Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Wupos Reciept.pdf.jar

Overview

General Information

Sample name:Wupos Reciept.pdf.jar
Analysis ID:1585137
MD5:8aa07afe106eb816af3cf134bfe1f964
SHA1:3df15108ac18028d676f5f1330871825259b7254
SHA256:2f9464c09525178bba5bcca06a8f77c1432ad5a5415157970efca683212cf711
Tags:adwindjarlummastealeruser-zhuzhu0009
Infos:

Detection

Branchlock Obfuscator
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Branchlock Obfuscator
AI detected suspicious sample
Exploit detected, runtime environment starts unknown processes
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses an obfuscated file name to hide its real file extension (double extension)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to detect virtual machines (SLDT)
Contains functionality to query CPU information (cpuid)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cmd.exe (PID: 5684 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Wupos Reciept.pdf.jar"" >> C:\cmdlinestart.log 2>&1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
    • conhost.exe (PID: 4540 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • java.exe (PID: 3052 cmdline: "C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Wupos Reciept.pdf.jar" MD5: 9DAA53BAB2ECB33DC0D9CA51552701FA)
      • icacls.exe (PID: 4364 cmdline: C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M MD5: 2E49585E4E08565F52090B144062F97E)
        • conhost.exe (PID: 6620 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • tasklist.exe (PID: 644 cmdline: tasklist.exe MD5: 0A4448B31CE7F83CB7691A2657F330F1)
        • conhost.exe (PID: 5676 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Wupos Reciept.pdf.jarJoeSecurity_BranchlockObfuscatorYara detected Branchlock ObfuscatorJoe Security
    SourceRuleDescriptionAuthorStrings
    00000002.00000003.2128343886.0000000000D79000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BranchlockObfuscatorYara detected Branchlock ObfuscatorJoe Security
      00000002.00000002.2181309691.00000000046E0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BranchlockObfuscatorYara detected Branchlock ObfuscatorJoe Security
        Process Memory Space: java.exe PID: 3052JoeSecurity_BranchlockObfuscatorYara detected Branchlock ObfuscatorJoe Security
          No Sigma rule has matched
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 87.9% probability

          Software Vulnerabilities

          barindex
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\tasklist.exe
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 4x nop then cmp eax, dword ptr [ecx+04h]2_2_02678998
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 4x nop then cmp eax, dword ptr [ecx+04h]2_2_0267B598
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: seasonmonster.s3.us-east-1.amazonaws.com
          Source: java.exe, 00000002.00000002.2195132739.0000000009DF7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bugreport.sun.com/bugreport/
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
          Source: java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html
          Source: java.exe, 00000002.00000002.2195132739.000000000A0C0000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html0
          Source: java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl
          Source: java.exe, 00000002.00000002.2195132739.000000000A0C0000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl0
          Source: java.exe, 00000002.00000002.2197059748.00000000156C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificatG
          Source: java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl
          Source: java.exe, 00000002.00000002.2195132739.000000000A0C0000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
          Source: java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl
          Source: java.exe, 00000002.00000002.2195132739.000000000A0C0000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl0
          Source: java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl
          Source: java.exe, 00000002.00000002.2195132739.000000000A0C0000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl0
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
          Source: java.exe, 00000002.00000002.2195132739.0000000009E0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://java.oracle.com/
          Source: java.exe, 00000002.00000002.2197059748.00000000155E8000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000002.2197059748.00000000153E0000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000002.2195132739.000000000A031000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://null.oracle.com/
          Source: java.exe, 00000002.00000002.2197059748.00000000153E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://null.oracle.com/B
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
          Source: java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://policy.camerfirma.com
          Source: java.exe, 00000002.00000002.2195132739.000000000A0C0000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://policy.camerfirma.com0
          Source: java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2182331006.0000000004C9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/
          Source: java.exe, 00000002.00000002.2182331006.0000000004C9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/#
          Source: java.exe, 00000002.00000002.2195132739.000000000A0C0000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/0
          Source: java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2182331006.0000000004CCE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.chambersign.org
          Source: java.exe, 00000002.00000002.2195132739.000000000A0C0000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.chambersign.org1
          Source: java.exe, 00000002.00000002.2182331006.0000000004CCE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.chambersign.org;
          Source: java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm
          Source: java.exe, 00000002.00000002.2195132739.000000000A0C0000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
          Source: java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps
          Source: java.exe, 00000002.00000002.2195132739.000000000A0C0000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps0
          Source: Wupos Reciept.pdf.jarString found in binary or memory: https://branchlock.net
          Source: java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com
          Source: java.exe, 00000002.00000002.2195132739.000000000A0C0000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
          Source: java.exe, 00000002.00000002.2182331006.0000000004C9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://repository.luxtrust.lu
          Source: java.exe, 00000002.00000002.2195132739.000000000A0C0000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://repository.luxtrust.lu0
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/1.jar
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/2.jar
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/3.jar
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/checker.jar
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/email.js
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/history.jar
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/recovery.jar
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/res.jar
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/swiftcopy.pdf
          Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0268392B2_2_0268392B
          Source: classification engineClassification label: mal64.expl.evad.winJAR@10/4@1/1
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Vault\credJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5676:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4540:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6620:120:WilError_03
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeFile created: C:\Users\user\AppData\Local\Temp\hsperfdata_userJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Wupos Reciept.pdf.jar"" >> C:\cmdlinestart.log 2>&1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\java.exe "C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Wupos Reciept.pdf.jar"
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
          Source: C:\Windows\SysWOW64\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist.exe
          Source: C:\Windows\SysWOW64\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\java.exe "C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Wupos Reciept.pdf.jar" Jump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist.exeJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: version.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\icacls.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior

          Data Obfuscation

          barindex
          Source: Yara matchFile source: Wupos Reciept.pdf.jar, type: SAMPLE
          Source: Yara matchFile source: 00000002.00000003.2128343886.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.2181309691.00000000046E0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: java.exe PID: 3052, type: MEMORYSTR
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0268164D push ecx; retn 0022h2_2_02681702
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0267C280 push 680267C3h; ret 2_2_0267C285
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0267C288 push 680267C3h; ret 2_2_0267C28D
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_02681393 push es; iretd 2_2_0268139A
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_02679991 push cs; retf 2_2_026799B1
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_025DD8F7 push 00000000h; mov dword ptr [esp], esp2_2_025DD921
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_025DA21B push ecx; ret 2_2_025DA225
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_025DA20A push ecx; ret 2_2_025DA21A
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_025DBB67 push 00000000h; mov dword ptr [esp], esp2_2_025DBB8D
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_025DB3B7 push 00000000h; mov dword ptr [esp], esp2_2_025DB3DD
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_025DD8D1 push 00000000h; mov dword ptr [esp], esp2_2_025DD921
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_025DB947 push 00000000h; mov dword ptr [esp], esp2_2_025DB96D
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_025DC477 push 00000000h; mov dword ptr [esp], esp2_2_025DC49D

