Analysis
-
max time kernel
46s -
max time network
54s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/04/2025, 03:29
Behavioral task
behavioral1
Sample
d.jar
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
d.jar
Resource
win11-20250410-en
General
-
Target
d.jar
-
Size
639KB
-
MD5
34279267ab0b1b5f49f5c330a0925133
-
SHA1
ef0f641545f08ed3bbb39491d0f2558f3ad3606b
-
SHA256
fd7909358fb44cfdf53ea15d99241c1966becc081f9d75e9837729cd5c56d798
-
SHA512
4135388fe83409b62f2a03ffcc27c80eced4d48daf6b0698f6333dfe2e6f8607672c637ae256e039a5c7e6c33d3dab0041322569bfd380024523498a647534b7
-
SSDEEP
12288:ZztCQA/wyMHCL43mgax3gw/1R/+hI+N+thgwNqRCL36uM26sSQ5Dsh:ZzAQMkHK42r3gwPyV+tem36ux6vQ5Dsh
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1492919288-2219487354-2015056034-1000\Software\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1745033378327.tmp" reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5924 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5924 wrote to memory of 3300 5924 java.exe 79 PID 5924 wrote to memory of 3300 5924 java.exe 79 PID 5924 wrote to memory of 3364 5924 java.exe 81 PID 5924 wrote to memory of 3364 5924 java.exe 81 PID 3364 wrote to memory of 3112 3364 cmd.exe 83 PID 3364 wrote to memory of 3112 3364 cmd.exe 83 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3300 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\d.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5924 -
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1745033378327.tmp2⤵
- Views/modifies file attributes
PID:3300
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1745033378327.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1745033378327.tmp" /f3⤵
- Adds Run key to start application
PID:3112
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1745033378327.tmp1⤵PID:5688
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
639KB
MD534279267ab0b1b5f49f5c330a0925133
SHA1ef0f641545f08ed3bbb39491d0f2558f3ad3606b
SHA256fd7909358fb44cfdf53ea15d99241c1966becc081f9d75e9837729cd5c56d798
SHA5124135388fe83409b62f2a03ffcc27c80eced4d48daf6b0698f6333dfe2e6f8607672c637ae256e039a5c7e6c33d3dab0041322569bfd380024523498a647534b7