Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2024, 09:00

General

  • Target

    22.07.2024SPAR.jar

  • Size

    504KB

  • MD5

    b074d7a57997c0c56da67434ca035192

  • SHA1

    04417884237be7c1dbd0f61906bd386b44db84b9

  • SHA256

    213c6520ccf333f56a1efa03db040d091b4b435208131747a3faa4868bec6e9e

  • SHA512

    f142bc11bb726ebcbbb483a166ed05363d878eff0d48f9f9f64a5992b64578a0c0467ce00fdc4992b5135513765e26afe4af222640bf67ffd00d5ca7f6bbeea5

  • SSDEEP

    12288:1FzcKx1SJ2g5Hws6Lm1ohTH4m4J80/WkNfc67xBOxZo/q:1xcKx1A75Hv6hf4quNkk3Yj

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\22.07.2024SPAR.jar
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    PID:3476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3476-2-0x00000188BDDA0000-0x00000188BE010000-memory.dmp

    Filesize

    2.4MB

  • memory/3476-21-0x00000188BC540000-0x00000188BC541000-memory.dmp

    Filesize

    4KB

  • memory/3476-28-0x00000188BE010000-0x00000188BE020000-memory.dmp

    Filesize

    64KB

  • memory/3476-32-0x00000188BE020000-0x00000188BE030000-memory.dmp

    Filesize

    64KB

  • memory/3476-33-0x00000188BE030000-0x00000188BE040000-memory.dmp

    Filesize

    64KB

  • memory/3476-35-0x00000188BE040000-0x00000188BE050000-memory.dmp

    Filesize

    64KB

  • memory/3476-38-0x00000188BE050000-0x00000188BE060000-memory.dmp

    Filesize

    64KB

  • memory/3476-40-0x00000188BDDA0000-0x00000188BE010000-memory.dmp

    Filesize

    2.4MB

  • memory/3476-41-0x00000188BE060000-0x00000188BE070000-memory.dmp

    Filesize

    64KB

  • memory/3476-43-0x00000188BE070000-0x00000188BE080000-memory.dmp

    Filesize

    64KB

  • memory/3476-47-0x00000188BC540000-0x00000188BC541000-memory.dmp

    Filesize

    4KB

  • memory/3476-50-0x00000188BE080000-0x00000188BE090000-memory.dmp

    Filesize

    64KB

  • memory/3476-52-0x00000188BE090000-0x00000188BE0A0000-memory.dmp

    Filesize

    64KB

  • memory/3476-62-0x00000188BC540000-0x00000188BC541000-memory.dmp

    Filesize

    4KB

  • memory/3476-63-0x00000188BC540000-0x00000188BC541000-memory.dmp

    Filesize

    4KB

  • memory/3476-68-0x00000188BE040000-0x00000188BE050000-memory.dmp

    Filesize

    64KB

  • memory/3476-73-0x00000188BE090000-0x00000188BE0A0000-memory.dmp

    Filesize

    64KB

  • memory/3476-72-0x00000188BE080000-0x00000188BE090000-memory.dmp

    Filesize

    64KB

  • memory/3476-71-0x00000188BE070000-0x00000188BE080000-memory.dmp

    Filesize

    64KB

  • memory/3476-70-0x00000188BE060000-0x00000188BE070000-memory.dmp

    Filesize

    64KB

  • memory/3476-69-0x00000188BE050000-0x00000188BE060000-memory.dmp

    Filesize

    64KB

  • memory/3476-67-0x00000188BE030000-0x00000188BE040000-memory.dmp

    Filesize

    64KB

  • memory/3476-66-0x00000188BE020000-0x00000188BE030000-memory.dmp

    Filesize

    64KB

  • memory/3476-65-0x00000188BE010000-0x00000188BE020000-memory.dmp

    Filesize

    64KB

  • memory/3476-64-0x00000188BDDA0000-0x00000188BE010000-memory.dmp

    Filesize

    2.4MB