Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 13:18
Behavioral task
behavioral1
Sample
HELLO.jar
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
HELLO.jar
Resource
win11-20240611-en
General
-
Target
HELLO.jar
-
Size
2.3MB
-
MD5
3950c0d6bd731b2039ec1c7b33c76f52
-
SHA1
52452cc54408b66e300be5a1141fb7c2e8cc5246
-
SHA256
2d68b7c3e84a17714197334296201071e31487281dc119c7c1aecb32ec3ffda0
-
SHA512
1e6c68dc8d43c46abfc7fb5fd861d19a9ce6c80267eb072f0fece3001c3f654cb496413d73d48c5f6da8c20fd557e0873d5b1cdc731bb609bba5c20f06ed66a2
-
SSDEEP
49152:fGQma9w588m2GuzpK4JeT3gOtPWD0d0+aKWnGPLsFHRFZX:fXmb88QcpK4JeHJ8/nGPmHRz
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1719321495407.tmp" reg.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
java.exepid process 4424 java.exe 4424 java.exe 4424 java.exe 4424 java.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
java.execmd.exedescription pid process target process PID 4424 wrote to memory of 1948 4424 java.exe icacls.exe PID 4424 wrote to memory of 1948 4424 java.exe icacls.exe PID 4424 wrote to memory of 540 4424 java.exe attrib.exe PID 4424 wrote to memory of 540 4424 java.exe attrib.exe PID 4424 wrote to memory of 5048 4424 java.exe cmd.exe PID 4424 wrote to memory of 5048 4424 java.exe cmd.exe PID 5048 wrote to memory of 1476 5048 cmd.exe reg.exe PID 5048 wrote to memory of 1476 5048 cmd.exe reg.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\HELLO.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1719321495407.tmp2⤵
- Views/modifies file attributes
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1719321495407.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1719321495407.tmp" /f3⤵
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestampFilesize
46B
MD543776c7c6a635b1d1593a5e981f1e517
SHA162cd33af1a2fd7c8bfad225db73ff2eee0dff2ae
SHA256a21c5b60408a683c5f828b247e2e8a6b8f34bc89dbb9517725a4641aa28ee9c7
SHA512e53fafc653cf56d25fb5d07093316d097852c160a6c4b97883cbaef8ff103a584cf280c70d2e98ce68d53cfaf04f020a1ed4adc4fedb4c25f7e84cc1a1777d1e
-
C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1719321495407.tmpFilesize
2.3MB
MD53950c0d6bd731b2039ec1c7b33c76f52
SHA152452cc54408b66e300be5a1141fb7c2e8cc5246
SHA2562d68b7c3e84a17714197334296201071e31487281dc119c7c1aecb32ec3ffda0
SHA5121e6c68dc8d43c46abfc7fb5fd861d19a9ce6c80267eb072f0fece3001c3f654cb496413d73d48c5f6da8c20fd557e0873d5b1cdc731bb609bba5c20f06ed66a2
-
memory/4424-2-0x000001C8CEAF0000-0x000001C8CED60000-memory.dmpFilesize
2.4MB
-
memory/4424-17-0x000001C8CED60000-0x000001C8CED70000-memory.dmpFilesize
64KB
-
memory/4424-20-0x000001C8CED80000-0x000001C8CED90000-memory.dmpFilesize
64KB
-
memory/4424-19-0x000001C8CED70000-0x000001C8CED80000-memory.dmpFilesize
64KB
-
memory/4424-24-0x000001C8CEDA0000-0x000001C8CEDB0000-memory.dmpFilesize
64KB
-
memory/4424-23-0x000001C8CED90000-0x000001C8CEDA0000-memory.dmpFilesize
64KB
-
memory/4424-26-0x000001C8CEDB0000-0x000001C8CEDC0000-memory.dmpFilesize
64KB
-
memory/4424-30-0x000001C8CD100000-0x000001C8CD101000-memory.dmpFilesize
4KB
-
memory/4424-34-0x000001C8CEDD0000-0x000001C8CEDE0000-memory.dmpFilesize
