Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/04/2023, 01:13

General

  • Target

    4092008c33525b2df13a941c342db154.jar

  • Size

    1.0MB

  • MD5

    4092008c33525b2df13a941c342db154

  • SHA1

    677f043525fee3a438c9a5f98ec088cc1fbec9a1

  • SHA256

    8e414e5789984690cd1d2221db3954eb0b6457aadf68f26b0da564f859d0ea9f

  • SHA512

    d889c9534e8b2201ff69e4d3177e514ae257e1cba8b8d8b23acc10a67ecc1c9450a070822173d261aeca3c23db8fbd412f50f2045c51ca4c1dcb278efd5878ef

  • SSDEEP

    24576:1ch6p4Mea7FdQKaikK21SHCJ3ny+SGiPsGIaRtLCg/e0cU2cxE:1+gFiKai1viny6iPHXrD/e0IsE

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\ProgramData\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\4092008c33525b2df13a941c342db154.jar
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:4760

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\flatlaf.temp\flatlaf-windows-x86_64-4096950704000.dll

          Filesize

          21KB

          MD5

          4ca3290a99adadde557930cd481d7539

          SHA1

          26034442a76131dd3d37c8f28b6e9bebc7c1fe7c

          SHA256

          dd130c68dc36bcedbe51a6b8ec3b3358a460d45952f6280e12331f48850b6b3b

          SHA512

          9341c60f92dd3f89f82555055924bdae6fcce1e4cd13a7dde5129ebdce04bae377292237a2ed6c3e7623b242e82b01c7ed1717af4d7db8ca473e9fd7b7b190d5

        • memory/4760-221-0x0000000000810000-0x0000000000811000-memory.dmp

          Filesize

          4KB

        • memory/4760-224-0x0000000000810000-0x0000000000811000-memory.dmp

          Filesize

          4KB

        • memory/4760-198-0x0000000000810000-0x0000000000811000-memory.dmp

          Filesize

          4KB

        • memory/4760-206-0x0000000000810000-0x0000000000811000-memory.dmp

          Filesize

          4KB

        • memory/4760-209-0x0000000000810000-0x0000000000811000-memory.dmp

          Filesize

          4KB

        • memory/4760-214-0x0000000000810000-0x0000000000811000-memory.dmp

          Filesize

          4KB

        • memory/4760-215-0x0000000000810000-0x0000000000811000-memory.dmp

          Filesize

          4KB

        • memory/4760-145-0x0000000000810000-0x0000000000811000-memory.dmp

          Filesize

          4KB

        • memory/4760-150-0x0000000000810000-0x0000000000811000-memory.dmp

          Filesize

          4KB

        • memory/4760-225-0x0000000000810000-0x0000000000811000-memory.dmp

          Filesize

          4KB

        • memory/4760-222-0x0000000000810000-0x0000000000811000-memory.dmp

          Filesize

          4KB

        • memory/4760-227-0x0000000000810000-0x0000000000811000-memory.dmp

          Filesize

          4KB

        • memory/4760-228-0x0000000000810000-0x0000000000811000-memory.dmp

          Filesize

          4KB

        • memory/4760-230-0x0000000000810000-0x0000000000811000-memory.dmp

          Filesize

          4KB

        • memory/4760-232-0x0000000000810000-0x0000000000811000-memory.dmp

          Filesize

          4KB

        • memory/4760-239-0x0000000000810000-0x0000000000811000-memory.dmp

          Filesize

          4KB

        • memory/4760-250-0x0000000000810000-0x0000000000811000-memory.dmp

          Filesize

          4KB