Edit tour

Windows Analysis Report
meteor-rejects-1.21.3.jar

Overview

General Information

Sample name:meteor-rejects-1.21.3.jar
Analysis ID:1580054
MD5:5a27955d3774393cc4026d511ab05fb8
SHA1:8b4e310285cf0b31943ceb76f2396c6eb4494591
SHA256:f160b5b5fa0f7a9465affec68b9812529f264ea7848afbff0b771f7871654405
Infos:

Detection

Score:3
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Contains functionality to query CPU information (cpuid)
Creates a process in suspended mode (likely to inject code)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • cmd.exe (PID: 7560 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\meteor-rejects-1.21.3.jar"" >> C:\cmdlinestart.log 2>&1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
    • conhost.exe (PID: 7600 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • java.exe (PID: 7648 cmdline: "C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\meteor-rejects-1.21.3.jar" MD5: 9DAA53BAB2ECB33DC0D9CA51552701FA)
      • icacls.exe (PID: 7700 cmdline: C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M MD5: 2E49585E4E08565F52090B144062F97E)
        • conhost.exe (PID: 7712 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: java.exe, 00000002.00000002.1670320418.0000000009FF7000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1668627153.0000000004F2C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bugreport.sun.com/bugreport/
Source: java.exe, 00000002.00000002.1670320418.0000000009F50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://java.oracle.com/
Source: java.exe, 00000002.00000002.1671122976.0000000015230000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000002.1671122976.0000000015364000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000002.1668627153.0000000004E0D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.oracle.com/technetwork/java/javase/documentation/index.html
Source: classification engineClassification label: clean3.winJAR@7/3@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7712:120:WilError_03
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7600:120:WilError_03
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeFile created: C:\Users\user\AppData\Local\Temp\hsperfdata_userJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\meteor-rejects-1.21.3.jar"" >> C:\cmdlinestart.log 2>&1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\java.exe "C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\meteor-rejects-1.21.3.jar"
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
Source: C:\Windows\SysWOW64\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\java.exe "C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\meteor-rejects-1.21.3.jar" Jump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: winmm.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: version.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: wldp.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\icacls.exeSection loaded: ntmarta.dllJump to behavior
Source: meteor-rejects-1.21.3.jarStatic file information: File size 3157559 > 1048576
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0279A21B push ecx; ret 2_2_0279A225
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0279A20A push ecx; ret 2_2_0279A21A
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0279BB67 push 00000000h; mov dword ptr [esp], esp2_2_0279BB8D
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0279B3B7 push 00000000h; mov dword ptr [esp], esp2_2_0279B3DD
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0279B947 push 00000000h; mov dword ptr [esp], esp2_2_0279B96D
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0279C477 push 00000000h; mov dword ptr [esp], esp2_2_0279C49D
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: java.exe, 00000002.00000003.1657875893.0000000014E6D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: com/sun/corba/se/impl/util/SUNVMCID.classPK
Source: java.exe, 00000002.00000003.1657875893.0000000014E6D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &com/sun/corba/se/impl/util/SUNVMCID.classPK
Source: java.exe, 00000002.00000002.1667846200.0000000000E0B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [Ljava/lang/VirtualMachineError;
Source: java.exe, 00000002.00000003.1657875893.0000000014E6D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: org/omg/CORBA/OMGVMCID.classPK
Source: java.exe, 00000002.00000002.1667846200.0000000000E0B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: cjava/lang/VirtualMachineError
Source: java.exe, 00000002.00000003.1657875893.0000000014E6D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: java/lang/VirtualMachineError.classPK
Source: java.exe, 00000002.00000002.1667846200.0000000000E0B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeMemory protected: page read and write | page guardJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\java.exe "C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\meteor-rejects-1.21.3.jar" Jump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_027903C0 cpuid 2_2_027903C0
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\client\jvm.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Users\user\AppData\Local\Temp\hsperfdata_user\7648 VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\resources.jar VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\rt.jar VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\jsse.jar VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\jce.jar VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Users\user\AppData\Local\Temp\jartracer.jar VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Services File Permissions Weakness
1
Services File Permissions Weakness
1
Services File Permissions Weakness
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
11
Process Injection
1
Disable or Modify Tools
LSASS Memory21
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
11
Process Injection
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1580054 Sample: meteor-rejects-1.21.3.jar Startdate: 23/12/2024 Architecture: WINDOWS Score: 3 7 cmd.exe 2 2->7         started        process3 9 java.exe 9 7->9         started        11 conhost.exe 7->11         started        process4 13 icacls.exe 1 9->13         started        process5 15 conhost.exe 13->15         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://java.oracle.com/java.exe, 00000002.00000002.1670320418.0000000009F50000.00000004.00000800.00020000.00000000.sdmpfalse
