Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Swift Transaction Report.js

Overview

General Information

Sample name:Swift Transaction Report.js
Analysis ID:1585123
MD5:e865de0263ada94ea596fce4efd89ad0
SHA1:96447cbcae6c1af91dd19587f729ec6cdddabc54
SHA256:701435e822a78b82d53281af3ffb20b3732462ec99c6f36afdfc6f8eed4123f9
Infos:

Detection

Branchlock Obfuscator
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

JScript performs obfuscated calls to suspicious functions
Multi AV Scanner detection for submitted file
Yara detected Branchlock Obfuscator
Exploit detected, runtime environment starts unknown processes
Potential obfuscated javascript found
Sigma detected: WScript or CScript Dropper
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Contains functionality to detect virtual machines (SLDT)
Contains functionality to query CPU information (cpuid)
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found inlined nop instructions (likely shell or obfuscated code)
Java / VBScript file with very long strings (likely obfuscated code)
JavaScript source code contains large arrays or strings with random content potentially encoding malicious code
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • wscript.exe (PID: 7408 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Swift Transaction Report.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • java.exe (PID: 7736 cmdline: "C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe" -version MD5: 9DAA53BAB2ECB33DC0D9CA51552701FA)
      • conhost.exe (PID: 7744 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • icacls.exe (PID: 7820 cmdline: C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M MD5: 2E49585E4E08565F52090B144062F97E)
        • conhost.exe (PID: 7828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • javaw.exe (PID: 7876 cmdline: "C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe" -jar "C:\Users\user\AppData\Local\Temp\Swift Confirmation Copy.jar" MD5: 6E0F4F812AE02FBCB744A929E74A04B8)
      • tasklist.exe (PID: 7928 cmdline: tasklist.exe MD5: 0A4448B31CE7F83CB7691A2657F330F1)
        • conhost.exe (PID: 7936 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\Swift Confirmation Copy.jarJoeSecurity_BranchlockObfuscatorYara detected Branchlock ObfuscatorJoe Security
    SourceRuleDescriptionAuthorStrings
    00000006.00000002.1940846931.0000000014F46000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BranchlockObfuscatorYara detected Branchlock ObfuscatorJoe Security
      00000006.00000003.1894398279.0000000000CB5000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BranchlockObfuscatorYara detected Branchlock ObfuscatorJoe Security
        Process Memory Space: javaw.exe PID: 7876JoeSecurity_BranchlockObfuscatorYara detected Branchlock ObfuscatorJoe Security

          System Summary

          barindex
          Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Swift Transaction Report.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Swift Transaction Report.js", CommandLine|base64offset|contains: N-, Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Swift Transaction Report.js", ProcessId: 7408, ProcessName: wscript.exe
          Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Swift Transaction Report.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Swift Transaction Report.js", CommandLine|base64offset|contains: N-, Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Swift Transaction Report.js", ProcessId: 7408, ProcessName: wscript.exe
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: Swift Transaction Report.jsReversingLabs: Detection: 30%
          Source: Swift Transaction Report.jsVirustotal: Detection: 31%Perma Link

          Software Vulnerabilities

          barindex
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeProcess created: C:\Windows\System32\conhost.exe
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeCode function: 4x nop then cmp eax, dword ptr [ecx+04h]6_2_02758C18
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: seasonmonster.s3.us-east-1.amazonaws.com
          Source: javaw.exe, 00000006.00000002.1931690141.000000000492A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: HTTP://WWW.CHAMBERSIGN.ORG
          Source: javaw.exe, 00000006.00000002.1931690141.000000000492A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bugreport.sun.com/bugreport/
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009E18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt
          Source: javaw.exe, 00000006.00000002.1931690141.000000000492A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1933486192.0000000009DC7000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1933486192.0000000009D58000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1933486192.0000000009D7C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009E18000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1933486192.0000000009DFC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009DC7000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1933486192.0000000009D58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009E18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009DC7000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1933486192.0000000009D58000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1933486192.0000000009DFC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
          Source: javaw.exe, 00000006.00000002.1931690141.0000000004CBD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html
          Source: javaw.exe, 00000006.00000002.1931690141.000000000492A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.0000000004C8C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html0
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl
          Source: javaw.exe, 00000006.00000002.1931690141.0000000004CBD000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.0000000004C8C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl0
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009FB4000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.0000000004CBD000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.0000000004C8C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl
          Source: javaw.exe, 00000006.00000002.1931690141.0000000004CBD000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.0000000004C8C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl0
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl
          Source: javaw.exe, 00000006.00000002.1931690141.0000000004CBD000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.0000000004C8C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl0
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009E18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl
          Source: javaw.exe, 00000006.00000002.1931690141.000000000492A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1933486192.0000000009DC7000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1933486192.0000000009D58000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1933486192.0000000009D7C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009E18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009DC7000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1933486192.0000000009D58000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1933486192.0000000009DFC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009E18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009DC7000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1933486192.0000000009D58000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1933486192.0000000009DFC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
          Source: java.exe, 00000002.00000002.1891530019.0000000004200000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.000000000492A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1933486192.0000000009DC7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://java.oracle.com/
          Source: javaw.exe, 00000006.00000002.1941175217.0000000015340000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1933486192.0000000009F21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://null.oracle.com/
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009E18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009E18000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1933486192.0000000009DC7000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1933486192.0000000009D58000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1933486192.0000000009DFC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009E18000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1933486192.0000000009DC7000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1933486192.0000000009D58000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1933486192.0000000009D7C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009E18000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1933486192.0000000009DC7000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1933486192.0000000009D58000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1933486192.0000000009DFC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
          Source: javaw.exe, 00000006.00000002.1931690141.0000000004CBD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://policy.camerfirma.com
          Source: javaw.exe, 00000006.00000002.1931690141.0000000004C8C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://policy.camerfirma.com0
          Source: javaw.exe, 00000006.00000002.1931690141.0000000004CBD000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.000000000492A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/
          Source: javaw.exe, 00000006.00000002.1931690141.000000000492A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.00000000048A4000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.0000000004C8C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/0
          Source: javaw.exe, 00000006.00000002.1931690141.000000000492A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.chambersign.org
          Source: javaw.exe, 00000006.00000002.1931690141.0000000004CBD000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.0000000004C8C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.chambersign.org1
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009FB4000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.000000000492A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009FB4000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.000000000492A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.0000000004C8C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
          Source: javaw.exe, 00000006.00000002.1931690141.000000000492A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm3j
          Source: javaw.exe, 00000006.00000002.1931690141.000000000492A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bmsj
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps
          Source: javaw.exe, 00000006.00000002.1931690141.0000000004CBD000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.0000000004C8C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps0
          Source: Swift Confirmation Copy.jar.0.drString found in binary or memory: https://branchlock.net
          Source: javaw.exe, 00000006.00000002.1931690141.000000000492A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009FB4000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.000000000492A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.0000000004C8C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://repository.luxtrust.lu
          Source: javaw.exe, 00000006.00000002.1931690141.0000000004CBD000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.0000000004C8C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://repository.luxtrust.lu0
          Source: javaw.exe, 00000006.00000002.1931690141.0000000004BD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009E46000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/1.jar
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009E46000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/2.jar
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009E46000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/3.jar
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009E46000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/checker.jar
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009E46000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/email.js
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009E46000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/history.jar
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009E46000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/recovery.jar
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009E46000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/res.jar
          Source: javaw.exe, 00000006.00000002.1931690141.0000000004BD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/swiftcopy.pdf
          Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736

          System Summary

          barindex
          Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
          Source: Swift Transaction Report.jsInitial sample: Strings found which are bigger than 50
          Source: classification engineClassification label: mal84.expl.evad.winJS@12/6@1/1
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Vault\credJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7744:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7936:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7828:120:WilError_03
          Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\Swift Confirmation Copy.jarJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
          Source: C:\Windows\System32\wscript.exeFile read: C:\Program Files (x86)\desktop.iniJump to behavior
          Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: Swift Transaction Report.jsReversingLabs: Detection: 30%
          Source: Swift Transaction Report.jsVirustotal: Detection: 31%
          Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Swift Transaction Report.js"
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exe "C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe" -version
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
          Source: C:\Windows\SysWOW64\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exe "C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe" -jar "C:\Users\user\AppData\Local\Temp\Swift Confirmation Copy.jar"
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist.exe
          Source: C:\Windows\SysWOW64\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exe "C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe" -versionJump to behavior
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exe "C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe" -jar "C:\Users\user\AppData\Local\Temp\Swift Confirmation Copy.jar"Jump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist.exeJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: msxml3.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: msdart.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: version.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\icacls.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeSection loaded: version.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior