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: Possible double extension: pdf.jarStatic PE information: Wupos Reciept.pdf.jar
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
          Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AUTORUNSC.EXE8
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AUTORUNS.EXE8
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXE8
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OLLYDBG.EXE8
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: PROCMON.EXE8
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: FILEMON.EXE8
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: FIDDLER.EXE8
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: REGMON.EXE8
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_02682E69 sldt word ptr [eax]2_2_02682E69
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: java.exe, 00000002.00000003.2129571502.0000000014C6B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: com/sun/corba/se/impl/util/SUNVMCID.classPK
          Source: java.exe, 00000002.00000003.2129571502.0000000014C6B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &com/sun/corba/se/impl/util/SUNVMCID.classPK
          Source: java.exe, 00000002.00000002.2180668186.0000000000D3A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [Ljava/lang/VirtualMachineError;
          Source: java.exe, 00000002.00000003.2129571502.0000000014C6B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: org/omg/CORBA/OMGVMCID.classPK
          Source: java.exe, 00000002.00000002.2180668186.0000000000D3A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: cjava/lang/VirtualMachineError
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware.exe8
          Source: java.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vboxtray.exe8
          Source: java.exe, 00000002.00000003.2129571502.0000000014C6B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: java/lang/VirtualMachineError.classPK
          Source: java.exe, 00000002.00000002.2180668186.0000000000D3A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_026AD1D0 LdrInitializeThunk,2_2_026AD1D0
          Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeMemory protected: page read and write | page guardJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\java.exe "C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Wupos Reciept.pdf.jar" Jump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist.exeJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_025D03C0 cpuid 2_2_025D03C0
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\client\jvm.dll VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Users\user\AppData\Local\Temp\hsperfdata_user\3052 VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\resources.jar VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\rt.jar VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\jsse.jar VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\jce.jar VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Windows Management Instrumentation
          1
          Services File Permissions Weakness
          11
          Process Injection
          11
          Masquerading
          OS Credential Dumping11
          Security Software Discovery
          Remote Services1
          Archive Collected Data
          12
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts1
          Exploitation for Client Execution
          1
          DLL Side-Loading
          1
          Services File Permissions Weakness
          1
          Virtualization/Sandbox Evasion
          LSASS Memory1
          Virtualization/Sandbox Evasion
          Remote Desktop ProtocolData from Removable Media1
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
          DLL Side-Loading
          1
          Disable or Modify Tools
          Security Account Manager23
          System Information Discovery
          SMB/Windows Admin SharesData from Network Shared Drive2
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
          Process Injection
          NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
          Obfuscated Files or Information
          LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Services File Permissions Weakness
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          DLL Side-Loading
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1585137 Sample: Wupos Reciept.pdf.jar Startdate: 07/01/2025 Architecture: WINDOWS Score: 64 25 seasonmonster.s3.us-east-1.amazonaws.com 2->25 27 s3-r-w.us-east-1.amazonaws.com 2->27 31 Yara detected Branchlock Obfuscator 2->31 33 Uses an obfuscated file name to hide its real file extension (double extension) 2->33 35 Exploit detected, runtime environment starts unknown processes 2->35 37 AI detected suspicious sample 2->37 9 cmd.exe 2 2->9         started        signatures3 process4 process5 11 java.exe 23 9->11         started        15 conhost.exe 9->15         started        dnsIp6 29 s3-r-w.us-east-1.amazonaws.com 52.216.217.130, 443, 49710 AMAZON-02US United States 11->29 39 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 11->39 17 tasklist.exe 1 11->17         started        19 icacls.exe 1 11->19         started        signatures7 process8 process9 21 conhost.exe 17->21         started        23 conhost.exe 19->23         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          Wupos Reciept.pdf.jar0%ReversingLabs
          Wupos Reciept.pdf.jar0%VirustotalBrowse
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          https://seasonmonster.s3.us-east-1.amazonaws.com/1.jar0%Avira URL Cloudsafe
          https://seasonmonster.s3.us-east-1.amazonaws.com/email.js0%Avira URL Cloudsafe
          http://repository.swisssign.com/#0%Avira URL Cloudsafe
          https://branchlock.net0%Avira URL Cloudsafe
          http://www.chambersign.org;0%Avira URL Cloudsafe
          https://seasonmonster.s3.us-east-1.amazonaws.com/res.jar0%Avira URL Cloudsafe
          https://seasonmonster.s3.us-east-1.amazonaws.com/2.jar0%Avira URL Cloudsafe
          https://seasonmonster.s3.us-east-1.amazonaws.com/history.jar0%Avira URL Cloudsafe
          https://seasonmonster.s3.us-east-1.amazonaws.com/swiftcopy.pdf0%Avira URL Cloudsafe
          http://null.oracle.com/B0%Avira URL Cloudsafe
          https://seasonmonster.s3.us-east-1.amazonaws.com/3.jar0%Avira URL Cloudsafe
          https://seasonmonster.s3.us-east-1.amazonaws.com/recovery.jar0%Avira URL Cloudsafe
          https://seasonmonster.s3.us-east-1.amazonaws.com/checker.jar0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          s3-r-w.us-east-1.amazonaws.com
          52.216.217.130
          truefalse
            high
            seasonmonster.s3.us-east-1.amazonaws.com
            unknown
            unknownfalse
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://crl.xrampsecurity.com/XGCA.crljava.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://crl.chambersign.org/chambersroot.crl0java.exe, 00000002.00000002.2195132739.000000000A0C0000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://repository.luxtrust.lu0java.exe, 00000002.00000002.2195132739.000000000A0C0000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.chambersign.org;java.exe, 00000002.00000002.2182331006.0000000004CCE000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://bugreport.sun.com/bugreport/java.exe, 00000002.00000002.2195132739.0000000009DF7000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://cps.chambersign.org/cps/chambersroot.html0java.exe, 00000002.00000002.2195132739.000000000A0C0000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://seasonmonster.s3.us-east-1.amazonaws.com/2.jarjava.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://java.oracle.com/java.exe, 00000002.00000002.2195132739.0000000009E0F000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://null.oracle.com/java.exe, 00000002.00000002.2197059748.00000000155E8000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000002.2197059748.00000000153E0000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000002.2195132739.000000000A031000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.chambersign.org1java.exe, 00000002.00000002.2195132739.000000000A0C0000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://repository.swisssign.com/0java.exe, 00000002.00000002.2195132739.000000000A0C0000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://branchlock.netWupos Reciept.pdf.jarfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://policy.camerfirma.comjava.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://seasonmonster.s3.us-east-1.amazonaws.com/1.jarjava.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://ocsp.quovadisoffshore.comjava.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://crl.securetrust.com/STCA.crl0java.exe, 00000002.00000002.2195132739.000000000A0C0000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.quovadisglobal.com/cpsjava.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://cps.chambersign.org/cps/chambersroot.htmljava.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://seasonmonster.s3.us-east-1.amazonaws.com/res.jarjava.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://seasonmonster.s3.us-east-1.amazonaws.com/email.jsjava.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://crl.securetrust.com/STCA.crljava.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://repository.luxtrust.lujava.exe, 00000002.00000002.2182331006.0000000004C9E000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://repository.swisssign.com/#java.exe, 00000002.00000002.2182331006.0000000004C9E000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.quovadisglobal.com/cps0java.exe, 00000002.00000002.2195132739.000000000A0C0000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://null.oracle.com/Bjava.exe, 00000002.00000002.2197059748.00000000153E0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://crl.xrampsecurity.com/XGCA.crl0java.exe, 00000002.00000002.2195132739.000000000A0C0000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://seasonmonster.s3.us-east-1.amazonaws.com/swiftcopy.pdfjava.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.quovadis.bmjava.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.quovadis.bm0java.exe, 00000002.00000002.2195132739.000000000A0C0000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://ocsp.quovadisoffshore.com0java.exe, 00000002.00000002.2195132739.000000000A0C0000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://seasonmonster.s3.us-east-1.amazonaws.com/history.jarjava.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://crl.chambersign.org/chambersroot.crljava.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://repository.swisssign.com/java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2182331006.0000000004C9E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.chambersign.orgjava.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2182331006.0000000004CCE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://policy.camerfirma.com0java.exe, 00000002.00000002.2195132739.000000000A0C0000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2195132739.000000000A13D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://seasonmonster.s3.us-east-1.amazonaws.com/3.jarjava.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://seasonmonster.s3.us-east-1.amazonaws.com/checker.jarjava.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://seasonmonster.s3.us-east-1.amazonaws.com/recovery.jarjava.exe, 00000002.00000002.2195132739.0000000009E7D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                • No. of IPs < 25%
                                                                • 25% < No. of IPs < 50%
                                                                • 50% < No. of IPs < 75%
                                                                • 75% < No. of IPs
                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                52.216.217.130
                                                                s3-r-w.us-east-1.amazonaws.comUnited States
                                                                16509AMAZON-02USfalse
                                                                Joe Sandbox version:41.0.0 Charoite
                                                                Analysis ID:1585137
                                                                Start date and time:2025-01-07 06:07:09 +01:00
                                                                Joe Sandbox product:CloudBasic
                                                                Overall analysis duration:0h 3m 26s
                                                                Hypervisor based Inspection enabled:false
                                                                Report type:full
                                                                Cookbook file name:defaultwindowsfilecookbook.jbs
                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                Number of analysed new started processes analysed:7
                                                                Number of new started drivers analysed:0
                                                                Number of existing processes analysed:0
                                                                Number of existing drivers analysed:0
                                                                Number of injected processes analysed:0
                                                                Technologies:
                                                                • HCA enabled
                                                                • EGA enabled
                                                                • GSI enabled (Java)
                                                                • AMSI enabled
                                                                Analysis Mode:default
                                                                Analysis stop reason:Timeout
                                                                Sample name:Wupos Reciept.pdf.jar
                                                                Detection:MAL
                                                                Classification:mal64.expl.evad.winJAR@10/4@1/1
                                                                EGA Information:
                                                                • Successful, ratio: 100%
                                                                HCA Information:Failed
                                                                Cookbook Comments:
                                                                • Found application associated with file extension: .jar
                                                                • Stop behavior analysis, all processes terminated
                                                                • Excluded IPs from analysis (whitelisted): 13.107.246.45
                                                                • Excluded domains from analysis (whitelisted): client.wns.windows.com, otelrules.azureedge.net
                                                                • Not all processes where analyzed, report is missing behavior information
                                                                • Report size getting too big, too many NtSetInformationFile calls found.
                                                                No simulations
                                                                No context
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                s3-r-w.us-east-1.amazonaws.comSwift Transaction Report.jsGet hashmaliciousBranchlock ObfuscatorBrowse
                                                                • 16.182.70.66
                                                                Swift Transaction Report.jsGet hashmaliciousBranchlock ObfuscatorBrowse
                                                                • 54.231.134.106
                                                                https://midoregoncu-securemessagecenter.s3.us-east-1.amazonaws.com/open/message_12832.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                • 54.231.130.18
                                                                http://img1.wsimg.com/blobby/go/9b6ed793-452c-4f8f-8f80-6847f4d114d7/downloads/71318864754.pdfGet hashmaliciousUnknownBrowse
                                                                • 52.217.134.50
                                                                https://5qc68jhomepl.blob.core.windows.net/9x0f8/index.htmlGet hashmaliciousUnknownBrowse
                                                                • 52.217.41.32
