javaw.exe 103 PID 4632 wrote to memory of 2420 4632 javaw.exe 103 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 2024 attrib.exe 2420 attrib.exe 4572 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\ccc9f5a8463054f7540bb2b7aff55ccf4523c2c50f31a61cfb5c6c703d162d20.jar1⤵
- Drops desktop.ini file(s)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SYSTEM32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Edge9 /t REG_SZ /d "\"C:\Program Files\Java\jre-1.8\bin\javaw.exe\" -jar \"C:\Users\Admin\AppData\Roaming\Edge11\Edge10.jar\"" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:4604
-
-
C:\Windows\SYSTEM32\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Edge9 /f2⤵
- Modifies registry key
PID:4588
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Roaming\Edge11\*.*"2⤵
- Sets file to hidden
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:2024
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Roaming\Edge11"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4572
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\Edge11\Edge10.jar"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\SYSTEM32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Edge9 /t REG_SZ /d "\"C:\Program Files\Java\jre-1.8\bin\javaw.exe\" -jar \"C:\Users\Admin\AppData\Roaming\Edge11\Edge10.jar\"" /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:4824
-
-
C:\Windows\SYSTEM32\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Edge9 /f3⤵
- Modifies registry key
PID:6140
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\.Plugins33⤵
- Views/modifies file attributes
PID:2420
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5eada2084f09195679adb17eed5625f11
SHA1e00ca29a5fc1d0fdf8a449a597c609533b5ebba5
SHA2569142f11d8432aa32827838d08252795e849d3a58bf19eae98cb3f6cb60029915
SHA5126edea1e06fd17826c59716207d21588cb804982c8872eb39bd01742e9af203dbfd00f6ce043ccdce67f88e81010348959f775925445556668de0b4628e4b927c
-
Filesize
63B
MD5e783bdd20a976eaeaae1ff4624487420
SHA1c2a44fab9df00b3e11582546b16612333c2f9286
SHA2562f65fa9c7ed712f493782abf91467f869419a2f8b5adf23b44019c08190fa3f3
SHA5128c883678e4625ef44f4885b8c6d7485196774f9cb0b9eee7dd18711749bcae474163df9965effcd13ecd1a33cd7265010c152f8504d6013e4f4d85d68a901a80
-
Filesize
71KB
MD5838346240204f348e716e6de63fc189b
SHA100a415cd130cd41ca837fd337143dc127a15f4a9
SHA256ccc9f5a8463054f7540bb2b7aff55ccf4523c2c50f31a61cfb5c6c703d162d20
SHA512f6a67a00baeeff621b7113d6b80de57d7d9b43a638ea80b65eb4ceb63c1e4d4d43cd584464d97afc28f1f77affd381b6a87de6ccc911c59223bd9aaeee055ba7