          Data Obfuscation

          barindex
          Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: .Run("java -version", "0", "true");ITextStream.WriteLine(" exec:8800 f:");ITextStream.WriteLine(" entry:8805 f:_0x27581a a0:%22UEsDBBQACAgIACW5JFoAAAAAAAAAAAAAAAAUAA0ATUVUQS1JTkYvTUFOSUZFU1QuTUZVVAUAAZa%2FeWf%2BygAA803My0xLLS7RDUstKs7Mz7NSMNQz4PJNzMzTdc5JLC62UkjKz01KLC7JTOYCC%2BgGJJZkWCnocXEBAFBLBwh7RANZOgAAADsAAABQSwMEF");ITextStream.WriteLine(" exec:71816 f:_0x152825");ITextStream.WriteLine(" entry:71827 f:_0xddf113 a0:2535");ITextStream.WriteLine(" exit:71827 f:_0xddf113 r:%22qHOVy%22");ITextStream.WriteLine(" entry:71832 f:_0xddf113 a0:5835");ITextStream.WriteLine(" exit:71832 f:_0xddf113 r:%22split%22");ITextStream.WriteLine(" entry:71822 o:%220%7C1%7C3%7C2%7C4%22 f:split a0:%22%7C%22");ITextStream.WriteLine(" exit:71822 o:%220%7C1%7C3%7C2%7C4%22 f:split r:0%2C1%2C3%2C2%2C4");ITextStream.WriteLine(" entry:71873 f:_0xddf113 a0:5282");ITextStream.WriteLine(" exit:71873 f:_0xddf113 r:%22tzErh%22");ITextStream.WriteLine(" entry:71888 f:_0xddf113 a0:7122");ITextStream.WriteLine(" exit:71888 f:_0xddf113 r:%22createElem%22");ITextStream.WriteLine(" entry:71892 f:_0xddf113 a0:5829");ITextStream.WriteLine(" exit:71892 f:_0xddf113 r:%22ent%22");ITextStream.WriteLine(" entry:71900 f:_0xddf113 a0:7277");ITextStream.WriteLine(" exit:71900 f:_0xddf113 r:%22cOOzb%22");IXMLDOMNode._00000000();ITextStream.WriteLine(" entry:71883 o: f:createElement a0:%22tmp%22");IXMLDOMNode._00000029("tmp");IXMLDOMNode._00000000();IXMLDOMElement._00000000();ITextStream.WriteLine(" exit:71883 o: f:createElement r:");ITextStream.WriteLine(" entry:71929 f:_0xddf113 a0:5037");ITextStream.WriteLine(" exit:71929 f:_0xddf113 r:%22dataType%22");ITextStream.WriteLine(" entry:71936 f:_0xddf113 a0:1394");ITextStream.WriteLine(" exit:71936 f:_0xddf113 r:%22NMYlu%22");IXMLDOMElement.dataType("bin.base64");ITextStream.WriteLine(" entry:71914 f:_0xddf113 a0:6722");ITextStream.WriteLine(" exit:71914 f:_0xddf113 r:%22text%22");IXMLDOMElement.text("UEsDBBQACAgIACW5JFoAAAAAAAAAAAAAAAAUAA0ATUVUQS1JTkYvTUFOSUZFU1QuTUZVVAUAAZa/eWf+ygAA803My0xLLS7RDUstKs7Mz7NSMNQz4PJNzMzTdc5JLC62UkjKz01KLC7JTOYCC+gGJJZkWCnocXEBAFBLBwh7RANZOgAAADsAAABQSwMEFAAICAgAtTklWgAAAAAAAAAAAAAAAAwAAADduC/");ITextStream.WriteLine(" entry:71950 f:_0xddf113 a0:5709");ITextStream.WriteLine(" exit:71950 f:_0xddf113 r:%22nodeTypedV%22");ITextStream.WriteLine(" entry:71954 f:_0xddf113 a0:1060");ITextStream.WriteLine(" exit:71954 f:_0xddf113 r:%22alue%22");IXMLDOMElement.nodeTypedValue();ITextStream.WriteLine(" exit:8805 f:_0x27581a r:");ITextStream.WriteLine(" exit:72033 o:%5Bobject%20Object%5D f:QjjLD r:");ITextStream.WriteLine(" entry:72172 f:_0xd6267a a0:3052");ITextStream.WriteLine(" exit:72172 f:_0xd6267a r:%22MWkRL%22");ITextStream.WriteLine(" entry:72114 f:_0xd6267a a0:7959");ITextStream.WriteLine(" exit:72114 f:_0xd6267a r:%22Type%22");_Stream.Type("1");ITextStream.WriteLine(" entry:72099 f:_0xd6267a a0:7433");ITextStream.WriteLine(" exit:72099 f:_0xd6267a r:%22Open%22");_Stream._00000000();ITextStream.WriteLine(" entry:7209
          Source: Yara matchFile source: 00000006.00000002.1940846931.0000000014F46000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000003.1894398279.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: javaw.exe PID: 7876, type: MEMORYSTR
          Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Swift Confirmation Copy.jar, type: DROPPED
          Source: Swift Transaction Report.jsInitial file: High amount of function use 12
          Source: Swift Transaction Report.jsArray : entropy: 5.55, length: 8362, content: 'qvwnAjm4Sd''e581tkX1WT''OgWi80OwsB''IyMD17J1x4''XHg0Nic6Xz''RSgweDhlKS''cyxjcmVhdG''9yM2FlICU3''VCN
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeCode function: 2_2_020DA20A push ecx; ret 2_2_020DA21A
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeCode function: 2_2_020DA21B push ecx; ret 2_2_020DA225
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeCode function: 2_2_020DBB67 push 00000000h; mov dword ptr [esp], esp2_2_020DBB8D
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeCode function: 2_2_020DB3B7 push 00000000h; mov dword ptr [esp], esp2_2_020DB3DD
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeCode function: 2_2_020DB947 push 00000000h; mov dword ptr [esp], esp2_2_020DB96D
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeCode function: 2_2_020DC477 push 00000000h; mov dword ptr [esp], esp2_2_020DC49D
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeCode function: 6_2_0275B331 push ecx; retn 0022h6_2_0275B3E6
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeCode function: 6_2_0275B077 push es; iretd 6_2_0275B07E
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeCode function: 6_2_0275D691 push cs; retf 6_2_0275D6B1
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeCode function: 6_2_0276159A pushad ; ret 6_2_0276159D
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeCode function: 6_2_026BD8F7 push 00000000h; mov dword ptr [esp], esp6_2_026BD921
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeCode function: 6_2_026BA20A push ecx; ret 6_2_026BA21A
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeCode function: 6_2_026BA21B push ecx; ret 6_2_026BA225
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeCode function: 6_2_026BBB67 push 00000000h; mov dword ptr [esp], esp6_2_026BBB8D
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeCode function: 6_2_026BB3B7 push 00000000h; mov dword ptr [esp], esp6_2_026BB3DD
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeCode function: 6_2_026BD8E0 push 00000000h; mov dword ptr [esp], esp6_2_026BD921
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeCode function: 6_2_026BB947 push 00000000h; mov dword ptr [esp], esp6_2_026BB96D
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeCode function: 6_2_026BC477 push 00000000h; mov dword ptr [esp], esp6_2_026BC49D
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009E46000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AUTORUNSC.EXE8
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009E46000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AUTORUNS.EXE8
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009E46000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXE8
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009E46000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OLLYDBG.EXE8
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009E46000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: PROCMON.EXE8
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009E46000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: FILEMON.EXE8
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009E46000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: FIDDLER.EXE8
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009E46000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: REGMON.EXE8
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeCode function: 6_2_0275B4C4 sldt word ptr [eax]6_2_0275B4C4
          Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: javaw.exe, 00000006.00000003.1895030760.0000000014CCF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: com/sun/corba/se/impl/util/SUNVMCID.classPK
          Source: javaw.exe, 00000006.00000003.1895030760.0000000014CCF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &com/sun/corba/se/impl/util/SUNVMCID.classPK
          Source: java.exe, 00000002.00000002.1890023261.00000000006D5000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1930313342.0000000000C77000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [Ljava/lang/VirtualMachineError;
          Source: javaw.exe, 00000006.00000003.1895030760.0000000014CCF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: org/omg/CORBA/OMGVMCID.classPK
          Source: java.exe, 00000002.00000002.1890023261.00000000006D5000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1930313342.0000000000C77000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: cjava/lang/VirtualMachineError
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009E46000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware.exe8
          Source: java.exe, 00000002.00000003.1886286444.00000000146CC000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000006.00000003.1895030760.0000000014CCF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: java/lang/VirtualMachineError.classPK
          Source: javaw.exe, 00000006.00000002.1933486192.0000000009E46000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vboxtray.exe8
          Source: java.exe, 00000002.00000002.1890023261.00000000006AB000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1930313342.0000000000C77000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeMemory protected: page read and write | page guardJump to behavior
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exe "C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe" -versionJump to behavior
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exe "C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe" -jar "C:\Users\user\AppData\Local\Temp\Swift Confirmation Copy.jar"Jump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist.exeJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeCode function: 2_2_020D03C0 cpuid 2_2_020D03C0
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\client\jvm.dll VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeQueries volume information: C:\Users\user\AppData\Local\Temp\hsperfdata_user\7736 VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\resources.jar VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\meta-index VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\client\jvm.dll VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeQueries volume information: C:\Users\user\AppData\Local\Temp\hsperfdata_user\7876 VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\resources.jar VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\rt.jar VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\jsse.jar VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\jce.jar VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\charsets.jar VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\jfr.jar VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\meta-index VolumeInformationJump to behavior
          Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity Information23
          Scripting
          Valid Accounts1
          Windows Management Instrumentation
          23
          Scripting
          11
          Process Injection
          1
          Masquerading
          OS Credential Dumping11
          Security Software Discovery
          Remote ServicesData from Local System2
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts1
          Exploitation for Client Execution
          1
          Services File Permissions Weakness
          1
          Services File Permissions Weakness
          1
          Virtualization/Sandbox Evasion
          LSASS Memory1
          Virtualization/Sandbox Evasion
          Remote Desktop ProtocolData from Removable Media1
          Data Encoding
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAt1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          Disable or Modify Tools
          Security Account Manager1
          File and Directory Discovery
          SMB/Windows Admin SharesData from Network Shared Drive1
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
          Process Injection
          NTDS23
          System Information Discovery
          Distributed Component Object ModelInput Capture2
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
          Obfuscated Files or Information
          LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Services File Permissions Weakness
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          DLL Side-Loading
