Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2024, 14:37

General

  • Target

    185.jar

  • Size

    14.5MB

  • MD5

    29fd6772aafb08c90b1ff9a91f48ecff

  • SHA1

    39628a8412e0a14126da2bfa5fbe7af5069e1eec

  • SHA256

    287e892aeb4be05c881e19da227d0398cd321d5a9af837932c12dfaab641b4cb

  • SHA512

    4d75584621d843d16ed97986e123be2751478e8047ac43a8a722daa3a548a2833293f0cc86ae9c229b4a2df2ae9a69e7e3ce3333da3696c48a4712d52950173e

  • SSDEEP

    393216:hU+MrvMUXlIm0QEiK4JISelo4pOT0w03Bl:hSIelIvgJYlIIF3/

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Windows\system32\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\185.jar
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1680

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1680-2-0x0000000002430000-0x00000000026A0000-memory.dmp

    Filesize

    2.4MB

  • memory/1680-14-0x0000000000280000-0x000000000028A000-memory.dmp

    Filesize

    40KB

  • memory/1680-13-0x0000000000280000-0x000000000028A000-memory.dmp

    Filesize

    40KB

  • memory/1680-16-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/1680-26-0x0000000002430000-0x00000000026A0000-memory.dmp

    Filesize

    2.4MB

  • memory/1680-27-0x0000000000280000-0x000000000028A000-memory.dmp

    Filesize

    40KB

  • memory/1680-28-0x0000000000280000-0x000000000028A000-memory.dmp

    Filesize

    40KB