                                                                https://verification.com/omid_error?Get hashmaliciousUnknownBrowse
                                                                • 52.217.85.136
                                                                https://receptive-comfortable-paw.glitch.me/Get hashmaliciousUnknownBrowse
                                                                • 16.15.178.21
                                                                https://payroll-news.at-eu.therelayservice.com/service/BUX_ZozoSdJWCG_5j9jtL5kIM8s4zpz8F8daQ7vEahL5WDRxV7IghpJPwSaoWNEG9eO6H06U_y_gwUSZJc9fDfwYBqPUPrZdmmRzUZ9qHFiMcq2w4-i7crrAjeyo_fa156_U7Eu0Ww9PKs3fM5eYkKQ_3vneF9YQUPUya3C3-wlq3FWHKATIkpuQEfV3laRldFNeWNfYS-sS9ogrADD3n54QIIqJd8nlTvWUjJCrpgug-gBImSGXyayDT39pkqjgqB_40YKcUcppFI95cuu7iPqdT0iDrU2CjdVlbNBd7udGztDhsYo1On9eJe-8oAEXs4eUbwt4py8g4aPFRtdg8AUlv-D-xKGeqkuRGN01AKHTOx7qZI-nNi5aqPk4UOXYeA3nx4xY22_7T29dLhfKcAGet hashmaliciousUnknownBrowse
                                                                • 52.217.140.2
                                                                Employee_Important_Message.pdfGet hashmaliciousHTMLPhisherBrowse
                                                                • 16.182.106.106
                                                                Employee_Important_Message.pdfGet hashmaliciousUnknownBrowse
                                                                • 52.217.199.10
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                AMAZON-02USSwift Transaction Report.jsGet hashmaliciousBranchlock ObfuscatorBrowse
                                                                • 54.231.134.106
                                                                https://u896278.ct.sendgrid.net/ls/click?upn=u001.qpi-2F0q-2FpcJZ7AGoG9N-2BrxLxoGn8scq-2BedBfmGHFAiwRCk-2Fciku7nsS3YfQMNNJI09mLo_nYx4-2F6dkZkjW10KMIp5mXhxys1ng1sBiI-2Bi9ROMYt6d5xhIh5rIqEUIaIxVHh8-2Ftz-2FouCgfXZk6mMUe2uKm92SOgBLlBdhjnRJuhENZnIuGoEoPqnROi7OCzdabJBBnGjEwd2iK-2BngR2RyIIgM3XrJQ7wQhHrfqScifSW3iAsv3H5nGFK9ntcSdChvkxj0yXdE-2FQ0ICDszl57i6aZSB-2Fow-3D-3DGet hashmaliciousUnknownBrowse
                                                                • 13.33.219.205
                                                                sh4.elfGet hashmaliciousMiraiBrowse
                                                                • 54.171.230.55
                                                                https://report-scam.malwarebouncer.com/XcUR2TnV2VTlXT0s0Z0NYa01KSGt3dUtWMWNiblBrc29mMlpZUU1WdThBSjdDdTlRQTVDV1ZZd0pDeWRmUU5rQ1QvVDNiSlBNYWd2bTd0eTRkZW5jT0hrYTBKWHFiVUc4TVZBOGpiNkh4VG9OTm9zNTVUWHNmNWVydHpqbzhIc1llSzdzTHZ0dENVNWRLZy9BbCsyVDRMSGRHOThUWnV5QUxPU0RZL1dPalNYTmUzMTVoRzl5bmk1ZVZRPT0tLUdVYnJkMC9GazI3MWlxYmotLUpFOURyOWkzK1l6Vy9BYTVOVDBVNkE9PQ==?cid=2346401253Get hashmaliciousKnowBe4Browse
                                                                • 52.217.12.174
                                                                mpsl.elfGet hashmaliciousMiraiBrowse
                                                                • 34.249.145.219
                                                                la.bot.arm5.elfGet hashmaliciousMiraiBrowse
                                                                • 34.249.145.219
                                                                arm5.elfGet hashmaliciousMiraiBrowse
                                                                • 13.62.27.251
                                                                spc.elfGet hashmaliciousMiraiBrowse
                                                                • 52.9.216.221
                                                                i686.elfGet hashmaliciousMiraiBrowse
                                                                • 13.248.229.191
                                                                main_arm.elfGet hashmaliciousMiraiBrowse
                                                                • 34.249.145.219
                                                                No context
                                                                No context
                                                                Process:C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):52
                                                                Entropy (8bit):4.789207449193898
                                                                Encrypted:false
                                                                SSDEEP:3:oFj4I5vpm4USeQ6y:oJ5beQz
                                                                MD5:AA095502BB3E80FAA003DEF7DF30CCE7
                                                                SHA1:679EDB09FB1ADD67F4B2E1290D0E9D73AE124BF0
                                                                SHA-256:1C69A4B03FE57A670DEF7DBC76E86216004636DB3400239D5A3951799D2981CE
                                                                SHA-512:5DCA28E2AF9E52983C378F7C7373221D8C33158B862FFE05E298DF0E540FFE176EEA54F02B74B92AE07086A1C59D62630AC9898F57474AB2534841690FE8CD89
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:C:\Program Files (x86)\Java\jre-1.8..1736226481667..
                                                                Process:C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):65536
                                                                Entropy (8bit):1.299419012837216
                                                                Encrypted:false
                                                                SSDEEP:96:uHlraT8GknYUaMu6fU2LQUu2dOSBvH/1jo1D:uHe8GknYUaMu66U/VVH/5
                                                                MD5:A5CF844A029D15DC40A458982D65F5A9
                                                                SHA1:468956CAB083AD39197B2E1D75E166FCABC9CBD1
                                                                SHA-256:5D90BB10356857483239EC1045910E96011F0651F60AAF86EACD49CC2D5D3656
                                                                SHA-512:62ABA063128D7C06AC024892BD777A5E09CE2E400B674E6B1ACEB516EF67D6B3B82B51A616DB696FB692AB489A7700DEBF6C9721C187CA07123A6EAB33D28617
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:.........9............. .......8...........J...0...sun.rt._sync_Inflations.............8...........J...0...sun.rt._sync_Deflations.............@...........J...8...sun.rt._sync_ContendedLockAttempts..........8...........J...0...sun.rt._sync_FutileWakeups..........0...........J...(...sun.rt._sync_Parks..5.......@...........J...8...sun.rt._sync_EmptyNotifications.............8...........J...0...sun.rt._sync_Notifications..3.......8...........J...0...sun.rt._sync_SlowEnter..............8...........J...0...sun.rt._sync_SlowExit...............8...........J...0...sun.rt._sync_SlowNotify.............8...........J...0...sun.rt._sync_SlowNotifyAll..........8...........J...0...sun.rt._sync_FailedSpins............@...........J...8...sun.rt._sync_SuccessfulSpins................8...........J...0...sun.rt._sync_PrivateA...............8...........J...0...sun.rt._sync_PrivateB...............@...........J...8...sun.rt._sync_MonInCirculation...............8...........J...0...sun.rt._sync_MonScavenged...
                                                                Process:C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):45
                                                                Entropy (8bit):0.9111711733157262
                                                                Encrypted:false
                                                                SSDEEP:3:/lwlt7n:WNn
                                                                MD5:C8366AE350E7019AEFC9D1E6E6A498C6
                                                                SHA1:5731D8A3E6568A5F2DFBBC87E3DB9637DF280B61
                                                                SHA-256:11E6ACA8E682C046C83B721EEB5C72C5EF03CB5936C60DF6F4993511DDC61238
                                                                SHA-512:33C980D5A638BFC791DE291EBF4B6D263B384247AB27F261A54025108F2F85374B579A026E545F81395736DD40FA4696F2163CA17640DD47F1C42BC9971B18CD
                                                                Malicious:false
                                                                Reputation:high, very likely benign file
                                                                Preview:........................................J2SE.
                                                                Process:C:\Windows\SysWOW64\cmd.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):3254
                                                                Entropy (8bit):4.919077234352184
                                                                Encrypted:false
                                                                SSDEEP:48:j6Hv++fj1zQwLDZ25JOYHsrgeNSHsrge26HDTZI5wv1:jMv++LPLDyJOYHsGHsoMDTZI56
                                                                MD5:A8D484D615C3A68B9706343EB34FD7E0
                                                                SHA1:9A5434B50379F31189543E61DBD42E5568C1D12D
                                                                SHA-256:58C688E12BCEC765F88CFFF81F68FA816A3D77DA2E579EB7C1242EE31F1B310E
                                                                SHA-512:B11B11807FC22FF10BC5B3ABEA092096144E3E9607431F126C6AB7AF9D4DB70353EF20603A809781EFAC53571A0A4DE252B91812564D5D83FB4FB19F72373807
                                                                Malicious:false
                                                                Preview:javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target...at sun.security.ssl.Alert.createSSLException(Unknown Source)...at sun.security.ssl.TransportContext.fatal(Unknown Source)...at sun.security.ssl.TransportContext.fatal(Unknown Source)...at sun.security.ssl.TransportContext.fatal(Unknown Source)...at sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(Unknown Source)...at sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(Unknown Source)...at sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(Unknown Source)...at sun.security.ssl.SSLHandshake.consume(Unknown Source)...at sun.security.ssl.HandshakeContext.dispatch(Unknown Source)...at sun.security.ssl.HandshakeContext.dispatch(Unknown Source)...at sun.security.ssl.TransportContext.dispatch(Unknow
                                                                File type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                Entropy (8bit):4.906509528252416
                                                                TrID:
                                                                • Java Archive (13504/1) 62.80%
                                                                • ZIP compressed archive (8000/1) 37.20%
                                                                File name:Wupos Reciept.pdf.jar
                                                                File size:154'358 bytes
                                                                MD5:8aa07afe106eb816af3cf134bfe1f964
                                                                SHA1:3df15108ac18028d676f5f1330871825259b7254
                                                                SHA256:2f9464c09525178bba5bcca06a8f77c1432ad5a5415157970efca683212cf711
                                                                SHA512:63434f199f85ed799f3f8d38a7d9fbd37ac2905a8bba36774048eef13d4b009de34adc9307694f42a174d67846c2cd0c7fc1b5552ccc0a4139649930ce1db621
                                                                SSDEEP:384:eaXMiSVWKcOgZiuc0vqVUwkMXlzPonRNNxvnWTFZkENvkmtqfazE:eQDq5ggucghqFQ/q1NvkGLE
                                                                TLSH:F7E3A6E2D93754C62EB1FCA5130CCA6EB5C21DAE531B859440B81D786A808FECF6C65F
                                                                File Content Preview:PK........%.$Z................META-INF/MANIFEST.MFUT.....yg.....M..LK-...K-*....R0.3..M...u.I,..RH..MJ,..L.....$.dX).qq..PK..{D.Y:...;...PK........ g&Z....................class/;.o.>.....VF....[........bg`f.2.X....PK......%...)...PK........ g&Z...........
                                                                Icon Hash:d08c8e8ea2868a54
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Jan 7, 2025 06:08:05.525940895 CET49710443192.168.2.652.216.217.130
                                                                Jan 7, 2025 06:08:05.525983095 CET4434971052.216.217.130192.168.2.6
                                                                Jan 7, 2025 06:08:05.526062965 CET49710443192.168.2.652.216.217.130
                                                                Jan 7, 2025 06:08:05.696526051 CET49710443192.168.2.652.216.217.130
                                                                Jan 7, 2025 06:08:05.696548939 CET4434971052.216.217.130192.168.2.6
                                                                Jan 7, 2025 06:08:06.250754118 CET4434971052.216.217.130192.168.2.6
                                                                Jan 7, 2025 06:08:06.250870943 CET49710443192.168.2.652.216.217.130
                                                                Jan 7, 2025 06:08:06.250889063 CET4434971052.216.217.130192.168.2.6
                                                                Jan 7, 2025 06:08:06.250941038 CET49710443192.168.2.652.216.217.130
                                                                Jan 7, 2025 06:08:06.289861917 CET49710443192.168.2.652.216.217.130
                                                                Jan 7, 2025 06:08:06.289880991 CET4434971052.216.217.130192.168.2.6
                                                                Jan 7, 2025 06:08:06.376069069 CET49710443192.168.2.652.216.217.130
                                                                Jan 7, 2025 06:08:06.376085997 CET4434971052.216.217.130192.168.2.6
                                                                Jan 7, 2025 06:08:06.376379967 CET4434971052.216.217.130192.168.2.6
                                                                Jan 7, 2025 06:08:06.376502991 CET49710443192.168.2.652.216.217.130
                                                                Jan 7, 2025 06:08:06.376885891 CET49710443192.168.2.652.216.217.130
                                                                Jan 7, 2025 06:08:06.376904964 CET4434971052.216.217.130192.168.2.6
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Jan 7, 2025 06:08:05.498671055 CET5107253192.168.2.61.1.1.1
                                                                Jan 7, 2025 06:08:05.521584988 CET53510721.1.1.1192.168.2.6
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Jan 7, 2025 06:08:05.498671055 CET192.168.2.61.1.1.10xa507Standard query (0)seasonmonster.s3.us-east-1.amazonaws.comA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Jan 7, 2025 06:08:05.521584988 CET1.1.1.1192.168.2.60xa507No error (0)seasonmonster.s3.us-east-1.amazonaws.coms3-r-w.us-east-1.amazonaws.comCNAME (Canonical name)IN (0x0001)false
                                                                Jan 7, 2025 06:08:05.521584988 CET1.1.1.1192.168.2.60xa507No error (0)s3-r-w.us-east-1.amazonaws.com52.216.217.130A (IP address)IN (0x0001)false
                                                                Jan 7, 2025 06:08:05.521584988 CET1.1.1.1192.168.2.60xa507No error (0)s3-r-w.us-east-1.amazonaws.com16.182.100.242A (IP address)IN (0x0001)false
                                                                Jan 7, 2025 06:08:05.521584988 CET1.1.1.1192.168.2.60xa507No error (0)s3-r-w.us-east-1.amazonaws.com52.217.231.58A (IP address)IN (0x0001)false
                                                                Jan 7, 2025 06:08:05.521584988 CET1.1.1.1192.168.2.60xa507No error (0)s3-r-w.us-east-1.amazonaws.com3.5.10.172A (IP address)IN (0x0001)false
                                                                Jan 7, 2025 06:08:05.521584988 CET1.1.1.1192.168.2.60xa507No error (0)s3-r-w.us-east-1.amazonaws.com54.231.136.162A (IP address)IN (0x0001)false
                                                                Jan 7, 2025 06:08:05.521584988 CET1.1.1.1192.168.2.60xa507No error (0)s3-r-w.us-east-1.amazonaws.com16.15.216.48A (IP address)IN (0x0001)false
                                                                Jan 7, 2025 06:08:05.521584988 CET1.1.1.1192.168.2.60xa507No error (0)s3-r-w.us-east-1.amazonaws.com52.217.174.146A (IP address)IN (0x0001)false
                                                                Jan 7, 2025 06:08:05.521584988 CET1.1.1.1192.168.2.60xa507No error (0)s3-r-w.us-east-1.amazonaws.com52.216.29.216A (IP address)IN (0x0001)false