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1585123 Sample: Swift Transaction Report.js Startdate: 07/01/2025 Architecture: WINDOWS Score: 84 31 seasonmonster.s3.us-east-1.amazonaws.com 2->31 33 s3-r-w.us-east-1.amazonaws.com 2->33 37 Multi AV Scanner detection for submitted file 2->37 39 Yara detected Branchlock Obfuscator 2->39 41 Exploit detected, runtime environment starts unknown processes 2->41 43 2 other signatures 2->43 9 wscript.exe 1 2 2->9         started        signatures3 process4 file5 29 C:\Users\user\...\Swift Confirmation Copy.jar, Zip 9->29 dropped 45 JScript performs obfuscated calls to suspicious functions 9->45 47 Windows Scripting host queries suspicious COM object (likely to drop second stage) 9->47 13 javaw.exe 16 9->13         started        17 java.exe 9 9->17         started        signatures6 process7 dnsIp8 35 s3-r-w.us-east-1.amazonaws.com 54.231.134.106, 443, 49736 AMAZON-02US United States 13->35 49 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 13->49 19 tasklist.exe 1 13->19         started        21 icacls.exe 1 17->21         started        23 conhost.exe 17->23         started        signatures9 process10 process11 25 conhost.exe 19->25         started        27 conhost.exe 21->27         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          Swift Transaction Report.js30%ReversingLabsScript-JS.Trojan.Malgent
          Swift Transaction Report.js31%VirustotalBrowse
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          https://seasonmonster.s3.us-east-1.amazonaws.com/2.jar0%Avira URL Cloudsafe
          http://www.quovadis.bm3j0%Avira URL Cloudsafe
          https://seasonmonster.s3.us-east-1.amazonaws.com/email.js0%Avira URL Cloudsafe
          http://www.quovadis.bmsj0%Avira URL Cloudsafe
          https://seasonmonster.s3.us-east-1.amazonaws.com/res.jar0%Avira URL Cloudsafe
          https://seasonmonster.s3.us-east-1.amazonaws.com/swiftcopy.pdf0%Avira URL Cloudsafe
          https://seasonmonster.s3.us-east-1.amazonaws.com0%Avira URL Cloudsafe
          https://seasonmonster.s3.us-east-1.amazonaws.com/1.jar0%Avira URL Cloudsafe
          https://branchlock.net0%Avira URL Cloudsafe
          HTTP://WWW.CHAMBERSIGN.ORG0%Avira URL Cloudsafe
          https://seasonmonster.s3.us-east-1.amazonaws.com/3.jar0%Avira URL Cloudsafe
          https://seasonmonster.s3.us-east-1.amazonaws.com/history.jar0%Avira URL Cloudsafe
          https://seasonmonster.s3.us-east-1.amazonaws.com/checker.jar0%Avira URL Cloudsafe
          https://seasonmonster.s3.us-east-1.amazonaws.com/recovery.jar0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          s3-r-w.us-east-1.amazonaws.com
          54.231.134.106
          truefalse
            high
            seasonmonster.s3.us-east-1.amazonaws.com
            unknown
            unknownfalse
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://crl.xrampsecurity.com/XGCA.crljavaw.exe, 00000006.00000002.1933486192.0000000009FB4000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://crl.chambersign.org/chambersroot.crl0javaw.exe, 00000006.00000002.1931690141.0000000004CBD000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.0000000004C8C000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.quovadis.bm3jjavaw.exe, 00000006.00000002.1931690141.000000000492A000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.quovadis.bmsjjavaw.exe, 00000006.00000002.1931690141.000000000492A000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://repository.luxtrust.lu0javaw.exe, 00000006.00000002.1931690141.0000000004CBD000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.0000000004C8C000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://bugreport.sun.com/bugreport/javaw.exe, 00000006.00000002.1931690141.000000000492A000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://cps.chambersign.org/cps/chambersroot.html0javaw.exe, 00000006.00000002.1931690141.000000000492A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.0000000004C8C000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://seasonmonster.s3.us-east-1.amazonaws.com/2.jarjavaw.exe, 00000006.00000002.1933486192.0000000009E46000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://java.oracle.com/java.exe, 00000002.00000002.1891530019.0000000004200000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.000000000492A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1933486192.0000000009DC7000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://null.oracle.com/javaw.exe, 00000006.00000002.1941175217.0000000015340000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1933486192.0000000009F21000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.chambersign.org1javaw.exe, 00000006.00000002.1931690141.0000000004CBD000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.0000000004C8C000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://repository.swisssign.com/0javaw.exe, 00000006.00000002.1931690141.000000000492A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.00000000048A4000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.0000000004C8C000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                HTTP://WWW.CHAMBERSIGN.ORGjavaw.exe, 00000006.00000002.1931690141.000000000492A000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://branchlock.netSwift Confirmation Copy.jar.0.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://policy.camerfirma.comjavaw.exe, 00000006.00000002.1931690141.0000000004CBD000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://seasonmonster.s3.us-east-1.amazonaws.com/1.jarjavaw.exe, 00000006.00000002.1933486192.0000000009E46000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://ocsp.quovadisoffshore.comjavaw.exe, 00000006.00000002.1931690141.000000000492A000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://crl.securetrust.com/STCA.crl0javaw.exe, 00000006.00000002.1931690141.0000000004CBD000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.0000000004C8C000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.quovadisglobal.com/cpsjavaw.exe, 00000006.00000002.1933486192.0000000009FB4000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://cps.chambersign.org/cps/chambersroot.htmljavaw.exe, 00000006.00000002.1931690141.0000000004CBD000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://seasonmonster.s3.us-east-1.amazonaws.com/res.jarjavaw.exe, 00000006.00000002.1933486192.0000000009E46000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://seasonmonster.s3.us-east-1.amazonaws.com/email.jsjavaw.exe, 00000006.00000002.1933486192.0000000009E46000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://crl.securetrust.com/STCA.crljavaw.exe, 00000006.00000002.1933486192.0000000009FB4000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://repository.luxtrust.lujavaw.exe, 00000006.00000002.1933486192.0000000009FB4000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.quovadisglobal.com/cps0javaw.exe, 00000006.00000002.1931690141.0000000004CBD000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.0000000004C8C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://seasonmonster.s3.us-east-1.amazonaws.comjavaw.exe, 00000006.00000002.1931690141.0000000004BD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://crl.xrampsecurity.com/XGCA.crl0javaw.exe, 00000006.00000002.1931690141.0000000004CBD000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.0000000004C8C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://seasonmonster.s3.us-east-1.amazonaws.com/swiftcopy.pdfjavaw.exe, 00000006.00000002.1931690141.0000000004BD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.quovadis.bmjavaw.exe, 00000006.00000002.1933486192.0000000009FB4000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.000000000492A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.quovadis.bm0javaw.exe, 00000006.00000002.1933486192.0000000009FB4000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.000000000492A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.0000000004C8C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://ocsp.quovadisoffshore.com0javaw.exe, 00000006.00000002.1933486192.0000000009FB4000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.000000000492A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.0000000004C8C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://seasonmonster.s3.us-east-1.amazonaws.com/history.jarjavaw.exe, 00000006.00000002.1933486192.0000000009E46000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://crl.chambersign.org/chambersroot.crljavaw.exe, 00000006.00000002.1933486192.0000000009FB4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://repository.swisssign.com/javaw.exe, 00000006.00000002.1931690141.0000000004CBD000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 00000006.00000002.1931690141.000000000492A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.chambersign.orgjavaw.exe, 00000006.00000002.1931690141.000000000492A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://policy.camerfirma.com0javaw.exe, 00000006.00000002.1931690141.0000000004C8C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://seasonmonster.s3.us-east-1.amazonaws.com/3.jarjavaw.exe, 00000006.00000002.1933486192.0000000009E46000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://seasonmonster.s3.us-east-1.amazonaws.com/checker.jarjavaw.exe, 00000006.00000002.1933486192.0000000009E46000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://seasonmonster.s3.us-east-1.amazonaws.com/recovery.jarjavaw.exe, 00000006.00000002.1933486192.0000000009E46000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                • No. of IPs < 25%
                                                                • 25% < No. of IPs < 50%
                                                                • 50% < No. of IPs < 75%
                                                                • 75% < No. of IPs
                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                54.231.134.106
                                                                s3-r-w.us-east-1.amazonaws.comUnited States
                                                                16509AMAZON-02USfalse
                                                                Joe Sandbox version:41.0.0 Charoite
                                                                Analysis ID:1585123
                                                                Start date and time:2025-01-07 05:40:35 +01:00
                                                                Joe Sandbox product:CloudBasic
                                                                Overall analysis duration:0h 4m 38s
                                                                Hypervisor based Inspection enabled:false
                                                                Report type:full
                                                                Cookbook file name:default.jbs
                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                Number of analysed new started processes analysed:11
                                                                Number of new started drivers analysed:0
                                                                Number of existing processes analysed:0
                                                                Number of existing drivers analysed:0
                                                                Number of injected processes analysed:0
                                                                Technologies:
                                                                • HCA enabled
                                                                • EGA enabled
                                                                • GSI enabled (Javascript)
                                                                • AMSI enabled
                                                                Analysis Mode:default
                                                                Analysis stop reason:Timeout
                                                                Sample name:Swift Transaction Report.js