    high
    http://www.oracle.com/technetwork/java/javase/documentation/index.htmljava.exe, 00000002.00000002.1671122976.0000000015230000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000002.1671122976.0000000015364000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000002.1668627153.0000000004E0D000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://bugreport.sun.com/bugreport/java.exe, 00000002.00000002.1670320418.0000000009FF7000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1668627153.0000000004F2C000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        No contacted IP infos
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1580054
        Start date and time:2024-12-23 20:13:07 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 2m 38s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:defaultwindowsfilecookbook.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:5
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • GSI enabled (Java)
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:meteor-rejects-1.21.3.jar
        Detection:CLEAN
        Classification:clean3.winJAR@7/3@0/0
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 10
        • Number of non-executed functions: 1
        Cookbook Comments:
        • Found application associated with file extension: .jar
        • Stop behavior analysis, all processes terminated
        • Execution Graph export aborted for target java.exe, PID 7648 because it is empty
        • Not all processes where analyzed, report is missing behavior information
        • Reached maximum number of file to list during submission archive extraction
        • Report size getting too big, too many NtSetInformationFile calls found.
        • VT rate limit hit for: meteor-rejects-1.21.3.jar
        No simulations
        No context
        No context
        No context
        No context
        No context
        Process:C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):52
        Entropy (8bit):4.858623612163837
        Encrypted:false
        SSDEEP:3:oFj4I5vpm4USKGt:oJ5bXt
        MD5:387BBB080901C3599E877707CFC87010
        SHA1:6BF0FE57F41D6D4CC8DC1C3ACAAE68F512C6C928
        SHA-256:22CD04D7DF5ED4C77D236FF9B3349E1E70E2F8A3F5F541EB570BBC61FE74BD51
        SHA-512:DFB2D8E9E514126DC30D21385F1E9015839CAEB2AD46773BA0C3CD062FCCC0009E70DD9A320BF457DCA1A141699CE7DFF6779158CE0BB7947F60C623316D2C60
        Malicious:false
        Reputation:low
        Preview:C:\Program Files (x86)\Java\jre-1.8..1734981238292..
        Process:C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
        File Type:data
        Category:dropped
        Size (bytes):65536
        Entropy (8bit):1.2919870478442728
        Encrypted:false
        SSDEEP:96:Qy3re9K8GFnxSBnj96elwuw0x+YbSTgHE19o2v:QyaI8GFxSBj96h0xnOsHEr
        MD5:7BB86DAB66DDCF0A55EC5F93DDFDC478
        SHA1:7A41FC6836D68932093231A913BDEFFBB87E9073
        SHA-256:9329E7D758C5011ED2FE1EA2B6F0A17DED8AE77421F02B512AB2DF75C0EC222B
        SHA-512:A910A19EFDF9B038D0C4AFD9326F9305F00BF6EFEB367C962DB1A7236E807BAFEAA2E1CBEE13ECA74B408017EBC445EB65F05FF4582366DAD13222C59141CE7D
        Malicious:false
        Reputation:low
        Preview:.........9.............. .......8...........J...0...sun.rt._sync_Inflations.............8...........J...0...sun.rt._sync_Deflations.............@...........J...8...sun.rt._sync_ContendedLockAttempts..........8...........J...0...sun.rt._sync_FutileWakeups..........0...........J...(...sun.rt._sync_Parks..........@...........J...8...sun.rt._sync_EmptyNotifications.............8...........J...0...sun.rt._sync_Notifications..........8...........J...0...sun.rt._sync_SlowEnter..............8...........J...0...sun.rt._sync_SlowExit...............8...........J...0...sun.rt._sync_SlowNotify.............8...........J...0...sun.rt._sync_SlowNotifyAll..........8...........J...0...sun.rt._sync_FailedSpins............@...........J...8...sun.rt._sync_SuccessfulSpins................8...........J...0...sun.rt._sync_PrivateA...............8...........J...0...sun.rt._sync_PrivateB...............@...........J...8...sun.rt._sync_MonInCirculation...............8...........J...0...sun.rt._sync_MonScavenged...
        Process:C:\Windows\SysWOW64\cmd.exe
        File Type:ASCII text, with CRLF line terminators
        Category:modified
        Size (bytes):81
        Entropy (8bit):4.503008417680776
        Encrypted:false
        SSDEEP:3:IRFEHLFIt+WfWIU6jp+ovn:soLFIwvIU+sy
        MD5:8E7D0DDE2570077539A75D6C4C0B7B52
        SHA1:77CF0C426E0BC2C6AE3B3A15A18BE7AE68C38C22
        SHA-256:133E11F00C8D565610672A4F7EA0D5958B6C5A211D102824FDC17CEF7CCD54A8
        SHA-512:5DA96F13CB27F52DEC54993DAC193C27A73A1C9623EDFAFD13A2FDCFA980F34AE4266CF06EA7D75EB2D5457D558838DC444B77A024FDEE3C572486AA914FB19A
        Malicious:false
        Reputation:low
        Preview:no main manifest attribute, in C:\Users\user\Desktop\meteor-rejects-1.21.3.jar..
        File type:Zip archive data, at least v2.0 to extract, compression method=deflate
        Entropy (8bit):7.960587491466695
        TrID:
        • Java Archive (13504/1) 62.80%
        • ZIP compressed archive (8000/1) 37.20%
        File name:meteor-rejects-1.21.3.jar
        File size:3'157'559 bytes
        MD5:5a27955d3774393cc4026d511ab05fb8
        SHA1:8b4e310285cf0b31943ceb76f2396c6eb4494591
        SHA256:f160b5b5fa0f7a9465affec68b9812529f264ea7848afbff0b771f7871654405
        SHA512:7751ea044f9df574adfdd133f075b592bab6f12b3ce4867b00f847a4ea5b8ffb8e683e24a722d1d1db27660d7eb058a55f6bab8e040f604c9063c4f2b25263ec
        SSDEEP:49152:q9Seki5EG57TmWFR8rIwej0rcJEr8XJb0lsvuj0kVI6jJVL3tlRTT6JSpbjDz:q9Oi51mTr9e0TrYClH93n5Tlz
        TLSH:49E502277DE4C07FD887A23395029192B95C07FBE005A0BF55EC0A7AD8E4D9B1361EDA
        File Content Preview:PK..........!.................META-INF/MANIFEST.MF]..j.@.......e..M.....J.C...k...?h]..>...._5.O3j.qOqP.$..k..tY....Q.(.0.j*s..)N..{.Z>.S_d1...e2.v...f.+....]M..$...o.'..4......a..m.....z<.0....[.@.cj..,.v.y.o.X.....ki..............un..HI...O.....=v....Q.
        Icon Hash:d08c8e8ea2868a54
        No network behavior found

