Analysis

  • max time kernel
    144s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    21-07-2024 20:26

General

  • Target

    vnc-E4_2_8-x86_linux/java/vncviewer.jar

  • Size

    133KB

  • MD5

    df8b653d6109fd0980dcd5c8b22aef79

  • SHA1

    7abfa25c6ddd7bd0cf6dcc5d1ae27b5db286f5a3

  • SHA256

    fc21ef07868f1a13f4cf464bcb9edd2e1345bd7a8ab0ca3a85017dfac32edc50

  • SHA512

    fb0a11b885d7b6340528443bcafcdb58cee1dd842d37bfe830595b8d92f73cb0377328787e0a0c7377a4081a492d8a28fe48ab5ef2de7fb550dbad021abc2a05

  • SSDEEP

    3072:Jvujr+87n5hMWT9ckbJzS4LoiRGi2+Ub/HrV/mve5o0o+Es1/W1PBQKm:lpM5iGckbdEibWhmve5DoZI/uPBQ5

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Windows\system32\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\vnc-E4_2_8-x86_linux\java\vncviewer.jar
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2852

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2852-2-0x0000000002680000-0x00000000028F0000-memory.dmp

    Filesize

    2.4MB

  • memory/2852-16-0x0000000000370000-0x000000000037A000-memory.dmp

    Filesize

    40KB

  • memory/2852-15-0x0000000000370000-0x000000000037A000-memory.dmp

    Filesize

    40KB

  • memory/2852-18-0x0000000000140000-0x0000000000141000-memory.dmp

    Filesize

    4KB

  • memory/2852-19-0x0000000002680000-0x00000000028F0000-memory.dmp

    Filesize

    2.4MB

  • memory/2852-20-0x0000000000370000-0x000000000037A000-memory.dmp

    Filesize

    40KB

  • memory/2852-21-0x0000000000370000-0x000000000037A000-memory.dmp

    Filesize

    40KB