                                                                Detection:MAL
                                                                Classification:mal84.expl.evad.winJS@12/6@1/1
                                                                EGA Information:Failed
                                                                HCA Information:
                                                                • Successful, ratio: 75%
                                                                • Number of executed functions: 25
                                                                • Number of non-executed functions: 3
                                                                Cookbook Comments:
                                                                • Found application associated with file extension: .js
                                                                • Stop behavior analysis, all processes terminated
                                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                                                                • Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.107.246.45
                                                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                • Execution Graph export aborted for target java.exe, PID 7736 because it is empty
                                                                • Execution Graph export aborted for target javaw.exe, PID 7876 because it is empty
                                                                • Not all processes where analyzed, report is missing behavior information
                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                • Report size getting too big, too many NtSetInformationFile calls found.
                                                                No simulations
                                                                No context
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                s3-r-w.us-east-1.amazonaws.comhttps://midoregoncu-securemessagecenter.s3.us-east-1.amazonaws.com/open/message_12832.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                • 54.231.130.18
                                                                http://img1.wsimg.com/blobby/go/9b6ed793-452c-4f8f-8f80-6847f4d114d7/downloads/71318864754.pdfGet hashmaliciousUnknownBrowse
                                                                • 52.217.134.50
                                                                https://5qc68jhomepl.blob.core.windows.net/9x0f8/index.htmlGet hashmaliciousUnknownBrowse
                                                                • 52.217.41.32
                                                                https://verification.com/omid_error?Get hashmaliciousUnknownBrowse
                                                                • 52.217.85.136
                                                                https://receptive-comfortable-paw.glitch.me/Get hashmaliciousUnknownBrowse
                                                                • 16.15.178.21
                                                                https://payroll-news.at-eu.therelayservice.com/service/BUX_ZozoSdJWCG_5j9jtL5kIM8s4zpz8F8daQ7vEahL5WDRxV7IghpJPwSaoWNEG9eO6H06U_y_gwUSZJc9fDfwYBqPUPrZdmmRzUZ9qHFiMcq2w4-i7crrAjeyo_fa156_U7Eu0Ww9PKs3fM5eYkKQ_3vneF9YQUPUya3C3-wlq3FWHKATIkpuQEfV3laRldFNeWNfYS-sS9ogrADD3n54QIIqJd8nlTvWUjJCrpgug-gBImSGXyayDT39pkqjgqB_40YKcUcppFI95cuu7iPqdT0iDrU2CjdVlbNBd7udGztDhsYo1On9eJe-8oAEXs4eUbwt4py8g4aPFRtdg8AUlv-D-xKGeqkuRGN01AKHTOx7qZI-nNi5aqPk4UOXYeA3nx4xY22_7T29dLhfKcAGet hashmaliciousUnknownBrowse
                                                                • 52.217.140.2
                                                                Employee_Important_Message.pdfGet hashmaliciousHTMLPhisherBrowse
                                                                • 16.182.106.106
                                                                Employee_Important_Message.pdfGet hashmaliciousUnknownBrowse
                                                                • 52.217.199.10
                                                                https://google.lk/url?q=ernie.grue@nationalmi.com&nationalmi.com&sa=t&url=amp/s/i--iy.s3.us-east-1.amazonaws.com/vocabulary.html#ZXJuaWUuZ3J1ZUBuYXRpb25hbG1pLmNvbQ==Get hashmaliciousUnknownBrowse
                                                                • 52.217.132.146
                                                                Employee_Important_Message.pdfGet hashmaliciousUnknownBrowse
                                                                • 16.182.103.34
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                AMAZON-02UShttps://u896278.ct.sendgrid.net/ls/click?upn=u001.qpi-2F0q-2FpcJZ7AGoG9N-2BrxLxoGn8scq-2BedBfmGHFAiwRCk-2Fciku7nsS3YfQMNNJI09mLo_nYx4-2F6dkZkjW10KMIp5mXhxys1ng1sBiI-2Bi9ROMYt6d5xhIh5rIqEUIaIxVHh8-2Ftz-2FouCgfXZk6mMUe2uKm92SOgBLlBdhjnRJuhENZnIuGoEoPqnROi7OCzdabJBBnGjEwd2iK-2BngR2RyIIgM3XrJQ7wQhHrfqScifSW3iAsv3H5nGFK9ntcSdChvkxj0yXdE-2FQ0ICDszl57i6aZSB-2Fow-3D-3DGet hashmaliciousUnknownBrowse
                                                                • 13.33.219.205
                                                                sh4.elfGet hashmaliciousMiraiBrowse
                                                                • 54.171.230.55
                                                                https://report-scam.malwarebouncer.com/XcUR2TnV2VTlXT0s0Z0NYa01KSGt3dUtWMWNiblBrc29mMlpZUU1WdThBSjdDdTlRQTVDV1ZZd0pDeWRmUU5rQ1QvVDNiSlBNYWd2bTd0eTRkZW5jT0hrYTBKWHFiVUc4TVZBOGpiNkh4VG9OTm9zNTVUWHNmNWVydHpqbzhIc1llSzdzTHZ0dENVNWRLZy9BbCsyVDRMSGRHOThUWnV5QUxPU0RZL1dPalNYTmUzMTVoRzl5bmk1ZVZRPT0tLUdVYnJkMC9GazI3MWlxYmotLUpFOURyOWkzK1l6Vy9BYTVOVDBVNkE9PQ==?cid=2346401253Get hashmaliciousKnowBe4Browse
                                                                • 52.217.12.174
                                                                mpsl.elfGet hashmaliciousMiraiBrowse
                                                                • 34.249.145.219
                                                                la.bot.arm5.elfGet hashmaliciousMiraiBrowse
                                                                • 34.249.145.219
                                                                arm5.elfGet hashmaliciousMiraiBrowse
                                                                • 13.62.27.251
                                                                spc.elfGet hashmaliciousMiraiBrowse
                                                                • 52.9.216.221
                                                                i686.elfGet hashmaliciousMiraiBrowse
                                                                • 13.248.229.191
                                                                main_arm.elfGet hashmaliciousMiraiBrowse
                                                                • 34.249.145.219
                                                                i486.elfGet hashmaliciousMiraiBrowse
                                                                • 13.48.76.196
                                                                No context
                                                                No context
                                                                Process:C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):52
                                                                Entropy (8bit):4.935546689086913
                                                                Encrypted:false
                                                                SSDEEP:3:oFj4I5vpm4UScF:oJ5bcF
                                                                MD5:165B6782E63C53652327A7A3B8BA6259
                                                                SHA1:4E4DC9EC112A9CDC71BF02D968C858E7ACC517B6
                                                                SHA-256:82B7B17B13895C1FF5858EDC8F5B2BC446532809E20BCE80EBF4A416185D9328
                                                                SHA-512:66FD3B1A5FAFFE3A43478236C6C380327DB7355539B3EC5C9B30FB9219476B43D83A82CC5680731763C6C56BB4992F3B6EBEBD510A7E5B47BD5C710303D21557
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:C:\Program Files (x86)\Java\jre-1.8..1736224909418..
                                                                Process:C:\Windows\System32\wscript.exe
                                                                File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                Category:dropped
                                                                Size (bytes):21359
                                                                Entropy (8bit):7.948030467353428
                                                                Encrypted:false
                                                                SSDEEP:384:OAJjyCdE1n02lxzHm8QkdduiQpbkl/JZ476rvusoEyPsh719/buA5OB5/6RkhZgK:PJy1npQm5QxkBcyvulbkB19/buAoX/Rf
                                                                MD5:8E96E66F83E748D267DF96390C880297
                                                                SHA1:BAE891900C7C646F62A9B51C27F5B13A30CC9589
                                                                SHA-256:AE345B40D165255284BF4C6AB00A871FCB035B552AC0B20B3CFB19E4644E49B7
                                                                SHA-512:CEE16641BBBBF2DA2D1AE7AF00E6B266DE0374B955C37933061C4D1641AAC4CD1216A05C2140CB9203B0DC9CF565C686D5C04CD884EB44C578CD40605F7F7224
                                                                Malicious:true
                                                                Yara Hits:
                                                                • Rule: JoeSecurity_BranchlockObfuscator, Description: Yara detected Branchlock Obfuscator, Source: C:\Users\user\AppData\Local\Temp\Swift Confirmation Copy.jar, Author: Joe Security
                                                                Reputation:low
                                                                Preview:PK........%.$Z................META-INF/MANIFEST.MFUT.....yg.....M..LK-...K-*...R0.3..M...u.I,..RH..MJ,..L.....$.dX).qq..PK..{D.Y:...;...PK.........9%Z................./..class.R[O.A.=C...k..P.*h.E]. J.....bDI..m...k.-../..7..Q|..@c..f..^.!./..4......ag.;g.w......N.2.w#.l.,. .U........6..N.qj....}{N..5.....Q.R.4.$..a.....q.f..A9..#....a...LBUc*A.PWM.fx.]..x}(.n...g..S.+rio.....j..&!...{.&....)n!JP...fd)3 .T.U....{..6tSw......-}.u......7.....efD.'........<Pl.3...h......u5.f.~~ .~.k.[.....H......J.2.Y......t..ajO.i~....M.8.U...t..1.cP.L[......,...(#ng....%b#..i...8...5A.......8J....X.Dt..S.e.T3Et.H..M.6.$t..]8.... *.J#.n.fN.u.J.C...'..5.*.Q.+....5N.L.m..5<..5.DT......?.......F.ai..`k..uT.b...S..j]....i.A..'.......Gq8.!D!....<.)...p..C.....}.s8....y..uya...x...u...:.p...u.V..J.".RCl.T!......S...F./PK...}j.........PK.........9%Z................./..class.T]O.Y.~N....k[AdY.u....AYQ..*..G*~.0.....u._.f....%..Q...&..L................B..w..c
                                                                Process:C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):65536
                                                                Entropy (8bit):1.2198553404843202
                                                                Encrypted:false
                                                                SSDEEP:96:uy4rBfN8GyFE5+46rJI28IAH7TiHG1bowYk:uyWl8GYE5+46WIU+HGd
                                                                MD5:1E6B9565A5D5175458B654DDCA2045E0
                                                                SHA1:5B24A85F082F74348A1D2220DACE62F386A3D57F
                                                                SHA-256:8DAF3465907374B867A93150FD7BF6FD23A034A77CEFD1D17A3CD0249961A0F8
