Analysis

  • max time kernel
    141s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02/06/2024, 16:01 UTC

General

  • Target

    DroidJack/DroidJack.jar

  • Size

    1.5MB

  • MD5

    9ab786c7154b2e24704681de5ed5d7ac

  • SHA1

    b1d68ff75291581effc55935914247917435910f

  • SHA256

    e466991f74d8a2d9345d0172b1966d07345b6f315f59ce63a44ad74a62ed1869

  • SHA512

    92a13592f9f4b7a8214990e57112d0fc3607fe84d44deda5294796ae5bbd5f235d6c467a124b44c5372469dce6e5f9e77b31e45f4da9d9089455b3f6d623990c

  • SSDEEP

    12288:HqS40FnjsDB6+awgOUYu+UmZKKjHZVR2dPPzeal8a0VnxcHkUq686P837us9jpSm:7Bg+jEwK8dPPzearfH1q68U8V7SeI6v

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Windows\system32\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\DroidJack\DroidJack.jar
    1⤵
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2932

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\sqlite-3.7.2-sqlitejdbc.dll

    Filesize

    503KB

    MD5

    e5b43485d986cfeca401f10e9268c85a

    SHA1

    a7001eae35ab841e1deaf5db433c288bd73eaab3

    SHA256

    d73671e898c64fb357766fa06157fee72729c9f3dea55e0abefd23d5c6798022

    SHA512

    fb384ebd312c3e1f0474a2624ef93989851d4c5f29a12dd28d4fd20387179722017e1c8d61d052f22ce449090a8793ea7917ed05a8dfd99c448705359d29fcd8

  • memory/2932-23-0x0000000000440000-0x0000000000441000-memory.dmp

    Filesize

    4KB

  • memory/2932-15-0x00000000020B0000-0x00000000020BA000-memory.dmp

    Filesize

    40KB

  • memory/2932-2-0x0000000002560000-0x00000000027D0000-memory.dmp

    Filesize

    2.4MB

  • memory/2932-26-0x0000000000440000-0x0000000000441000-memory.dmp

    Filesize

    4KB

  • memory/2932-40-0x0000000000440000-0x0000000000441000-memory.dmp

    Filesize

    4KB

  • memory/2932-16-0x00000000020B0000-0x00000000020BA000-memory.dmp

    Filesize

    40KB

  • memory/2932-68-0x0000000000440000-0x0000000000441000-memory.dmp

    Filesize

    4KB

  • memory/2932-80-0x0000000000440000-0x0000000000441000-memory.dmp

    Filesize

    4KB

  • memory/2932-83-0x0000000000440000-0x0000000000441000-memory.dmp

    Filesize

    4KB

  • memory/2932-85-0x0000000000440000-0x0000000000441000-memory.dmp

    Filesize

    4KB

  • memory/2932-174-0x0000000002560000-0x00000000027D0000-memory.dmp

    Filesize

    2.4MB

  • memory/2932-176-0x00000000020B0000-0x00000000020BA000-memory.dmp

    Filesize

    40KB

  • memory/2932-175-0x00000000020B0000-0x00000000020BA000-memory.dmp

    Filesize

    40KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.