                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:00:08:00
                                                                Start date:07/01/2025
                                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Wupos Reciept.pdf.jar"" >> C:\cmdlinestart.log 2>&1
                                                                Imagebase:0x1c0000
                                                                File size:236'544 bytes
                                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:1
                                                                Start time:00:08:00
                                                                Start date:07/01/2025
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff66e660000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:2
                                                                Start time:00:08:00
                                                                Start date:07/01/2025
                                                                Path:C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Wupos Reciept.pdf.jar"
                                                                Imagebase:0xc20000
                                                                File size:257'664 bytes
                                                                MD5 hash:9DAA53BAB2ECB33DC0D9CA51552701FA
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_BranchlockObfuscator, Description: Yara detected Branchlock Obfuscator, Source: 00000002.00000003.2128343886.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_BranchlockObfuscator, Description: Yara detected Branchlock Obfuscator, Source: 00000002.00000002.2181309691.00000000046E0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:moderate
                                                                Has exited:true

                                                                Target ID:3
                                                                Start time:00:08:01
                                                                Start date:07/01/2025
                                                                Path:C:\Windows\SysWOW64\icacls.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
                                                                Imagebase:0xf60000
                                                                File size:29'696 bytes
                                                                MD5 hash:2E49585E4E08565F52090B144062F97E
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:4
                                                                Start time:00:08:01
                                                                Start date:07/01/2025
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff66e660000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:5
                                                                Start time:00:08:01
                                                                Start date:07/01/2025
                                                                Path:C:\Windows\SysWOW64\tasklist.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:tasklist.exe
                                                                Imagebase:0x8c0000
                                                                File size:79'360 bytes
                                                                MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:6
                                                                Start time:00:08:01
                                                                Start date:07/01/2025
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff66e660000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:1.3%
                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                  Signature Coverage:0%
                                                                  Total number of Nodes:3
                                                                  Total number of Limit Nodes:0
                                                                  execution_graph 9397 25d0672 9398 25d06a5 KiUserExceptionDispatcher 9397->9398 9400 25d06d7 9398->9400

