Analysis
-
max time kernel
136s -
max time network
145s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
18/04/2025, 02:26
Behavioral task
behavioral1
Sample
sdadasd.jar
Resource
win11-20250410-en
General
-
Target
sdadasd.jar
-
Size
639KB
-
MD5
06e256d9eb26b1db8cc8762e9d75da3a
-
SHA1
965a23302b61a61dfba395356fbe033bc8ddf2db
-
SHA256
ace48cf084ee361c356a21c6480425dbc3130512fc35807fad30714d6521017b
-
SHA512
0c05eef43d62d31981e39273ffd562427b7a6cad3b0a7af5a26781d8e7a020a997a8a3538be1106c00442b428cb92e6d364e3ed0a9bd1f6488f2187397ac8507
-
SSDEEP
12288:0PnPQL/tJXCJ949nYLSPgO/bRj+VdkNu/8gO9mRfm3Auk2lESQhD8C:0PPQTnCH4xHPgO1Ccu/BYtAu5lXQhD8C
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000\Software\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1744943199542.tmp" reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1664 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1664 wrote to memory of 5560 1664 java.exe 79 PID 1664 wrote to memory of 5560 1664 java.exe 79 PID 1664 wrote to memory of 5216 1664 java.exe 81 PID 1664 wrote to memory of 5216 1664 java.exe 81 PID 5216 wrote to memory of 1472 5216 cmd.exe 83 PID 5216 wrote to memory of 1472 5216 cmd.exe 83 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 5560 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\sdadasd.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1744943199542.tmp2⤵
- Views/modifies file attributes
PID:5560
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1744943199542.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:5216 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1744943199542.tmp" /f3⤵
- Adds Run key to start application
PID:1472
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1744943199542.tmp1⤵PID:2352
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
639KB
MD506e256d9eb26b1db8cc8762e9d75da3a
SHA1965a23302b61a61dfba395356fbe033bc8ddf2db
SHA256ace48cf084ee361c356a21c6480425dbc3130512fc35807fad30714d6521017b
SHA5120c05eef43d62d31981e39273ffd562427b7a6cad3b0a7af5a26781d8e7a020a997a8a3538be1106c00442b428cb92e6d364e3ed0a9bd1f6488f2187397ac8507