                                                                SHA-512:7BD5AD44B78623CF53E17F16F7373A2FFB97EE82B37E5726771700A3F9B06097467D928DD3722433A985996D832C2078E9398E7F1A921069990C9874DB3F1DF5
                                                                Malicious:false
                                                                Preview:........87......7.!..... .......8...........J...0...sun.rt._sync_Inflations.............8...........J...0...sun.rt._sync_Deflations.............@...........J...8...sun.rt._sync_ContendedLockAttempts..........8...........J...0...sun.rt._sync_FutileWakeups..........0...........J...(...sun.rt._sync_Parks..........@...........J...8...sun.rt._sync_EmptyNotifications.............8...........J...0...sun.rt._sync_Notifications..........8...........J...0...sun.rt._sync_SlowEnter..............8...........J...0...sun.rt._sync_SlowExit...............8...........J...0...sun.rt._sync_SlowNotify.............8...........J...0...sun.rt._sync_SlowNotifyAll..........8...........J...0...sun.rt._sync_FailedSpins............@...........J...8...sun.rt._sync_SuccessfulSpins................8...........J...0...sun.rt._sync_PrivateA...............8...........J...0...sun.rt._sync_PrivateB...............@...........J...8...sun.rt._sync_MonInCirculation...............8...........J...0...sun.rt._sync_MonScavenged...
                                                                Process:C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):65536
                                                                Entropy (8bit):1.2855600660551476
                                                                Encrypted:false
                                                                SSDEEP:96:gZprqJ8GgC2Ges6L624wc44eo47TmHG1bowF:gZk8GgpGes6L604WqHGd
                                                                MD5:192F5AFCE72C05BF430C2CBB5E55892E
                                                                SHA1:119B60866C58D739BC45B31A173738266C778308
                                                                SHA-256:0F2AA18A727B9D8241DD7E30B54E24794F01E722E210497326F6492D4BE4E656
                                                                SHA-512:DFC0D96786B250902F6D974BCFC470FF0B1183E934791C51ED9D7FABA2EB7A0959AEA5C0EAB71B7740755C0300761B2F7BC9E0982C6F71B3D69CF213B1B3D456
                                                                Malicious:false
                                                                Preview:........ 9.......Z...... .......8...........J...0...sun.rt._sync_Inflations.............8...........J...0...sun.rt._sync_Deflations.............@...........J...8...sun.rt._sync_ContendedLockAttempts..........8...........J...0...sun.rt._sync_FutileWakeups..........0...........J...(...sun.rt._sync_Parks..........@...........J...8...sun.rt._sync_EmptyNotifications.............8...........J...0...sun.rt._sync_Notifications..........8...........J...0...sun.rt._sync_SlowEnter..............8...........J...0...sun.rt._sync_SlowExit...............8...........J...0...sun.rt._sync_SlowNotify.............8...........J...0...sun.rt._sync_SlowNotifyAll..........8...........J...0...sun.rt._sync_FailedSpins............@...........J...8...sun.rt._sync_SuccessfulSpins................8...........J...0...sun.rt._sync_PrivateA...............8...........J...0...sun.rt._sync_PrivateB...............@...........J...8...sun.rt._sync_MonInCirculation...............8...........J...0...sun.rt._sync_MonScavenged...
                                                                Process:C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):45
                                                                Entropy (8bit):0.9111711733157262
                                                                Encrypted:false
                                                                SSDEEP:3:/lwlt7n:WNn
                                                                MD5:C8366AE350E7019AEFC9D1E6E6A498C6
                                                                SHA1:5731D8A3E6568A5F2DFBBC87E3DB9637DF280B61
                                                                SHA-256:11E6ACA8E682C046C83B721EEB5C72C5EF03CB5936C60DF6F4993511DDC61238
                                                                SHA-512:33C980D5A638BFC791DE291EBF4B6D263B384247AB27F261A54025108F2F85374B579A026E545F81395736DD40FA4696F2163CA17640DD47F1C42BC9971B18CD
                                                                Malicious:false
                                                                Preview:........................................J2SE.
                                                                Process:C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):140
                                                                Entropy (8bit):5.1030619724035935
                                                                Encrypted:false
                                                                SSDEEP:3:CEuXWN0LdmI3VuEHNekOCe3Z8md3EIFHgtzasVVdR1Ikk1:CEuX8jIcCQ93EHt+sVVCF1
                                                                MD5:67923EB5173B4A81DD4F8954EFCF4BDF
                                                                SHA1:F3780A75AE4B391060BB8A953B7A4A3632E2B0AE
                                                                SHA-256:46ED3C9741B74886F805C491E189983FBE21E9B50907514A2D7069DF1D130BBF
                                                                SHA-512:A5CC6BA075EEE88BEDA940337BEE99A65F78D81C7E5F07A559EC7F90F14AC2C5BEF31BFE986B666FC0D3E8EF4F4E7C92EF947545F16EE5E825499D07B49201CE
                                                                Malicious:false
                                                                Preview:java version "1.8.0_381"..Java(TM) SE Runtime Environment (build 1.8.0_381-b09)..Java HotSpot(TM) Client VM (build 25.381-b09, mixed mode)..
                                                                File type:ASCII text, with very long lines (65536), with no line terminators
                                                                Entropy (8bit):5.013450527079773
                                                                TrID:
                                                                  File name:Swift Transaction Report.js
                                                                  File size:334'392 bytes
                                                                  MD5:e865de0263ada94ea596fce4efd89ad0
                                                                  SHA1:96447cbcae6c1af91dd19587f729ec6cdddabc54
                                                                  SHA256:701435e822a78b82d53281af3ffb20b3732462ec99c6f36afdfc6f8eed4123f9
                                                                  SHA512:124f57e8f55a87ed2bf2f654d0bc59b5195807fb999c2e534bf22a9eb23471ca84f9a3794a20f3651dcefcd324827988f28c439830ce98e325a7d39de906bb3b
                                                                  SSDEEP:3072:mOAfrLpHJttJamF2HVF1SPtDNu8JPJRl0JSc:hAzdtEBF05NdJ7l0JSc
                                                                  TLSH:9B641C7839405C475CD97EF7663348CEDEB37805A289C8BBE2002979A28757CAB517F2
                                                                  File Content Preview:function _0x5023(){var _0x24472e=['qvwnAjm4Sd','e581tkX1WT','OgWi80OwsB','IyMD17J1x4','XHg0Nic6Xz','RSgweDhlKS','cyxjcmVhdG','9yM2FlICU3','VCNjJbXzB4','NkVceDQ2XH','oYoRMUCKd3','MHhFQzZBLF','B4MjY0KSks','g0Myc6XzB4','6e+QdDu1vk','WzIyOV0sXz','hfMHhFQkE0',
                                                                  Icon Hash:68d69b8bb6aa9a86
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Jan 7, 2025 05:41:52.579247952 CET49736443192.168.2.454.231.134.106
                                                                  Jan 7, 2025 05:41:52.579268932 CET4434973654.231.134.106192.168.2.4
                                                                  Jan 7, 2025 05:41:52.579374075 CET49736443192.168.2.454.231.134.106
                                                                  Jan 7, 2025 05:41:52.679656982 CET49736443192.168.2.454.231.134.106
                                                                  Jan 7, 2025 05:41:52.679681063 CET4434973654.231.134.106192.168.2.4
                                                                  Jan 7, 2025 05:41:53.237752914 CET4434973654.231.134.106192.168.2.4
                                                                  Jan 7, 2025 05:41:53.237914085 CET49736443192.168.2.454.231.134.106
                                                                  Jan 7, 2025 05:41:53.237936020 CET4434973654.231.134.106192.168.2.4
                                                                  Jan 7, 2025 05:41:53.237982988 CET49736443192.168.2.454.231.134.106
                                                                  Jan 7, 2025 05:41:53.254226923 CET49736443192.168.2.454.231.134.106
                                                                  Jan 7, 2025 05:41:53.254232883 CET4434973654.231.134.106192.168.2.4
                                                                  Jan 7, 2025 05:41:53.321324110 CET49736443192.168.2.454.231.134.106
                                                                  Jan 7, 2025 05:41:53.321324110 CET49736443192.168.2.454.231.134.106
                                                                  Jan 7, 2025 05:41:53.321331978 CET4434973654.231.134.106192.168.2.4
                                                                  Jan 7, 2025 05:41:53.321528912 CET4434973654.231.134.106192.168.2.4
                                                                  Jan 7, 2025 05:41:53.321891069 CET49736443192.168.2.454.231.134.106
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Jan 7, 2025 05:41:52.560559988 CET5821953192.168.2.41.1.1.1
                                                                  Jan 7, 2025 05:41:52.576478958 CET53582191.1.1.1192.168.2.4
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  Jan 7, 2025 05:41:52.560559988 CET192.168.2.41.1.1.10x446cStandard query (0)seasonmonster.s3.us-east-1.amazonaws.comA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Jan 7, 2025 05:41:52.576478958 CET1.1.1.1192.168.2.40x446cNo error (0)seasonmonster.s3.us-east-1.amazonaws.coms3-r-w.us-east-1.amazonaws.comCNAME (Canonical name)IN (0x0001)false
                                                                  Jan 7, 2025 05:41:52.576478958 CET1.1.1.1192.168.2.40x446cNo error (0)s3-r-w.us-east-1.amazonaws.com54.231.134.106A (IP address)IN (0x0001)false
                                                                  Jan 7, 2025 05:41:52.576478958 CET1.1.1.1192.168.2.40x446cNo error (0)s3-r-w.us-east-1.amazonaws.com54.231.168.218A (IP address)IN (0x0001)false
                                                                  Jan 7, 2025 05:41:52.576478958 CET1.1.1.1192.168.2.40x446cNo error (0)s3-r-w.us-east-1.amazonaws.com16.15.178.186A (IP address)IN (0x0001)false
                                                                  Jan 7, 2025 05:41:52.576478958 CET1.1.1.1192.168.2.40x446cNo error (0)s3-r-w.us-east-1.amazonaws.com3.5.7.1A (IP address)IN (0x0001)false
                                                                  Jan 7, 2025 05:41:52.576478958 CET1.1.1.1192.168.2.40x446cNo error (0)s3-r-w.us-east-1.amazonaws.com52.217.65.232A (IP address)IN (0x0001)false
                                                                  Jan 7, 2025 05:41:52.576478958 CET1.1.1.1192.168.2.40x446cNo error (0)s3-r-w.us-east-1.amazonaws.com16.182.71.34A (IP address)IN (0x0001)false
                                                                  Jan 7, 2025 05:41:52.576478958 CET1.1.1.1192.168.2.40x446cNo error (0)s3-r-w.us-east-1.amazonaws.com52.216.59.18A (IP address)IN (0x0001)false
                                                                  Jan 7, 2025 05:41:52.576478958 CET1.1.1.1192.168.2.40x446cNo error (0)s3-r-w.us-east-1.amazonaws.com16.182.67.98A (IP address)IN (0x0001)false