        Click to jump to process

        Click to jump to process

        • File
        • Registry

        Click to dive into process behavior distribution

        Target ID:0
        Start time:14:13:57
        Start date:23/12/2024
        Path:C:\Windows\SysWOW64\cmd.exe
        Wow64 process (32bit):true
        Commandline:C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\meteor-rejects-1.21.3.jar"" >> C:\cmdlinestart.log 2>&1
        Imagebase:0x240000
        File size:236'544 bytes
        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:1
        Start time:14:13:57
        Start date:23/12/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff7699e0000
        File size:862'208 bytes
        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:2
        Start time:14:13:57
        Start date:23/12/2024
        Path:C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
        Wow64 process (32bit):true
        Commandline:"C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\meteor-rejects-1.21.3.jar"
        Imagebase:0x660000
        File size:257'664 bytes
        MD5 hash:9DAA53BAB2ECB33DC0D9CA51552701FA
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:moderate
        Has exited:true

        Target ID:3
        Start time:14:13:58
        Start date:23/12/2024
        Path:C:\Windows\SysWOW64\icacls.exe
        Wow64 process (32bit):true
        Commandline:C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
        Imagebase:0x420000
        File size:29'696 bytes
        MD5 hash:2E49585E4E08565F52090B144062F97E
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:4
        Start time:14:13:58
        Start date:23/12/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff7699e0000
        File size:862'208 bytes
        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Executed Functions