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 228 26ad1d0-26ad204 229 26ad20a-26ad224 228->229 230 26ad28c-26ad297 228->230 231 26ad2ad-26ad2b3 229->231 233 26ad22a-26ad22f 229->233 230->231 232 26ad29d-26ad2a7 230->232 237 26ad479-26ad492 231->237 238 26ad2b9-26ad2d5 231->238 232->231 236 26ad4cd-26ad4d9 232->236 234 26ad280-26ad288 233->234 235 26ad231-26ad236 233->235 234->230 239 26ad238-26ad251 235->239 240 26ad25c-26ad275 235->240 236->231 241 26ad498-26ad4a5 237->241 242 26ad547-26ad54e 237->242 243 26ad2db-26ad2de 238->243 244 26ad453 238->244 239->236 245 26ad257 239->245 240->236 246 26ad27b 240->246 248 26ad4aa-26ad4b2 241->248 256 26ad4b4-26ad58b 242->256 249 26ad41a-26ad429 243->249 250 26ad2e4-26ad2e9 243->250 247 26ad458-26ad536 244->247 245->231 246->231 248->248 248->256 253 26ad42f-26ad433 249->253 254 26ad443-26ad452 249->254 257 26ad2ec-26ad319 call 26af8b0 250->257 253->254 258 26ad439-26ad43d 253->258 269 26ad591-26ad595 256->269 270 26ad5a5-26ad5aa 256->270 265 26ad3de-26ad3ed 257->265 266 26ad31f-26ad325 257->266 258->254 260 26ad516-26ad522 258->260 260->254 272 26ad3f3-26ad3f7 265->272 273 26ad407-26ad419 265->273 267 26ad32b-26ad339 266->267 268 26ad3a8-26ad3b7 266->268 274 26ad33f-26ad347 call 267ab74 267->274 275 26ad355-26ad36b 267->275 277 26ad3bd-26ad3c1 268->277 278 26ad3d1-26ad3dd 268->278 269->270 276 26ad59b-26ad59f 269->276 282 26ad5b0-26ad5bc 270->282 272->273 279 26ad3fd-26ad401 272->279 284 26ad34c-26ad34f 274->284 275->257 276->270 276->282 277->278 283 26ad3c7-26ad3cb 277->283 279->273 280 26ad505-26ad511 279->280 280->273 282->270 283->278 285 26ad4f4-26ad500 283->285 284->275 286 26ad370-26ad37f 284->286 285->278 290 26ad399-26ad3a7 286->290 291 26ad385-26ad389 286->291 291->290 292 26ad38f-26ad393 291->292 292->290 293 26ad4e3-26ad4ef 292->293 293->290
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2180802196.0000000002675000.00000040.00000800.00020000.00000000.sdmp, Offset: 02675000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2675000_java.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 894a5367b3b691c6e0de2ac14e88bccde44b65d2960f430799b555add2c87684
                                                                  • Instruction ID: 2e390de2420381442a49a66fbdc0bacfb5c3f7ba69414b207de95d21d17e59f3
                                                                  • Opcode Fuzzy Hash: 894a5367b3b691c6e0de2ac14e88bccde44b65d2960f430799b555add2c87684
                                                                  • Instruction Fuzzy Hash: 15A13A716057008FC719DF24C49461AB3F2FB89718F29886DE9899BB54DB35EC42CF82