64KB
-
memory/4424-33-0x000001C8CEDC0000-0x000001C8CEDD0000-memory.dmpFilesize
64KB
-
memory/4424-38-0x000001C8CEDE0000-0x000001C8CEDF0000-memory.dmpFilesize
64KB
-
memory/4424-40-0x000001C8CD100000-0x000001C8CD101000-memory.dmpFilesize
4KB
-
memory/4424-41-0x000001C8CEDF0000-0x000001C8CEE00000-memory.dmpFilesize
64KB
-
memory/4424-43-0x000001C8CEE00000-0x000001C8CEE10000-memory.dmpFilesize
64KB
-
memory/4424-46-0x000001C8CEE10000-0x000001C8CEE20000-memory.dmpFilesize
64KB
-
memory/4424-49-0x000001C8CEE20000-0x000001C8CEE30000-memory.dmpFilesize
64KB
-
memory/4424-48-0x000001C8CEAF0000-0x000001C8CED60000-memory.dmpFilesize
2.4MB
-
memory/4424-54-0x000001C8CEE30000-0x000001C8CEE40000-memory.dmpFilesize
64KB
-
memory/4424-53-0x000001C8CED60000-0x000001C8CED70000-memory.dmpFilesize
64KB
-
memory/4424-56-0x000001C8CED70000-0x000001C8CED80000-memory.dmpFilesize
64KB
-
memory/4424-57-0x000001C8CED80000-0x000001C8CED90000-memory.dmpFilesize
64KB
-
memory/4424-58-0x000001C8CEE40000-0x000001C8CEE50000-memory.dmpFilesize
64KB
-
memory/4424-59-0x000001C8CD100000-0x000001C8CD101000-memory.dmpFilesize
4KB
-
memory/4424-61-0x000001C8CED90000-0x000001C8CEDA0000-memory.dmpFilesize
64KB
-
memory/4424-62-0x000001C8CEDA0000-0x000001C8CEDB0000-memory.dmpFilesize
64KB
-
memory/4424-63-0x000001C8CEE50000-0x000001C8CEE60000-memory.dmpFilesize
64KB
-
memory/4424-65-0x000001C8CEDB0000-0x000001C8CEDC0000-memory.dmpFilesize
64KB
-
memory/4424-66-0x000001C8CEE60000-0x000001C8CEE70000-memory.dmpFilesize
64KB
-
memory/4424-72-0x000001C8CEE70000-0x000001C8CEE80000-memory.dmpFilesize
64KB
-
memory/4424-69-0x000001C8CD100000-0x000001C8CD101000-memory.dmpFilesize
4KB
-
memory/4424-70-0x000001C8CEDC0000-0x000001C8CEDD0000-memory.dmpFilesize
64KB
-
memory/4424-71-0x000001C8CEDD0000-0x000001C8CEDE0000-memory.dmpFilesize
64KB
-
memory/4424-74-0x000001C8CD100000-0x000001C8CD101000-memory.dmpFilesize
4KB
-
memory/4424-76-0x000001C8CEDE0000-0x000001C8CEDF0000-memory.dmpFilesize
64KB
-
memory/4424-77-0x000001C8CEDF0000-0x000001C8CEE00000-memory.dmpFilesize
64KB
-
memory/4424-78-0x000001C8CEE00000-0x000001C8CEE10000-memory.dmpFilesize
64KB
-
memory/4424-79-0x000001C8CEE10000-0x000001C8CEE20000-memory.dmpFilesize
64KB
-
memory/4424-80-0x000001C8CEE20000-0x000001C8CEE30000-memory.dmpFilesize
64KB
-
memory/4424-81-0x000001C8CEE30000-0x000001C8CEE40000-memory.dmpFilesize
64KB
-
memory/4424-82-0x000001C8CEE40000-0x000001C8CEE50000-memory.dmpFilesize
64KB
-
memory/4424-83-0x000001C8CEE50000-0x000001C8CEE60000-memory.dmpFilesize
64KB
-
memory/4424-84-0x000001C8CEE60000-0x000001C8CEE70000-memory.dmpFilesize
64KB
-
memory/4424-85-0x000001C8CEE70000-0x000001C8CEE80000-memory.dmpFilesize
64KB
-
memory/4424-86-0x000001C8CEE80000-0x000001C8CEE90000-memory.dmpFilesize
64KB
-
memory/4424-87-0x000001C8CEE80000-0x000001C8CEE90000-memory.dmpFilesize
64KB
-
memory/4424-88-0x000001C8CD100000-0x000001C8CD101000-memory.dmpFilesize
4KB
-
memory/4424-90-0x000001C8CEE90000-0x000001C8CEEA0000-memory.dmpFilesize
64KB
-
memory/4424-92-0x000001C8CEE90000-0x000001C8CEEA0000-memory.dmpFilesize
64KB