Analysis
-
max time kernel
48s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 12:04
Static task
static1
Behavioral task
behavioral1
Sample
howtowalk.jar
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
howtowalk.jar
Resource
win10v2004-20240226-en
8 signatures
150 seconds
General
-
Target
howtowalk.jar
-
Size
309KB
-
MD5
a35ff3857ad79b569726f3e9fd838b99
-
SHA1
d0315cb33d8240cdcbefbaa8d9cfdf3a7405150f
-
SHA256
ede13da573f8e0d4b5e83dbdc75141f94086973df7a36c9e0566a5adbbd02439
-
SHA512
58af5f6d1ae73aacb19dc66c5e58ead8c3f6d67de670662aa9158660d2b8617e59f376a521cef690853affea2447e43f9305d8ba2c096d303503d6403afb0197
-
SSDEEP
6144:xlM0KpRyXenT1shRpdOJOKTvyVBLWAj9jDuGu11sYOAClA0gxyCEmiDcC:xCLR+enTe1dOJN8aAJ/QbjCUxREmU
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2360 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2040 java.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2360 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2040 java.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2040 java.exe 2040 java.exe
Processes
-
C:\Windows\system32\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\howtowalk.jar1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2040
-
C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe"C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2360