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • KiUserExceptionDispatcher.NTDLL ref: 025D06D5
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2180802196.00000000025D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025D0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_25d0000_java.jbxd
                                                                  Similarity
                                                                  • API ID: DispatcherExceptionUser
                                                                  • String ID:
                                                                  • API String ID: 6842923-0
                                                                  • Opcode ID: 320aa1f1d1fbbf24c69a9ab0f744010e5888f20a955eeea2c9449e33aee26108
                                                                  • Instruction ID: 948ba9114b0cb84fd00e4819e4d8e41550cdd6f51fbfb0550b7ffc16cdcda2bc
                                                                  • Opcode Fuzzy Hash: 320aa1f1d1fbbf24c69a9ab0f744010e5888f20a955eeea2c9449e33aee26108
                                                                  • Instruction Fuzzy Hash: C71179B6D0022A8FCF24DF4CC4815EDBBB0FB89314F164529EC65A3381D7346920CB89

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 14 25dd8f7-25dd93b 15 25dd941-25dd9aa call 25dd94b 14->15 16 25dd9b0-25dd9c7 14->16 15->16 18 25dd9cd-25dd9ed 15->18 16->18 19 25dde5f-25dde64 call 25dde6e 16->19 21 25dda0b-25dda25 18->21 22 25dd9f3-25dda08 18->22 27 25dde69-25ddec8 19->27 25 25dda2b call 25dda35 21->25 26 25dda95-25ddaa6 21->26 22->21 31 25dda30-25dda92 25->31 33 25ddaac-25ddabe 26->33 34 25ddac2-25ddacb 26->34 31->26 33->34 36 25ddb3b-25ddb65 34->36 37 25ddad1-25ddb38 call 25ddadb 34->37 40 25ddb71-25ddb73 36->40 37->36 42 25ddb75 40->42 43 25ddaf6-25ddb34 40->43 44 25ddb77-25ddb82 42->44 45 25ddb83-25ddb8d 42->45 47 25ddb90-25ddbc7 44->47 48 25ddb84-25ddbc7 44->48 45->47 49 25ddbcd-25ddbd4 47->49 50 25ddbda-25ddbeb 47->50 48->49 48->50 49->50 51 25ddbee-25ddc2a 49->51 50->51 52 25ddc5b-25ddc65 51->52 53 25ddc30-25ddc3b 51->53 57 25ddc6b-25ddc71 52->57 58 25ddc72-25ddc82 52->58 55 25ddc56-25ddc5a 53->55 56 25ddc41-25ddc46 53->56 55->52 59 25ddc4c-25ddc4f 56->59 60 25ddc54 56->60 57->58 61 25ddcfc-25ddd05 58->61 62 25ddc88-25ddcf0 call 25ddc92 call 25ddcf5 58->62 59->55 60->55 63 25dde28-25dde2f 61->63 64 25ddd0b-25ddd13 61->64 62->61 67 25dde4d-25dde5b 63->67 68 25dde35-25dde4a 63->68 69 25ddd8d-25ddda4 64->69 70 25ddd19-25ddd81 call 25ddd23 call 25ddd86 64->70 67->19 68->67 74 25dddaa-25dddae 69->74 75 25dde25 69->75 70->69 74->75 80 25dddb4-25dddb8 74->80 75->63 80->75 81 25dddbe-25dddc6 call 25dddcb 80->81 81->75
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2180802196.00000000025D2000.00000040.00000800.00020000.00000000.sdmp, Offset: 025D2000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_25d2000_java.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: `pl
                                                                  • API String ID: 0-362109939
                                                                  • Opcode ID: 456efb0e7536ac0b63163644f9cb58838170bbe1e23c8c83d5b2c477f2712dbc
                                                                  • Instruction ID: 62317a32297b261c1be06910cae7725c8f568a45f3e06e8eca72c6694dbe904f
                                                                  • Opcode Fuzzy Hash: 456efb0e7536ac0b63163644f9cb58838170bbe1e23c8c83d5b2c477f2712dbc
                                                                  • Instruction Fuzzy Hash: E3A1C072A06601DFDB28CF28C594BA9FBB1FF49318F18859DD81A4B391CB35A844CF95

