Analysis

  • max time kernel
    136s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-02-2025 02:04

General

  • Target

    ezzzz.jar

  • Size

    639KB

  • MD5

    c39bc4d948253f16331744d5b29e9c3a

  • SHA1

    72ba44754a6a00aacf99ad0c8d854e0459aa7c8c

  • SHA256

    198c535340bf87d79d2d3055fc625567877ff509638fe8a69029ea1092c0a022

  • SHA512

    7486d2bfd7ee5dea6b6616e340961357c03bfa12a2f590b4384b858fa654cd42d1ec165010f1745f20d7cc8c004305b4dc4c3d3f1b23e630103bfbb78ab3cabc

  • SSDEEP

    12288:lj5KQ4/oaY/G/4b+0O13gw/VRr+RkGNWJdgE1mRmP3iu42BwSHnDAR:lj4Q0E/O4qv3gwv+dWJCaLiu1BLHnDAR

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\ezzzz.jar
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3684

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3684-2-0x000001BBDEE10000-0x000001BBDF080000-memory.dmp

    Filesize

    2.4MB

  • memory/3684-17-0x000001BBDF090000-0x000001BBDF0A0000-memory.dmp

    Filesize

    64KB

  • memory/3684-16-0x000001BBDF080000-0x000001BBDF090000-memory.dmp

    Filesize

    64KB

  • memory/3684-19-0x000001BBDF0A0000-0x000001BBDF0B0000-memory.dmp

    Filesize

    64KB

  • memory/3684-21-0x000001BBDF0B0000-0x000001BBDF0C0000-memory.dmp

    Filesize

    64KB

  • memory/3684-23-0x000001BBDF0C0000-0x000001BBDF0D0000-memory.dmp

    Filesize

    64KB

  • memory/3684-25-0x000001BBDF0D0000-0x000001BBDF0E0000-memory.dmp

    Filesize

    64KB

  • memory/3684-27-0x000001BBDF0E0000-0x000001BBDF0F0000-memory.dmp

    Filesize

    64KB

  • memory/3684-29-0x000001BBDF0F0000-0x000001BBDF100000-memory.dmp

    Filesize

    64KB

  • memory/3684-32-0x000001BBDD540000-0x000001BBDD541000-memory.dmp

    Filesize

    4KB

  • memory/3684-33-0x000001BBDD540000-0x000001BBDD541000-memory.dmp

    Filesize

    4KB

  • memory/3684-34-0x000001BBDEE10000-0x000001BBDF080000-memory.dmp

    Filesize

    2.4MB

  • memory/3684-35-0x000001BBDF080000-0x000001BBDF090000-memory.dmp

    Filesize

    64KB

  • memory/3684-36-0x000001BBDF090000-0x000001BBDF0A0000-memory.dmp

    Filesize

    64KB

  • memory/3684-38-0x000001BBDF0A0000-0x000001BBDF0B0000-memory.dmp

    Filesize

    64KB

  • memory/3684-39-0x000001BBDF0B0000-0x000001BBDF0C0000-memory.dmp

    Filesize

    64KB

  • memory/3684-40-0x000001BBDF0C0000-0x000001BBDF0D0000-memory.dmp

    Filesize

    64KB

  • memory/3684-41-0x000001BBDF0D0000-0x000001BBDF0E0000-memory.dmp

    Filesize

    64KB

  • memory/3684-42-0x000001BBDF0E0000-0x000001BBDF0F0000-memory.dmp

    Filesize

    64KB

  • memory/3684-43-0x000001BBDF0F0000-0x000001BBDF100000-memory.dmp

    Filesize

    64KB

  • memory/3684-46-0x000001BBDF100000-0x000001BBDF110000-memory.dmp

    Filesize

    64KB

  • memory/3684-48-0x000001BBDF100000-0x000001BBDF110000-memory.dmp

    Filesize

    64KB