Analysis
-
max time kernel
92s -
max time network
100s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
22/10/2024, 22:31
Behavioral task
behavioral1
Sample
zararli.jar
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
zararli.jar
Resource
win10-20240611-en
Behavioral task
behavioral3
Sample
zararli.jar
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
zararli.jar
Resource
win11-20241007-en
General
-
Target
zararli.jar
-
Size
443KB
-
MD5
c920884d4661a437fabfe9b327270fc1
-
SHA1
a7b5c2521ee8bb7b1b4c26e653a35398b6a2d341
-
SHA256
b499348a0d129cbed646d0c92c25af5f640474ddfc5655ab86ece8e99f6934cf
-
SHA512
33659c9745df93f24161124e9644ae7cefce68d924669ea44c4c93b829b9215a7eb26ff4b89cb96ebb519da59838c486b28c425f64b03bf8f41791468af13435
-
SSDEEP
12288:dZM7f1YoGr1NCSmTSosn5/5kYsTfite02bvzeiDFRC:duT6oGhNKfsnpOfj5DPC
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 java.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString java.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\ java.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName java.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer java.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1392 java.exe