Analysis
-
max time kernel
23s -
max time network
23s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2025, 08:35
Behavioral task
behavioral1
Sample
client.jar
Resource
win10v2004-20250314-en
General
-
Target
client.jar
-
Size
639KB
-
MD5
96cb7c121c63f94f22d4ebcf2627a27b
-
SHA1
5291d5ffe367e3f87da1d502e636f3f1c0d16a94
-
SHA256
6bc9a97dbce33fded1b203a6d758f4b18d9c5aba4340d142afb92d16e18cc5ab
-
SHA512
9ea69d671052bf61d7a64edaeb31ec151220dfa5c59f1d2a96ad03d8d5d50379864fba5895f77668520f399c8622d687b46b5e5d3027064d7be02fdbb0022ee6
-
SSDEEP
12288:OH3pQV/7z50j94t145c7g+/bR7+hvYNanygy5iRdM38us2BMSiNDkq:OHZQFJ0h4zT7g+1mCanTQB8uRBPiNDkq
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1743842145874.tmp" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 12 raw.githubusercontent.com 16 raw.githubusercontent.com -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2808 java.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2808 wrote to memory of 1020 2808 java.exe 90 PID 2808 wrote to memory of 1020 2808 java.exe 90 PID 2808 wrote to memory of 2472 2808 java.exe 92 PID 2808 wrote to memory of 2472 2808 java.exe 92 PID 2472 wrote to memory of 3512 2472 cmd.exe 94 PID 2472 wrote to memory of 3512 2472 cmd.exe 94 PID 2808 wrote to memory of 4212 2808 java.exe 105 PID 2808 wrote to memory of 4212 2808 java.exe 105 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1020 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\client.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1743842145874.tmp2⤵
- Views/modifies file attributes
PID:1020
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1743842145874.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1743842145874.tmp" /f3⤵
- Adds Run key to start application
PID:3512
-
-
-
C:\Windows\SYSTEM32\reg.exereg query "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v Home2⤵PID:4212
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1743842145874.tmp1⤵PID:4360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
639KB
MD596cb7c121c63f94f22d4ebcf2627a27b
SHA15291d5ffe367e3f87da1d502e636f3f1c0d16a94
SHA2566bc9a97dbce33fded1b203a6d758f4b18d9c5aba4340d142afb92d16e18cc5ab
SHA5129ea69d671052bf61d7a64edaeb31ec151220dfa5c59f1d2a96ad03d8d5d50379864fba5895f77668520f399c8622d687b46b5e5d3027064d7be02fdbb0022ee6