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 88 25dd8d1-25dd93b 90 25dd941-25dd9aa call 25dd94b 88->90 91 25dd9b0-25dd9c7 88->91 90->91 93 25dd9cd-25dd9ed 90->93 91->93 94 25dde5f-25ddec8 call 25dde6e 91->94 96 25dda0b-25dda25 93->96 97 25dd9f3-25dda08 93->97 100 25dda2b-25dda92 call 25dda35 96->100 101 25dda95-25ddaa6 96->101 97->96 100->101 108 25ddaac-25ddabe 101->108 109 25ddac2-25ddacb 101->109 108->109 111 25ddb3b-25ddb65 109->111 112 25ddad1-25ddb38 call 25ddadb 109->112 115 25ddb71-25ddb73 111->115 112->111 117 25ddb75 115->117 118 25ddaf6-25ddb34 115->118 119 25ddb77-25ddb82 117->119 120 25ddb83-25ddb8d 117->120 122 25ddb90-25ddbc7 119->122 123 25ddb84-25ddbc7 119->123 120->122 124 25ddbcd-25ddbd4 122->124 125 25ddbda-25ddbeb 122->125 123->124 123->125 124->125 126 25ddbee-25ddc2a 124->126 125->126 127 25ddc5b-25ddc65 126->127 128 25ddc30-25ddc3b 126->128 132 25ddc6b-25ddc71 127->132 133 25ddc72-25ddc82 127->133 130 25ddc56-25ddc5a 128->130 131 25ddc41-25ddc46 128->131 130->127 134 25ddc4c-25ddc4f 131->134 135 25ddc54 131->135 132->133 136 25ddcfc-25ddd05 133->136 137 25ddc88-25ddcf0 call 25ddc92 call 25ddcf5 133->137 134->130 135->130 138 25dde28-25dde2f 136->138 139 25ddd0b-25ddd13 136->139 137->136 142 25dde4d-25dde5b 138->142 143 25dde35-25dde4a 138->143 144 25ddd8d-25ddda4 139->144 145 25ddd19-25ddd81 call 25ddd23 call 25ddd86 139->145 142->94 143->142 149 25dddaa-25dddae 144->149 150 25dde25 144->150 145->144 149->150 155 25dddb4-25dddb8 149->155 150->138 155->150 156 25dddbe-25dddc6 call 25dddcb 155->156 156->150
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2180802196.00000000025D2000.00000040.00000800.00020000.00000000.sdmp, Offset: 025D2000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_25d2000_java.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: `pl
                                                                  • API String ID: 0-362109939
                                                                  • Opcode ID: f10c6d16197538eaf70715279211ace1a83ea83fe378e6f5dfbb109e4536c552
                                                                  • Instruction ID: 38bb711ef03b03cacac339c5770963dc36fc99324076a5210ad993cda01c7ab1
                                                                  • Opcode Fuzzy Hash: f10c6d16197538eaf70715279211ace1a83ea83fe378e6f5dfbb109e4536c552
                                                                  • Instruction Fuzzy Hash: CA71DD72606601DFEB28CF28C494BAAFBB1FB49718F18859DD8198B391C774A840CF95

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 163 260c2f0-260c2f5 164 260c2f8-260c305 163->164 165 260c309-260c313 164->165 166 260c31a-260c328 165->166 167 260c32b-260c33a 166->167 168 260c33c-260c33f 167->168 169 260c341-260c348 168->169 170 260c2c5-260c2d5 168->170 171 260c2d6-260c2d7 169->171 172 260c34a-260c351 169->172 170->171 175 260c2d9-260c2da 171->175 176 260c2db-260c2e4 171->176 173 260c353-260c35a 172->173 174 260c2e7-260c2ee 172->174 173->164 177 260c35c-260c363 173->177 174->163 175->176 176->174 177->165 178 260c364-260c36c 177->178 178->166 179 260c36e-260c375 178->179 179->167 181 260c377-260c37e 179->181 181->168 182 260c380-260c38a 181->182 184 260c502-260c510 182->184 185 260c51b-260c544 184->185 186 260c578-260c5b6 185->186 187 260c54a-260c571 185->187 188 260c5b8-260c5dd 186->188 187->186 188->188 189 260c5df-260c65c 188->189 191 260c662-260c669 189->191 192 260c67d-260c67f 189->192 193 260c686-260c689 191->193 194 260c66f-260c678 191->194 192->193 194->193
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2180802196.000000000260A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0260A000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_260a000_java.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ef200c5d86c3bc4ed85744ac168bcd8ce627e431df76d04ead35ce46d26d72c6
                                                                  • Instruction ID: d4f798cd73e3fc8b6dcd44e2525295d5b5c3153c7e2cb5a4725f0ed6dd1ed70d
                                                                  • Opcode Fuzzy Hash: ef200c5d86c3bc4ed85744ac168bcd8ce627e431df76d04ead35ce46d26d72c6
                                                                  • Instruction Fuzzy Hash: 15D1C4B280D7C09FE3268B6488923E6BFB0FF56314F09459AD4CC8B693D7391419CB96

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 195 260c2a7-260c2bf 196 260c2c5-260c2d5 195->196 197 260c2d6-260c2d7 196->197 198 260c2d9-260c2da 197->198 199 260c2db-260c2e4 197->199 198->199 200 260c2e7-260c2f5 199->200 202 260c2f8-260c305 200->202 203 260c309-260c313 202->203 204 260c31a-260c328 203->204 205 260c32b-260c33a 204->205 206 260c33c-260c33f 205->206 206->196 207 260c341-260c348 206->207 207->197 208 260c34a-260c351 207->208 208->200 209 260c353-260c35a 208->209 209->202 210 260c35c-260c363 209->210 210->203 211 260c364-260c36c 210->211 211->204 212 260c36e-260c375 211->212 212->205 214 260c377-260c37e 212->214 214->206 215 260c380-260c38a 214->215 217 260c502-260c510 215->217 218 260c51b-260c544 217->218 219 260c578-260c5b6 218->219 220 260c54a-260c571 218->220 221 260c5b8-260c5dd 219->221 220->219 221->221 222 260c5df-260c65c 221->222 224 260c662-260c669 222->224 225 260c67d-260c67f 222->225 226 260c686-260c689 224->226 227 260c66f-260c678 224->227 225->226 227->226
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2180802196.000000000260A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0260A000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_260a000_java.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 979e79f98d77fffba28c39be72eb67d77944ee6b0c7aa0c9d141e320f2d72cba
                                                                  • Instruction ID: e66e2cc0ba475c74fd7062dc35e4deda74f5ccd90193ab1ac7324d55cf3d9601
                                                                  • Opcode Fuzzy Hash: 979e79f98d77fffba28c39be72eb67d77944ee6b0c7aa0c9d141e320f2d72cba
                                                                  • Instruction Fuzzy Hash: 89C1B3B2908B80DFE3269B6494963E6BFF0FF56314F05059AC4C88B693D7391459CB46

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 295 2731ee7-2731f01 296 2731f07 295->296 297 2731f0b-2731f19 295->297 296->297 298 2731f1e-2731f26 297->298 299 2731f27-2731f38 298->299 300 2731f3b-2731f44 298->300 299->300 302 2731f53-2731f55 300->302 302->298 303 2731f57-2731f7c 302->303 304 2731f82-2731f89 303->304 305 2731f8f-2731f9b 303->305 304->305 306 2731f9e-2731fb2 304->306 305->306 308 2731fb8-2731fbf 306->308 309 273200c-2732017 306->309 310 2731fc5-2731fd7 308->310 311 2731fda-2732002 308->311 309->308 310->311 312 2732019-273201d 311->312 313 2732008-273200b 311->313
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2180802196.0000000002675000.00000040.00000800.00020000.00000000.sdmp, Offset: 02675000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2675000_java.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 254e0268a4d532b3f3fdd021a3ca57db7ffe492a2c891b7969a8bda50e90f01c
                                                                  • Instruction ID: aaa588e3012a1fcdf8e8a6de3e262238dc890ab926e8e4c1523b54f19d26da01
                                                                  • Opcode Fuzzy Hash: 254e0268a4d532b3f3fdd021a3ca57db7ffe492a2c891b7969a8bda50e90f01c
                                                                  • Instruction Fuzzy Hash: 6031A070A09746EFD716CF24C5083A9FBF0BB42308F5482ADD84D97792DB346959CB82

