Analysis
-
max time kernel
68s -
max time network
77s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-06-2024 17:04
Behavioral task
behavioral1
Sample
sex.jar
Resource
win11-20240508-en
General
-
Target
sex.jar
-
Size
639KB
-
MD5
6790eea68539247aff5c76f929d8a89b
-
SHA1
4cfdbea1546fbfb94748da5b59e315c3460557cf
-
SHA256
39567ac217f977fa30c84ff6a73184dd4ea381738787d9cac4987c359aa09678
-
SHA512
48c122ebf42d2ee520e3c780940f4a1182f136230d174f73a437b6d84aa549009f03831f6a3d9d04d2056ca828184f23bab90c0d8d70102e9e82f15903fb38f2
-
SSDEEP
12288:7/dwQa/CQK5cT4joIQ3Hgw/lRH+9KeNOpvgAZSR893Cu82tMS97D4+:7/eQOa584UPHgwfmPOpoCfCuBtP97D4+
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
java.exepid process 3468 java.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
java.exedescription pid process target process PID 3468 wrote to memory of 1852 3468 java.exe icacls.exe PID 3468 wrote to memory of 1852 3468 java.exe icacls.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\sex.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestampFilesize
46B
MD59334c4658cabeff67f8ebb9724dfc31f
SHA1f70aa2a90049b6a56d6f4d5b693d09135e5433fa
SHA256bec11e57fe1115972c084d224b508d1377228a0dc491b4288c73ab2a8f1010fe
SHA512235234bf8e94aae1683838782172db31d7b63879298d004d17d354197bfa7a90192d464e61c53679343e9d4bfdd6af682b7cbb235d4fcc7ceda1023ddfe666b5
-
memory/3468-36-0x0000019186390000-0x0000019186391000-memory.dmpFilesize
4KB
-
memory/3468-50-0x0000019187E70000-0x0000019187E80000-memory.dmpFilesize
64KB
-
memory/3468-35-0x0000019187B80000-0x0000019187DF0000-memory.dmpFilesize
2.4MB
-
memory/3468-23-0x0000019187E20000-0x0000019187E30000-memory.dmpFilesize
64KB
-
memory/3468-21-0x0000019187E10000-0x0000019187E20000-memory.dmpFilesize
64KB
-
memory/3468-24-0x0000019187E30000-0x0000019187E40000-memory.dmpFilesize
64KB
-
memory/3468-26-0x0000019187E40000-0x0000019187E50000-memory.dmpFilesize
64KB
-
memory/3468-29-0x0000019187E50000-0x0000019187E60000-memory.dmpFilesize
64KB
-
memory/3468-30-0x0000019187E60000-0x0000019187E70000-memory.dmpFilesize
64KB
-
memory/3468-37-0x0000019187DF0000-0x0000019187E00000-memory.dmpFilesize
64KB
-
memory/3468-18-0x0000019187E00000-0x0000019187E10000-memory.dmpFilesize
64KB
-
memory/3468-17-0x0000019187DF0000-0x0000019187E00000-memory.dmpFilesize
64KB
-
memory/3468-34-0x0000019186390000-0x0000019186391000-memory.dmpFilesize
4KB
-
memory/3468-38-0x0000019187E00000-0x0000019187E10000-memory.dmpFilesize
64KB
-
memory/3468-39-0x0000019187E10000-0x0000019187E20000-memory.dmpFilesize
64KB
-
memory/3468-40-0x0000019187E20000-0x0000019187E30000-memory.dmpFilesize
64KB
-
memory/3468-41-0x0000019187E30000-0x0000019187E40000-memory.dmpFilesize
64KB
-
memory/3468-42-0x0000019187E40000-0x0000019187E50000-memory.dmpFilesize
64KB
-
memory/3468-44-0x0000019187E50000-0x0000019187E60000-memory.dmpFilesize
64KB
-
memory/3468-45-0x0000019187E70000-0x0000019187E80000-memory.dmpFilesize
64KB
-
memory/3468-48-0x0000019187E80000-0x0000019187E90000-memory.dmpFilesize
64KB
-
memory/3468-47-0x0000019187E60000-0x0000019187E70000-memory.dmpFilesize
64KB
-
memory/3468-2-0x0000019187B80000-0x0000019187DF0000-memory.dmpFilesize
2.4MB