                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:23:41:24
                                                                  Start date:06/01/2025
                                                                  Path:C:\Windows\System32\wscript.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Swift Transaction Report.js"
                                                                  Imagebase:0x7ff75a900000
                                                                  File size:170'496 bytes
                                                                  MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:2
                                                                  Start time:23:41:48
                                                                  Start date:06/01/2025
                                                                  Path:C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe" -version
                                                                  Imagebase:0xa30000
                                                                  File size:257'664 bytes
                                                                  MD5 hash:9DAA53BAB2ECB33DC0D9CA51552701FA
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:moderate
                                                                  Has exited:true

                                                                  Target ID:3
                                                                  Start time:23:41:48
                                                                  Start date:06/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:4
                                                                  Start time:23:41:48
                                                                  Start date:06/01/2025
                                                                  Path:C:\Windows\SysWOW64\icacls.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
                                                                  Imagebase:0x440000
                                                                  File size:29'696 bytes
                                                                  MD5 hash:2E49585E4E08565F52090B144062F97E
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:5
                                                                  Start time:23:41:48
                                                                  Start date:06/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:6
                                                                  Start time:23:41:49
                                                                  Start date:06/01/2025
                                                                  Path:C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe" -jar "C:\Users\user\AppData\Local\Temp\Swift Confirmation Copy.jar"
                                                                  Imagebase:0x50000
                                                                  File size:257'664 bytes
                                                                  MD5 hash:6E0F4F812AE02FBCB744A929E74A04B8
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_BranchlockObfuscator, Description: Yara detected Branchlock Obfuscator, Source: 00000006.00000002.1940846931.0000000014F46000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_BranchlockObfuscator, Description: Yara detected Branchlock Obfuscator, Source: 00000006.00000003.1894398279.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:moderate
                                                                  Has exited:true

