Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 01:33
Static task
static1
Behavioral task
behavioral1
Sample
86ed3f6b929d8a7aef13561905558421e02644e0c608355fb0fca16376be4245.jnlp
Resource
win7-20240704-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
86ed3f6b929d8a7aef13561905558421e02644e0c608355fb0fca16376be4245.jnlp
Resource
win10v2004-20240704-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
86ed3f6b929d8a7aef13561905558421e02644e0c608355fb0fca16376be4245.jnlp
-
Size
1KB
-
MD5
d62700c2dcd03fc6f1629b1dee2159ea
-
SHA1
d75b66ad83352335cac79e9bb24e0e8ccab09980
-
SHA256
86ed3f6b929d8a7aef13561905558421e02644e0c608355fb0fca16376be4245
-
SHA512
6f40966926df9edbb27e9d9ed1821e22963a3b30cf633b1c0ebc966a82728e1f5943dd25fc01087d24ac974b814801252d0c5d7e6ae91cd09913cdd82f3ec470
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4820 javaws.exe 4820 javaws.exe 4820 javaws.exe 4820 javaws.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4040 wrote to memory of 4820 4040 jp2launcher.exe 82 PID 4040 wrote to memory of 4820 4040 jp2launcher.exe 82
Processes
-
C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe"C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe" -securejws "C:\Users\Admin\AppData\Local\Temp\86ed3f6b929d8a7aef13561905558421e02644e0c608355fb0fca16376be4245.jnlp"1⤵
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Program Files\Java\jre-1.8\bin\javaws.exe"C:\Program Files\Java\jre-1.8\bin\javaws.exe" "C:\Users\Admin\AppData\Local\Temp\86ed3f6b929d8a7aef13561905558421e02644e0c608355fb0fca16376be4245.jnlp"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4820
-