Analysis
-
max time kernel
55s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2025, 03:29
Behavioral task
behavioral1
Sample
d.jar
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
d.jar
Resource
win11-20250410-en
General
-
Target
d.jar
-
Size
639KB
-
MD5
34279267ab0b1b5f49f5c330a0925133
-
SHA1
ef0f641545f08ed3bbb39491d0f2558f3ad3606b
-
SHA256
fd7909358fb44cfdf53ea15d99241c1966becc081f9d75e9837729cd5c56d798
-
SHA512
4135388fe83409b62f2a03ffcc27c80eced4d48daf6b0698f6333dfe2e6f8607672c637ae256e039a5c7e6c33d3dab0041322569bfd380024523498a647534b7
-
SSDEEP
12288:ZztCQA/wyMHCL43mgax3gw/1R/+hI+N+thgwNqRCL36uM26sSQ5Dsh:ZzAQMkHK42r3gwPyV+tem36ux6vQ5Dsh
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3833542908-3750648139-3436651901-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1745033378892.tmp" reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4484 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4484 wrote to memory of 5048 4484 java.exe 90 PID 4484 wrote to memory of 5048 4484 java.exe 90 PID 4484 wrote to memory of 2888 4484 java.exe 92 PID 4484 wrote to memory of 2888 4484 java.exe 92 PID 2888 wrote to memory of 1140 2888 cmd.exe 94 PID 2888 wrote to memory of 1140 2888 cmd.exe 94 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 5048 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\d.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1745033378892.tmp2⤵
- Views/modifies file attributes
PID:5048
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1745033378892.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1745033378892.tmp" /f3⤵
- Adds Run key to start application
PID:1140
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1745033378892.tmp1⤵PID:2716
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3332
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
639KB
MD534279267ab0b1b5f49f5c330a0925133
SHA1ef0f641545f08ed3bbb39491d0f2558f3ad3606b
SHA256fd7909358fb44cfdf53ea15d99241c1966becc081f9d75e9837729cd5c56d798
SHA5124135388fe83409b62f2a03ffcc27c80eced4d48daf6b0698f6333dfe2e6f8607672c637ae256e039a5c7e6c33d3dab0041322569bfd380024523498a647534b7