Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/10/2024, 01:57

General

  • Target

    6c414041337a3476884520fa621e0595795c803b97dfd50a0dd846d34c2f88a6.jar

  • Size

    639KB

  • MD5

    51607dbb12eb4cf923070eeb71fb6388

  • SHA1

    124bd33bb4c0f620c6db0af14fe7f6405efd7a32

  • SHA256

    6c414041337a3476884520fa621e0595795c803b97dfd50a0dd846d34c2f88a6

  • SHA512

    bb8c48d41ac136e67a16191ae212f717037e0387fa0cf8464818df60e729f5cc775fa84cb0f91a3ce2f33fac64a06b20479eb5780dadada231ba62d1bc762c46

  • SSDEEP

    12288:Evv7QP/Z9f+5l41bEr6fga/HRn+N1ANOfMgO1SRX23MuI25kScpDoC:EvjQXL+X45bfga5e4Ofxw9Mul53cpDoC

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\6c414041337a3476884520fa621e0595795c803b97dfd50a0dd846d34c2f88a6.jar
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4200

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4200-2-0x0000019C80000000-0x0000019C80270000-memory.dmp

    Filesize

    2.4MB

  • memory/4200-17-0x0000019C80280000-0x0000019C80290000-memory.dmp

    Filesize

    64KB

  • memory/4200-16-0x0000019C80270000-0x0000019C80280000-memory.dmp

    Filesize

    64KB

  • memory/4200-19-0x0000019C80290000-0x0000019C802A0000-memory.dmp

    Filesize

    64KB

  • memory/4200-22-0x0000019C802A0000-0x0000019C802B0000-memory.dmp

    Filesize

    64KB

  • memory/4200-23-0x0000019C802B0000-0x0000019C802C0000-memory.dmp

    Filesize

    64KB

  • memory/4200-25-0x0000019C802C0000-0x0000019C802D0000-memory.dmp

    Filesize

    64KB

  • memory/4200-27-0x0000019C802D0000-0x0000019C802E0000-memory.dmp

    Filesize

    64KB

  • memory/4200-29-0x0000019C802E0000-0x0000019C802F0000-memory.dmp

    Filesize

    64KB

  • memory/4200-33-0x0000019C802F0000-0x0000019C80300000-memory.dmp

    Filesize

    64KB

  • memory/4200-34-0x0000019CF4740000-0x0000019CF4741000-memory.dmp

    Filesize

    4KB

  • memory/4200-35-0x0000019C80000000-0x0000019C80270000-memory.dmp

    Filesize

    2.4MB

  • memory/4200-36-0x0000019C80270000-0x0000019C80280000-memory.dmp

    Filesize

    64KB

  • memory/4200-37-0x0000019C80280000-0x0000019C80290000-memory.dmp

    Filesize

    64KB

  • memory/4200-38-0x0000019CF4740000-0x0000019CF4741000-memory.dmp

    Filesize

    4KB

  • memory/4200-39-0x0000019C80290000-0x0000019C802A0000-memory.dmp

    Filesize

    64KB

  • memory/4200-40-0x0000019C802A0000-0x0000019C802B0000-memory.dmp

    Filesize

    64KB

  • memory/4200-41-0x0000019C802B0000-0x0000019C802C0000-memory.dmp

    Filesize

    64KB

  • memory/4200-42-0x0000019C802C0000-0x0000019C802D0000-memory.dmp

    Filesize

    64KB

  • memory/4200-43-0x0000019C802D0000-0x0000019C802E0000-memory.dmp

    Filesize

    64KB

  • memory/4200-44-0x0000019C802E0000-0x0000019C802F0000-memory.dmp

    Filesize

    64KB

  • memory/4200-45-0x0000019C802F0000-0x0000019C80300000-memory.dmp

    Filesize

    64KB

  • memory/4200-48-0x0000019C80300000-0x0000019C80310000-memory.dmp

    Filesize

    64KB