Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-12-2024 23:44

General

  • Target

    whyjar.jar

  • Size

    639KB

  • MD5

    adc58b3fc933834da57de541a91087ca

  • SHA1

    e73c57e5eb534cb7f39c4792cbb0db7e42e7a07a

  • SHA256

    3bb9cf2f060d94e9dff4c0ed4c49b642f3b881801f59446f5ec436b981a16459

  • SHA512

    ce301f1bd6f1954866aa8978b5475fee83ed377e2080c239918620877803f57b1cbb94ae5f798a0de362ca0e5ed6079a4b6ebde716f879349d9576c504ce170c

  • SSDEEP

    12288:OTrpQB/D7dMrJ4xR4NE7gq/PRb+RrUN2XqgStCRtk3cuI2VoSi9DM9:OTlQx1MF4nD7gqRWC2XL0RculVzi9DM9

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\whyjar.jar
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4756

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4756-2-0x0000026B67B00000-0x0000026B67D70000-memory.dmp

    Filesize

    2.4MB

  • memory/4756-15-0x0000026B67D70000-0x0000026B67D80000-memory.dmp

    Filesize

    64KB

  • memory/4756-18-0x0000026B67D80000-0x0000026B67D90000-memory.dmp

    Filesize

    64KB

  • memory/4756-19-0x0000026B67D90000-0x0000026B67DA0000-memory.dmp

    Filesize

    64KB

  • memory/4756-23-0x0000026B67DB0000-0x0000026B67DC0000-memory.dmp

    Filesize

    64KB

  • memory/4756-22-0x0000026B67DA0000-0x0000026B67DB0000-memory.dmp

    Filesize

    64KB

  • memory/4756-25-0x0000026B67DC0000-0x0000026B67DD0000-memory.dmp

    Filesize

    64KB

  • memory/4756-27-0x0000026B67DD0000-0x0000026B67DE0000-memory.dmp

    Filesize

    64KB

  • memory/4756-29-0x0000026B67DE0000-0x0000026B67DF0000-memory.dmp

    Filesize

    64KB

  • memory/4756-31-0x0000026B67DF0000-0x0000026B67E00000-memory.dmp

    Filesize

    64KB

  • memory/4756-34-0x0000026B66200000-0x0000026B66201000-memory.dmp

    Filesize

    4KB

  • memory/4756-35-0x0000026B67B00000-0x0000026B67D70000-memory.dmp

    Filesize

    2.4MB

  • memory/4756-36-0x0000026B67D70000-0x0000026B67D80000-memory.dmp

    Filesize

    64KB

  • memory/4756-37-0x0000026B67D80000-0x0000026B67D90000-memory.dmp

    Filesize

    64KB

  • memory/4756-38-0x0000026B66200000-0x0000026B66201000-memory.dmp

    Filesize

    4KB

  • memory/4756-39-0x0000026B67D90000-0x0000026B67DA0000-memory.dmp

    Filesize

    64KB

  • memory/4756-41-0x0000026B67DB0000-0x0000026B67DC0000-memory.dmp

    Filesize

    64KB

  • memory/4756-40-0x0000026B67DA0000-0x0000026B67DB0000-memory.dmp

    Filesize

    64KB

  • memory/4756-42-0x0000026B67DC0000-0x0000026B67DD0000-memory.dmp

    Filesize

    64KB

  • memory/4756-43-0x0000026B67DD0000-0x0000026B67DE0000-memory.dmp

    Filesize

    64KB

  • memory/4756-44-0x0000026B67DE0000-0x0000026B67DF0000-memory.dmp

    Filesize

    64KB

  • memory/4756-45-0x0000026B67DF0000-0x0000026B67E00000-memory.dmp

    Filesize

    64KB

  • memory/4756-48-0x0000026B67E00000-0x0000026B67E10000-memory.dmp

    Filesize

    64KB

  • memory/4756-50-0x0000026B67E10000-0x0000026B67E20000-memory.dmp

    Filesize

    64KB

  • memory/4756-51-0x0000026B66200000-0x0000026B66201000-memory.dmp

    Filesize

    4KB

  • memory/4756-52-0x0000026B67E00000-0x0000026B67E10000-memory.dmp

    Filesize

    64KB

  • memory/4756-53-0x0000026B67E10000-0x0000026B67E20000-memory.dmp

    Filesize

    64KB