        Memory Dump Source
        • Source File: 00000002.00000002.1668154862.0000000002792000.00000040.00000800.00020000.00000000.sdmp, Offset: 02792000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_2792000_java.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 5f4f89a23a9e4134477bfe5e262569e9d3264b37ead8d3e2fc416f8ca3323b9c
        • Instruction ID: 2e11dfd05b384b2588c27905bd8a9cd53af8be9b6c2f262e96f4c089a9294afb
        • Opcode Fuzzy Hash: 5f4f89a23a9e4134477bfe5e262569e9d3264b37ead8d3e2fc416f8ca3323b9c
        • Instruction Fuzzy Hash: 6E8198B1A057019FDF29EF24E498BA9F7B1FF4A314F08819DC81A5B381CB34A854CB90
        Memory Dump Source
        • Source File: 00000002.00000002.1668154862.0000000002790000.00000040.00000800.00020000.00000000.sdmp, Offset: 02790000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_2790000_java.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 7136b1a887ebcf46663088706b07bc7f42f964a40d6b6a7d1c14517c00173864
        • Instruction ID: 4043fd927ccbd97d8e8f6674f7fced51f9e76e423fea38aaf1e0968def14bf76
        • Opcode Fuzzy Hash: 7136b1a887ebcf46663088706b07bc7f42f964a40d6b6a7d1c14517c00173864
        • Instruction Fuzzy Hash: 11115BB6D2032ADFCF14CF48D8854ADB7B0FB98324B568525DD65A3341D3386960CB91
        Memory Dump Source
        • Source File: 00000002.00000002.1668154862.0000000002790000.00000040.00000800.00020000.00000000.sdmp, Offset: 02790000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_2790000_java.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 4be0ce9cb52fcbc2f806d56877c71539509037a7cfd3b0b9ecff25b92bad8d2a
        • Instruction ID: e71a2761968e9c5c4f4b906f1db95e42ec73266e1104d6657d2ffd391221f560
        • Opcode Fuzzy Hash: 4be0ce9cb52fcbc2f806d56877c71539509037a7cfd3b0b9ecff25b92bad8d2a
        • Instruction Fuzzy Hash: 52F0A576C0026ADB8F54DF48D4811ADB7B1FB45228B1A8496DC6977341D332AD62CF91
        Memory Dump Source
        • Source File: 00000002.00000002.1668154862.0000000002792000.00000040.00000800.00020000.00000000.sdmp, Offset: 02792000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_2792000_java.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 9ccd5425f6eeed5672e701a7e93583f55e14db5d47f46ee84f679aebc561f397
        • Instruction ID: 6598e7726ec1d2647ecfc7a6aa44c3ab871be0f6d164da887a0d3c5ee594f377
        • Opcode Fuzzy Hash: 9ccd5425f6eeed5672e701a7e93583f55e14db5d47f46ee84f679aebc561f397
        • Instruction Fuzzy Hash: 27F0BCB5900A06EBEB258F24C0047EAF7B4BB88704F04460AD42C53310C3787429CBD0
        Memory Dump Source
        • Source File: 00000002.00000002.1668154862.0000000002792000.00000040.00000800.00020000.00000000.sdmp, Offset: 02792000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_2792000_java.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 82e860b0c9f41598e5325391dec4278b0731f1803e4d311ffd598789adbe8231
        • Instruction ID: 9dd0a8a9f6a4b9ac54cf5c73b251698b26cbf097b583e58bf32c6cbaebb5ab91
        • Opcode Fuzzy Hash: 82e860b0c9f41598e5325391dec4278b0731f1803e4d311ffd598789adbe8231
        • Instruction Fuzzy Hash: 64F07FB6900A06EBDB258F65C1047DAFBB4BB88718F14421AD42C57350D7787465CBC0
        Memory Dump Source
        • Source File: 00000002.00000002.1668154862.0000000002792000.00000040.00000800.00020000.00000000.sdmp, Offset: 02792000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_2792000_java.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: f584ec56a07843f978715b192167ae51d1809f37812ed481bba80b271e8b6a6d