                                                                  Target ID:7
                                                                  Start time:23:41:49
                                                                  Start date:06/01/2025
                                                                  Path:C:\Windows\SysWOW64\tasklist.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:tasklist.exe
                                                                  Imagebase:0xf20000
                                                                  File size:79'360 bytes
                                                                  MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:8
                                                                  Start time:23:41:49
                                                                  Start date:06/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff6ec4b0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Reset < >
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1890887271.00000000020D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_20d0000_java.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a013eb8cabcbd043bbab837161dc4a3803abd5ca43d685801e961288f1562b41
                                                                    • Instruction ID: 910919a3165954fea6663d73dd86e995ebb4238c8c9871640c5c794c3472e2d1
                                                                    • Opcode Fuzzy Hash: a013eb8cabcbd043bbab837161dc4a3803abd5ca43d685801e961288f1562b41
                                                                    • Instruction Fuzzy Hash: 4A1149B6D0232A9FCF24CF49C4854ADB7B2FF98314F164529EC69A7341D3346920DB92
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1890887271.00000000020D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_20d0000_java.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 1fb70153bec9c499dda192934c6d57752f6382d7c9f8753340781fcfa5a47fa1
                                                                    • Instruction ID: 3068c201e06da88a5925b19bb0d69db692bf8dd01257c5df1ec408dc8052cc40
                                                                    • Opcode Fuzzy Hash: 1fb70153bec9c499dda192934c6d57752f6382d7c9f8753340781fcfa5a47fa1
                                                                    • Instruction Fuzzy Hash: F4F0F27AC003299B8B559F48C4400ADB7B2AB04318F1A8496DC2C3B241D332AD62DF91
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1890887271.00000000020D2000.00000040.00000800.00020000.00000000.sdmp, Offset: 020D2000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_20d2000_java.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 82ac9905b987a3990641b5709ce78bf83fcdbcea236263927a1fac8204b75697
                                                                    • Instruction ID: fb6f76310175ac639b8041f68996f40f08fa773ab4c31358cb0b83083f2993fd
                                                                    • Opcode Fuzzy Hash: 82ac9905b987a3990641b5709ce78bf83fcdbcea236263927a1fac8204b75697
                                                                    • Instruction Fuzzy Hash: 31F079B6A04A06EBDB258F61C0047DAFBB4BB88718F14821AD82C67350D778B4698BC1
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1890887271.00000000020D2000.00000040.00000800.00020000.00000000.sdmp, Offset: 020D2000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_20d2000_java.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b1afbe3d185832393eab2cd6ff303083b075a269e66b129544a459ff784383e6
                                                                    • Instruction ID: e7d523d8b5c1e75b7be791b68f93e5cba9665df020a2fe8eb9c339328befc21e
                                                                    • Opcode Fuzzy Hash: b1afbe3d185832393eab2cd6ff303083b075a269e66b129544a459ff784383e6
                                                                    • Instruction Fuzzy Hash: 6BF0CAB6D01A0AABDB258F61C0047DAFBB5BB88718F18421AC42C67320D378B469CFC0
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1890887271.00000000020D2000.00000040.00000800.00020000.00000000.sdmp, Offset: 020D2000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_20d2000_java.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 90c43ca9c89e5f67f5914b30089ab596354d400eb743d8a474790ddfe95e4ddc
                                                                    • Instruction ID: eb0ba20701639b14e90ba96db0d09ef37e7fe6258bdbf4842ed073e01fa9df3d
                                                                    • Opcode Fuzzy Hash: 90c43ca9c89e5f67f5914b30089ab596354d400eb743d8a474790ddfe95e4ddc
                                                                    • Instruction Fuzzy Hash: A5F0CAB6D00A0AABDB658F61C0047CAFBB4BB88718F14421AC42C67320D378B469CFC1
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1890887271.00000000020D2000.00000040.00000800.00020000.00000000.sdmp, Offset: 020D2000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_20d2000_java.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b39f7d541a57d8b4e93c0028f473a598da3cc88df402a023e6ccfbd9342a2916
                                                                    • Instruction ID: f03309c1b593bf04d0bfdd87ebe9de6c2a7d6be786a2e61809be0572a358e8ff
                                                                    • Opcode Fuzzy Hash: b39f7d541a57d8b4e93c0028f473a598da3cc88df402a023e6ccfbd9342a2916
                                                                    • Instruction Fuzzy Hash: D2F0C2B6D00A06ABDB258F61C0047CAFBB5BB44714F14421AC52C67310D378B465CFC0
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1890887271.00000000020D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_20d0000_java.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a012a9fb5cf5d9e1554885d89a3030425dd9bcc3e3bcfa4e280c99466c7885fc
                                                                    • Instruction ID: 2babe42abf93ceee2650eb5accc0cb415835e6c3ab79564b446d3e24f8312163
                                                                    • Opcode Fuzzy Hash: a012a9fb5cf5d9e1554885d89a3030425dd9bcc3e3bcfa4e280c99466c7885fc
                                                                    • Instruction Fuzzy Hash: 1721C4BA5043568FDB358F1988407D9B7E6EB58314F21882EDECDA7710D2306A898B51
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1930770758.00000000026B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B2000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_26b2000_javaw.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: `pBl
                                                                    • API String ID: 0-3369615547
                                                                    • Opcode ID: e7e72b5c1298e9e15c523ef118b25a3b60288da43d00497f6bb8a5095c06d2c4
                                                                    • Instruction ID: 9d76355ce60d9d6d475f69947cd9a1de0d513fb73e02e1254e4323865e2565b0
                                                                    • Opcode Fuzzy Hash: e7e72b5c1298e9e15c523ef118b25a3b60288da43d00497f6bb8a5095c06d2c4
                                                                    • Instruction Fuzzy Hash: 37A177B5A04601DFDB1ACF24C494BAAFBB1FF49318F08819DD91A4F381CB35A885CB91
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1930770758.00000000026B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B2000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_26b2000_javaw.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: `pBl
                                                                    • API String ID: 0-3369615547
                                                                    • Opcode ID: 7982ba43f52b0724060078c2ecba409bc46b0b677bca5d4b8a259aa66ff13a54
                                                                    • Instruction ID: 6797949ddc2992fdc620717b2db7b60f1b6edfa34a6f4950879baf027ceea650
                                                                    • Opcode Fuzzy Hash: 7982ba43f52b0724060078c2ecba409bc46b0b677bca5d4b8a259aa66ff13a54
                                                                    • Instruction Fuzzy Hash: DA6199B1604601DFDB1ACF24C494BAAFBB5FF49718F08819DD91A4F381C774A885CB91
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1930770758.0000000002754000.00000040.00000800.00020000.00000000.sdmp, Offset: 02754000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_2754000_javaw.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 271c831f421b409bd2571f250908b8fe982b9814735c4085daa43b971fa72ea9
                                                                    • Instruction ID: 1af4aa48c1e3aed35641aff4b52e3db73d51405b5abeb4cca1d8585385d545e0
                                                                    • Opcode Fuzzy Hash: 271c831f421b409bd2571f250908b8fe982b9814735c4085daa43b971fa72ea9
                                                                    • Instruction Fuzzy Hash: A5D13C71A053508FC715DF29C08462AFBE2FF8A314F65896EE8899B755C771E842CF82
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1930770758.0000000002754000.00000040.00000800.00020000.00000000.sdmp, Offset: 02754000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_2754000_javaw.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 72907139b7ccd6efef04d5fb9a3613c48a10e7cb3bfd21bc1bf08cc80b85152e
                                                                    • Instruction ID: 33d54a72925234d16011943e73075d522cff785020ff760eec40c4f62b018633
                                                                    • Opcode Fuzzy Hash: 72907139b7ccd6efef04d5fb9a3613c48a10e7cb3bfd21bc1bf08cc80b85152e
                                                                    • Instruction Fuzzy Hash: 1B4148716053548FCB52CF14C88C62AB7E2BBC9624F69896EECC897704D731EC458B82
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1930770758.0000000002754000.00000040.00000800.00020000.00000000.sdmp, Offset: 02754000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_2754000_javaw.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 25a61fc9e5f430abecd4f850da4841fad46eb459c0b3448f51339fddeefa5902
                                                                    • Instruction ID: 94fac7979b8a5af0b9df48e6df4e164ba53f004cd7026ff3bc1b08cd37a39c68
                                                                    • Opcode Fuzzy Hash: 25a61fc9e5f430abecd4f850da4841fad46eb459c0b3448f51339fddeefa5902
                                                                    • Instruction Fuzzy Hash: 303191B0908745EFD715CF21C4487B9FBB0BF82308F0882ADC9485B781D7386559DB82
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1930770758.00000000026B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_26b0000_javaw.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a013eb8cabcbd043bbab837161dc4a3803abd5ca43d685801e961288f1562b41
                                                                    • Instruction ID: 2fd838f8bbd1adbcbcef4aa0ca4707ea4a1d6dda6dae11b790159eb952631ac9
                                                                    • Opcode Fuzzy Hash: a013eb8cabcbd043bbab837161dc4a3803abd5ca43d685801e961288f1562b41
                                                                    • Instruction Fuzzy Hash: FE1149B6D0022A9FCF29CF59C4854EEBBB0FF98314F264565DC65A3741E33469A0CB91
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1930770758.0000000002754000.00000040.00000800.00020000.00000000.sdmp, Offset: 02754000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_2754000_javaw.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e292246747d129bba915de0298486b934b7f9a144af8e2dcb0341c530f307d00
