Analysis

  • max time kernel
    66s
  • max time network
    66s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2025, 02:06

General

  • Target

    f.jar

  • Size

    639KB

  • MD5

    49e1758fe474c3810ec7f32833a06919

  • SHA1

    53fc363ca9b6541aab9ad71f89bdb17a2425ef7d

  • SHA256

    5904e8c5fd4ea73f3bc6523ce6293a1d1727e0eaddbda547e3478e0059a2739a

  • SHA512

    410a2b7fb833c84dc45b356ff4889ddc96ba26acfa79705c97f997a12efd17c402b08f0e24398f0a2a5fcb2e6887bc35d60b48f65f926fa23b272b9baad33731

  • SSDEEP

    12288:1flOQA/UecLeT4HmQKV/gI/9Rf+ZQ2NCh1g0ByRev32uA2ZMS73D0S:1foQMsLK4Gj/gIna5Ch6uz2uNZP73D0S

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\f.jar
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1732-2-0x000001EA62890000-0x000001EA62B00000-memory.dmp

    Filesize

    2.4MB

  • memory/1732-15-0x000001EA62B00000-0x000001EA62B10000-memory.dmp

    Filesize

    64KB

  • memory/1732-17-0x000001EA62B10000-0x000001EA62B20000-memory.dmp

    Filesize

    64KB

  • memory/1732-19-0x000001EA62B20000-0x000001EA62B30000-memory.dmp

    Filesize

    64KB

  • memory/1732-21-0x000001EA62B30000-0x000001EA62B40000-memory.dmp

    Filesize

    64KB

  • memory/1732-23-0x000001EA62B40000-0x000001EA62B50000-memory.dmp

    Filesize

    64KB

  • memory/1732-25-0x000001EA62B50000-0x000001EA62B60000-memory.dmp

    Filesize

    64KB

  • memory/1732-27-0x000001EA62B60000-0x000001EA62B70000-memory.dmp

    Filesize

    64KB

  • memory/1732-29-0x000001EA62B70000-0x000001EA62B80000-memory.dmp

    Filesize

    64KB

  • memory/1732-31-0x000001EA62B80000-0x000001EA62B90000-memory.dmp

    Filesize

    64KB

  • memory/1732-34-0x000001EA61020000-0x000001EA61021000-memory.dmp

    Filesize

    4KB

  • memory/1732-35-0x000001EA62890000-0x000001EA62B00000-memory.dmp

    Filesize

    2.4MB

  • memory/1732-36-0x000001EA62B00000-0x000001EA62B10000-memory.dmp

    Filesize

    64KB

  • memory/1732-37-0x000001EA61020000-0x000001EA61021000-memory.dmp

    Filesize

    4KB

  • memory/1732-38-0x000001EA62B10000-0x000001EA62B20000-memory.dmp

    Filesize

    64KB

  • memory/1732-40-0x000001EA62B20000-0x000001EA62B30000-memory.dmp

    Filesize

    64KB

  • memory/1732-44-0x000001EA62B90000-0x000001EA62BA0000-memory.dmp

    Filesize

    64KB

  • memory/1732-43-0x000001EA62B30000-0x000001EA62B40000-memory.dmp

    Filesize

    64KB

  • memory/1732-46-0x000001EA62B40000-0x000001EA62B50000-memory.dmp

    Filesize

    64KB

  • memory/1732-47-0x000001EA62B50000-0x000001EA62B60000-memory.dmp

    Filesize

    64KB

  • memory/1732-48-0x000001EA62B60000-0x000001EA62B70000-memory.dmp

    Filesize

    64KB

  • memory/1732-49-0x000001EA62B70000-0x000001EA62B80000-memory.dmp

    Filesize

    64KB

  • memory/1732-50-0x000001EA62B80000-0x000001EA62B90000-memory.dmp

    Filesize

    64KB

  • memory/1732-51-0x000001EA62B90000-0x000001EA62BA0000-memory.dmp

    Filesize

    64KB

  • memory/1732-53-0x000001EA62BA0000-0x000001EA62BB0000-memory.dmp

    Filesize

    64KB

  • memory/1732-54-0x000001EA62BA0000-0x000001EA62BB0000-memory.dmp

    Filesize

    64KB