        • Instruction ID: 6bb2148be38e1ffd564719118d16108b4eded4881af238849dd88e8a5bdd069f
        • Opcode Fuzzy Hash: f584ec56a07843f978715b192167ae51d1809f37812ed481bba80b271e8b6a6d
        • Instruction Fuzzy Hash: C6F09BB6A14B06EBDB29CF65C1047DAFBB4BB88718F15421AC42C67750D778B469CBC0
        Memory Dump Source
        • Source File: 00000002.00000002.1668154862.0000000002792000.00000040.00000800.00020000.00000000.sdmp, Offset: 02792000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_2792000_java.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 4648c369302c633b08d61c8f6477819d0998ae3dc8aeeb03a0a67dd5170f4c44
        • Instruction ID: fa40b1ef7e8ad76a4d6d80b7caf81601818a94496d7a39268f44a547939d3f2e
        • Opcode Fuzzy Hash: 4648c369302c633b08d61c8f6477819d0998ae3dc8aeeb03a0a67dd5170f4c44
        • Instruction Fuzzy Hash: 3CF0C2B6D00B06ABDB248F65C1047DAFBB4BB48714F14461AC42C63310D3787465CBC0
        Memory Dump Source
        • Source File: 00000002.00000002.1668154862.0000000002792000.00000040.00000800.00020000.00000000.sdmp, Offset: 02792000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_2792000_java.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 9acf410a6b06f8aee001d3d0c94b84e4d28b980d249ba8bd96f3f3308695f1ae
        • Instruction ID: f8c1b1a4e2214a4c0f251e1ac971e7884eedd3dc14bd75174d38968e616d2bf7
        • Opcode Fuzzy Hash: 9acf410a6b06f8aee001d3d0c94b84e4d28b980d249ba8bd96f3f3308695f1ae
        • Instruction Fuzzy Hash: 24F0CAB6D00A0AABDB248F65C1047DAFBB4BB88714F14461AC42C67320E378B469CBC0
        Memory Dump Source
        • Source File: 00000002.00000002.1668154862.0000000002792000.00000040.00000800.00020000.00000000.sdmp, Offset: 02792000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_2792000_java.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 88ee98c30a9d6e2c904e83dc0bf54ffff42846fd607a94fb270edd0e99cc89d3
        • Instruction ID: fd89805c6fdc1e9562b32f4d4f794467ab9e5665702518900addef4654e565ab
        • Opcode Fuzzy Hash: 88ee98c30a9d6e2c904e83dc0bf54ffff42846fd607a94fb270edd0e99cc89d3
        • Instruction Fuzzy Hash: 50F0C2B6D00A06ABDB248F65C1047DAFBB4BB48714F14461AC52C63310D3787465CBC0
        Memory Dump Source
        • Source File: 00000002.00000002.1668154862.0000000002792000.00000040.00000800.00020000.00000000.sdmp, Offset: 02792000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_2792000_java.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 5ec507ef5f76994364c84553e8439645a443120e4d8d00e4a4712bedffb1dbdc
        • Instruction ID: 71b3cc0b9416c37d8b7f3eaf1b90e2a7752a50f704b0968499f82815143ebf6b
        • Opcode Fuzzy Hash: 5ec507ef5f76994364c84553e8439645a443120e4d8d00e4a4712bedffb1dbdc
        • Instruction Fuzzy Hash: F4F0CAB6D00A0AABDB24CF61C10439AFBB0BB88B18F14422AC42C63710C378B865CFC0

        Non-executed Functions

        Memory Dump Source
        • Source File: 00000002.00000002.1668154862.0000000002790000.00000040.00000800.00020000.00000000.sdmp, Offset: 02790000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_2790000_java.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a012a9fb5cf5d9e1554885d89a3030425dd9bcc3e3bcfa4e280c99466c7885fc
        • Instruction ID: 6143f804da18813e045217a6b8ccf7ad278d9380312c89a78cf28a1d541bb54a
        • Opcode Fuzzy Hash: a012a9fb5cf5d9e1554885d89a3030425dd9bcc3e3bcfa4e280c99466c7885fc
        • Instruction Fuzzy Hash: 742103BA5182568FEF358F199C403D9B7E5FB09314F21482EDEC9E7710D3306A898B90