                                                                    • Instruction ID: 27e51b651e84f1c64d2c6d2624a1a1ade24c2f25ae23433712bc2a38238cf4a8
                                                                    • Opcode Fuzzy Hash: e292246747d129bba915de0298486b934b7f9a144af8e2dcb0341c530f307d00
                                                                    • Instruction Fuzzy Hash: C2F0E2B58093488BD301AF349C45135BBB1BF13230F1957C9D8E4AB2D2D322844ACB51
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1930770758.00000000026B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_26b0000_javaw.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 1fb70153bec9c499dda192934c6d57752f6382d7c9f8753340781fcfa5a47fa1
                                                                    • Instruction ID: 4cd9999526649ad11cb90f817c929b419aaa6797c183559476cfd0030dbb4831
                                                                    • Opcode Fuzzy Hash: 1fb70153bec9c499dda192934c6d57752f6382d7c9f8753340781fcfa5a47fa1
                                                                    • Instruction Fuzzy Hash: 7FF01576C00229DB8B15DF48C4400EEFBB1EF04218B2A85A6DC2837741E332ADA2CF81
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1930770758.0000000002754000.00000040.00000800.00020000.00000000.sdmp, Offset: 02754000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_2754000_javaw.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 6a92122b757095567f9b1ab1e5a75132901640dc627915bf7c66fa26a1b6020b
                                                                    • Instruction ID: 79ee0da0223ba6785bce599643777da9782f70f3ad89d38b9c3c823949d9c902
                                                                    • Opcode Fuzzy Hash: 6a92122b757095567f9b1ab1e5a75132901640dc627915bf7c66fa26a1b6020b
                                                                    • Instruction Fuzzy Hash: 63D05E718043098BC601AF34D844529B7A4BF15334F594B8CECDCAB381E332A8858F92
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1930770758.00000000026B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B2000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_26b2000_javaw.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9c1be2a60e2d48484896d926566ca6d0dc356464296f79be76810bf9f1da541e
                                                                    • Instruction ID: b3b8ca2f284e54e9c110092f9911168f9074752b63a974119939db6544d84fe3
                                                                    • Opcode Fuzzy Hash: 9c1be2a60e2d48484896d926566ca6d0dc356464296f79be76810bf9f1da541e
                                                                    • Instruction Fuzzy Hash: BEF079B6A00A06EBDB258F61C0047DAFBB4BB88718F14821AD82C67350D778B4698BC1
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1930770758.00000000026B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B2000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_26b2000_javaw.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: fe8b69d68565ddefe3567da242c244055cdc9dd5cbe090642aa4e64b78282b87
                                                                    • Instruction ID: 6eee1ad020435fc3ce6cfc8a891d9b58dcc384d86c2fbe2c42b65d107e9d6364
                                                                    • Opcode Fuzzy Hash: fe8b69d68565ddefe3567da242c244055cdc9dd5cbe090642aa4e64b78282b87
                                                                    • Instruction Fuzzy Hash: 88F09BB6A00A06EBDB29CF61C0047DAFBB4BB88718F14421AC42C67750D778B4A9CFC0
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1930770758.00000000026B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B2000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_26b2000_javaw.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 70afb67fee5e9d53bf847f294d9b826d641976ca1ab121b442551debdb6019f2
                                                                    • Instruction ID: 34685e4423038be715261c6705dac4fa7c57f5d76589261e245fc02f09dcd3fb
                                                                    • Opcode Fuzzy Hash: 70afb67fee5e9d53bf847f294d9b826d641976ca1ab121b442551debdb6019f2
                                                                    • Instruction Fuzzy Hash: 66F09BB6A00A16EBDB26CF65C0047CAFBB4BB88714F54421AC42C67350D778B469CFC0
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1930770758.00000000026B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B2000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_26b2000_javaw.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 70afb67fee5e9d53bf847f294d9b826d641976ca1ab121b442551debdb6019f2
                                                                    • Instruction ID: 34685e4423038be715261c6705dac4fa7c57f5d76589261e245fc02f09dcd3fb
                                                                    • Opcode Fuzzy Hash: 70afb67fee5e9d53bf847f294d9b826d641976ca1ab121b442551debdb6019f2
                                                                    • Instruction Fuzzy Hash: 66F09BB6A00A16EBDB26CF65C0047CAFBB4BB88714F54421AC42C67350D778B469CFC0
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1930770758.00000000026B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B2000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_26b2000_javaw.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 038666c590bf4f76215726f46993a222f6388f14fb895f392c06180a4853ada5
                                                                    • Instruction ID: f64a8269dc6ec5f8413bfb364207423f71baf1a1c819094c96a237eac60fcae7
                                                                    • Opcode Fuzzy Hash: 038666c590bf4f76215726f46993a222f6388f14fb895f392c06180a4853ada5
                                                                    • Instruction Fuzzy Hash: F0F0C2B6D00A06ABDB258F61C0047DAFBB4BF44714F14421AC42C67310D378B465CFC0
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1930770758.00000000026B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B2000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_26b2000_javaw.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 7e0746279c65e4adbf625b084895db2a55500f9cc70374574102482dc0cbc5e5
                                                                    • Instruction ID: 8d7c265c1271cca50a4c1d789e928275b475f466e036e36c560e059e53f44e44
                                                                    • Opcode Fuzzy Hash: 7e0746279c65e4adbf625b084895db2a55500f9cc70374574102482dc0cbc5e5
                                                                    • Instruction Fuzzy Hash: E0F0CAB6D00A06ABDB258F61C0047CAFBB4BB88714F18421AC42C67320E378B4A9CFC0
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1930770758.00000000026B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B2000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_26b2000_javaw.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 820fb2bd1306af8e717d05944195adf82643db201313b83298374a419d172659
                                                                    • Instruction ID: a5a1f91a9ce4676f7bfd0c65aa0af804b4af72e03af7537cb352297a04effb6f
                                                                    • Opcode Fuzzy Hash: 820fb2bd1306af8e717d05944195adf82643db201313b83298374a419d172659
                                                                    • Instruction Fuzzy Hash: D6F0CAB6D00A06ABDB258F61C0047CAFBB4BB88714F14421AC42C63720D778B4A9CFC0
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1930770758.00000000026B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B2000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_26b2000_javaw.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: db6b799af01ce8f83fbf0bb6c0a79060954fe92abe278ebdfe04214b2cd41a83
                                                                    • Instruction ID: 1c9d6dabbc4058d031a54017e5cd92ac241954cb27fcf6dadb2d251c86146565
                                                                    • Opcode Fuzzy Hash: db6b799af01ce8f83fbf0bb6c0a79060954fe92abe278ebdfe04214b2cd41a83
                                                                    • Instruction Fuzzy Hash: B2F0C2B6D00A06ABDB258F61C0047CAFBB4BB44714F14421AC42C67310D378B465CFC1
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1930770758.00000000026B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B2000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_26b2000_javaw.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 58538615fb1f07714d1724b677e4269953d2166634b63e523942d9bdfae9dbd8
                                                                    • Instruction ID: 3b5ba1c8da4b09fff5ec2d6656a1cad1539be3c4bf64a445240f52e5fe63ad60
                                                                    • Opcode Fuzzy Hash: 58538615fb1f07714d1724b677e4269953d2166634b63e523942d9bdfae9dbd8
                                                                    • Instruction Fuzzy Hash: B9F0CAB6D00A06ABDB258F61C0047CAFBB4BB88714F19421AC52C63360D378B4A9CFC0
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1930770758.00000000026B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B2000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_26b2000_javaw.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 977510d25bfa77a9f1a5be6bead7aa22e9c4ad656c8ef21cc6cded219d3ed89c
                                                                    • Instruction ID: a12522e887be0812d8adfa76d4d4e504e7a156c6223546339a23b64ee0978412
                                                                    • Opcode Fuzzy Hash: 977510d25bfa77a9f1a5be6bead7aa22e9c4ad656c8ef21cc6cded219d3ed89c
                                                                    • Instruction Fuzzy Hash: A6F0C2B6D00A06ABDB258F61C0047CAFBB4BB44714F14421AC52C67310D378B465CFC0
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1930770758.0000000002754000.00000040.00000800.00020000.00000000.sdmp, Offset: 02754000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_2754000_javaw.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 736e87782326a25bc1fbc53c5a0422e9fd2903ea543d2d73b1ad81f68acf6e1d
                                                                    • Instruction ID: 66efc39ae609fd0967ac90a356bc1f93ca2f2d67dd98e377472a128e9781788c
                                                                    • Opcode Fuzzy Hash: 736e87782326a25bc1fbc53c5a0422e9fd2903ea543d2d73b1ad81f68acf6e1d
                                                                    • Instruction Fuzzy Hash: 0F517272A047218FC711CF28C48462AF7F2BF89714F198A5DDC98A7355D771E986CB82
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1930770758.0000000002754000.00000040.00000800.00020000.00000000.sdmp, Offset: 02754000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_2754000_javaw.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 78b5e46fd764642a316965d621364c8f23013f227b3638614c770532d5f5935d
                                                                    • Instruction ID: 9d3860e176658aa91555be4bf7fd41e9441964ddb09d28caac445451e49057a8
                                                                    • Opcode Fuzzy Hash: 78b5e46fd764642a316965d621364c8f23013f227b3638614c770532d5f5935d
                                                                    • Instruction Fuzzy Hash: 5F31B96248E7D64FD7435B709CAA2817FB09F13224B1A04DBC4C0DF5A7E19D484EC762