Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 20:02
Behavioral task
behavioral1
Sample
output.jar
Resource
win10v2004-20240508-en
General
-
Target
output.jar
-
Size
639KB
-
MD5
4c6e6158af0e9f0e10550fa35032bbca
-
SHA1
d067e895675378336dad950834445976741dfc83
-
SHA256
9484f1076d17a61f82a65ced4e62b00f7599fb70bc6459379989f23c08722d38
-
SHA512
e23187befc0ece03fb1e958a334ae6633e73476067a4eec8413bd7cf718d60a029bdd5286cf17f91a867cfd4268ebff48ba37f87f8960300c07f8cbc952598ae
-
SSDEEP
12288:4/7TQf/x1DSF54tP0TaTgu/7R3+tdQNGrwgSpGR323ouk2xkSslD8M:4/vQnvSP4lrTgu1OAGrd4hou5x3slD8M
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1719864166749.tmp" reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
java.exepid process 2160 java.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
java.execmd.exedescription pid process target process PID 2160 wrote to memory of 1728 2160 java.exe icacls.exe PID 2160 wrote to memory of 1728 2160 java.exe icacls.exe PID 2160 wrote to memory of 3040 2160 java.exe attrib.exe PID 2160 wrote to memory of 3040 2160 java.exe attrib.exe PID 2160 wrote to memory of 3056 2160 java.exe cmd.exe PID 2160 wrote to memory of 3056 2160 java.exe cmd.exe PID 3056 wrote to memory of 5004 3056 cmd.exe reg.exe PID 3056 wrote to memory of 5004 3056 cmd.exe reg.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\output.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1719864166749.tmp2⤵
- Views/modifies file attributes
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1719864166749.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1719864166749.tmp" /f3⤵
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestampFilesize
46B
MD52a668831589c361b8409062efcd86a88
SHA1f43099122b7945a6a9b97229ebef4577a7075925
SHA2561fcc52159d2c4e1d62d5957c7b0064495b4044b8f8a5536025e6fe084fe8e4a4
SHA512a39c5ea913938a8c11915ea3618e8fa00db891a524c331eb8b509903f0f19026dcc8790be0b21ef3c0470867971da7987fe3a7f951de10641697365b0c217b4a
-
C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1719864166749.tmpFilesize
639KB
MD54c6e6158af0e9f0e10550fa35032bbca
SHA1d067e895675378336dad950834445976741dfc83
SHA2569484f1076d17a61f82a65ced4e62b00f7599fb70bc6459379989f23c08722d38
SHA512e23187befc0ece03fb1e958a334ae6633e73476067a4eec8413bd7cf718d60a029bdd5286cf17f91a867cfd4268ebff48ba37f87f8960300c07f8cbc952598ae
-
memory/2160-39-0x0000028CDC8C0000-0x0000028CDCB30000-memory.dmpFilesize
2.4MB
-
memory/2160-20-0x0000028CDCB50000-0x0000028CDCB60000-memory.dmpFilesize
64KB
-
memory/2160-41-0x0000028CDCB30000-0x0000028CDCB40000-memory.dmpFilesize
64KB
-
memory/2160-42-0x0000028CDCB40000-0x0000028CDCB50000-memory.dmpFilesize
64KB
-
memory/2160-29-0x0000028CDCB90000-0x0000028CDCBA0000-memory.dmpFilesize
64KB
-
memory/2160-27-0x0000028CDCB70000-0x0000028CDCB80000-memory.dmpFilesize
64KB
-
memory/2160-36-0x0000028CDCBB0000-0x0000028CDCBC0000-memory.dmpFilesize
64KB
-
memory/2160-16-0x0000028CDCB30000-0x0000028CDCB40000-memory.dmpFilesize
64KB
-
memory/2160-32-0x0000028CDCBA0000-0x0000028CDCBB0000-memory.dmpFilesize
64KB
-
memory/2160-26-0x0000028CDCB80000-0x0000028CDCB90000-memory.dmpFilesize
64KB
-
memory/2160-25-0x0000028CDCB60000-0x0000028CDCB70000-memory.dmpFilesize
64KB
-
memory/2160-38-0x0000028CDAE90000-0x0000028CDAE91000-memory.dmpFilesize
4KB
-
memory/2160-56-0x0000028CDCBD0000-0x0000028CDCBE0000-memory.dmpFilesize
64KB
-
memory/2160-18-0x0000028CDCB40000-0x0000028CDCB50000-memory.dmpFilesize
64KB
-
memory/2160-22-0x0000028CDAE90000-0x0000028CDAE91000-memory.dmpFilesize
4KB
-
memory/2160-43-0x0000028CDCB50000-0x0000028CDCB60000-memory.dmpFilesize
64KB
-
memory/2160-44-0x0000028CDCB60000-0x0000028CDCB70000-memory.dmpFilesize
64KB
-
memory/2160-45-0x0000028CDCB80000-0x0000028CDCB90000-memory.dmpFilesize
64KB
-
memory/2160-46-0x0000028CDCB70000-0x0000028CDCB80000-memory.dmpFilesize
64KB
-
memory/2160-47-0x0000028CDCB90000-0x0000028CDCBA0000-memory.dmpFilesize
64KB
-
memory/2160-51-0x0000028CDCBC0000-0x0000028CDCBD0000-memory.dmpFilesize
64KB
-
memory/2160-50-0x0000028CDCBA0000-0x0000028CDCBB0000-memory.dmpFilesize
64KB
-
memory/2160-52-0x0000028CDAE90000-0x0000028CDAE91000-memory.dmpFilesize
4KB
-
memory/2160-53-0x0000028CDCBB0000-0x0000028CDCBC0000-memory.dmpFilesize
64KB
-
memory/2160-55-0x0000028CDCBC0000-0x0000028CDCBD0000-memory.dmpFilesize
64KB
-
memory/2160-2-0x0000028CDC8C0000-0x0000028CDCB30000-memory.dmpFilesize
2.4MB