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 325 25e4ccd-25e4ce9 326 25e4cf4-25e4d38 325->326
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2180802196.00000000025D2000.00000040.00000800.00020000.00000000.sdmp, Offset: 025D2000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_25d2000_java.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e89354d56158aafa9a373a57f18f82d9a26d574573bfa6aa29262244522ab985
                                                                  • Instruction ID: 350afa4108717885b20a48ce62062b121dd6062a5b085b4d93003f02aabac8a3
                                                                  • Opcode Fuzzy Hash: e89354d56158aafa9a373a57f18f82d9a26d574573bfa6aa29262244522ab985
                                                                  • Instruction Fuzzy Hash: F7F0DFB5A00A06EBEB25CF24C0047EAFBB8FB88708F04420AD42C53350C378B429CBD0

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 327 25e4b78-25e4b93 328 25e4b9e-25e4be2 327->328
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2180802196.00000000025D2000.00000040.00000800.00020000.00000000.sdmp, Offset: 025D2000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_25d2000_java.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 32ae4ee7c46e9b6f95a1f01929aa001ff310582ac7670e06cd7dc5d5c275afa8
                                                                  • Instruction ID: e6f13d116dfd82c8a2a87f70d1398adf4d1b17f8ddac4100c1bac3a27c05f19c
                                                                  • Opcode Fuzzy Hash: 32ae4ee7c46e9b6f95a1f01929aa001ff310582ac7670e06cd7dc5d5c275afa8
                                                                  • Instruction Fuzzy Hash: 41F07FB5A04A06EBDB258F65C4047DAFBB4BB88718F14421AD42C57350D778B465CBD0

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 329 25dec1c-25dec36 330 25dec41-25dec85 329->330
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2180802196.00000000025D2000.00000040.00000800.00020000.00000000.sdmp, Offset: 025D2000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_25d2000_java.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 42c53b6a43cb31f46749cf055c128a4d641a382d0e15341617bf31b5e391985a
                                                                  • Instruction ID: 1a93d0647a8a7f1db81aaec921a592af588d83799481915f1ec4e8fea43fbee1
                                                                  • Opcode Fuzzy Hash: 42c53b6a43cb31f46749cf055c128a4d641a382d0e15341617bf31b5e391985a
                                                                  • Instruction Fuzzy Hash: 75F09BB6A04A06EBDB29CF65C4047DAFBB4BB88718F14421AD42C67760D778B469CBD0

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 333 25dda35-25dda4f 334 25dda5a-25dda8e 333->334
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2180802196.00000000025D2000.00000040.00000800.00020000.00000000.sdmp, Offset: 025D2000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_25d2000_java.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 29995f15d872365a04cd7e63b114800720359f2c2bcdb68d33b564c1261958e5
                                                                  • Instruction ID: 2833a6962a2406ad9b75a53316b6c9ceba4028adb5634754adee329615fb71a8
                                                                  • Opcode Fuzzy Hash: 29995f15d872365a04cd7e63b114800720359f2c2bcdb68d33b564c1261958e5
                                                                  • Instruction Fuzzy Hash: 3DF0C2B6D00A06ABDB258F65C0047DAFBB8BB44714F14421AC42C63360D378B465CBD1
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2180802196.00000000025D2000.00000040.00000800.00020000.00000000.sdmp, Offset: 025D2000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_25d2000_java.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 956e54bf23284365c5c9cadd695bdfbbdf0198356242075349d738de1d4895ef
                                                                  • Instruction ID: f2bebd26fe06e8823e74eb39aa1e56518982fc6aba125fa366f50d973b75f706
                                                                  • Opcode Fuzzy Hash: 956e54bf23284365c5c9cadd695bdfbbdf0198356242075349d738de1d4895ef
                                                                  • Instruction Fuzzy Hash: 21F0CAB6D00A06ABDB248F65C1047CAFBB8BB88714F14421AC52C67360D378B46ACBD0

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 335 25dde6e-25dde88 336 25dde93-25ddec7 335->336
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2180802196.00000000025D2000.00000040.00000800.00020000.00000000.sdmp, Offset: 025D2000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_25d2000_java.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 006de15ec00733cf35b4400bb8b84014c0de836b087f1d743ad08c09b170efe8
                                                                  • Instruction ID: a453f7f8064d4996bd76b3dfa7f4ad0ae940feb693e9bbd6050e5228efdec921
                                                                  • Opcode Fuzzy Hash: 006de15ec00733cf35b4400bb8b84014c0de836b087f1d743ad08c09b170efe8
                                                                  • Instruction Fuzzy Hash: 6DF0CAB6D00A06EBDB248F61C0047CAFBB8BB88718F14421AC42C63760C778B469CBD0

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 337 25e3c76-25e3c90 338 25e3c9b-25e3ccf 337->338
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2180802196.00000000025D2000.00000040.00000800.00020000.00000000.sdmp, Offset: 025D2000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_25d2000_java.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 99a64b4ec0b77d3b02f59ce48039708535421d8eb77825d64b9e9e729c7ff8ff
                                                                  • Instruction ID: bed5b4c64b83a7e603d4e78b8da9d22a5476e22b7e399df7715c79ec08b6b3ed
                                                                  • Opcode Fuzzy Hash: 99a64b4ec0b77d3b02f59ce48039708535421d8eb77825d64b9e9e729c7ff8ff
                                                                  • Instruction Fuzzy Hash: 87F0CAB6D00A0AABDB648F65C0047CAFBB8BB88714F14421AC42C67360D778B469CBD1

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 331 25db407-25db421 332 25db42c-25db460 331->332
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2180802196.00000000025D2000.00000040.00000800.00020000.00000000.sdmp, Offset: 025D2000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_25d2000_java.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7fad0f18e99cf1e8445d26f2f073479339752be3d4d04bba818273cd5d6ab106
                                                                  • Instruction ID: beb90f358a54f309ba53803d8c0bccc36c9dea725df91893d74b1693a8ba165e
                                                                  • Opcode Fuzzy Hash: 7fad0f18e99cf1e8445d26f2f073479339752be3d4d04bba818273cd5d6ab106
                                                                  • Instruction Fuzzy Hash: 0DF0CAB6D00A06EBDB248F65C0047CAFBB8BB88718F19421AC42C63360D378B469CBD0
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2180802196.00000000025D2000.00000040.00000800.00020000.00000000.sdmp, Offset: 025D2000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_25d2000_java.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f29a8930f6ce769411abd134445f90d38a307f5953f89062311e104bc3655a35
                                                                  • Instruction ID: 54b078cd44a5e7e6cd1d30e1ba928e9a4698eadf1b2f9b98a98eda3da1e513a7
                                                                  • Opcode Fuzzy Hash: f29a8930f6ce769411abd134445f90d38a307f5953f89062311e104bc3655a35
                                                                  • Instruction Fuzzy Hash: A9F0C2B6D00A06ABDB248F65C0047CAFBB8BB44714F14421AC52C63360D378B465CBD0
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2180802196.00000000025D2000.00000040.00000800.00020000.00000000.sdmp, Offset: 025D2000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_25d2000_java.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a2a3db019c57da53aff0bc2116be014ecaa88ed500bd28ffb9a5b59772277281
                                                                  • Instruction ID: 757b6c4e911795580c6eadfe4b1a31e759bcac061473515cd852c59358703b5a
                                                                  • Opcode Fuzzy Hash: a2a3db019c57da53aff0bc2116be014ecaa88ed500bd28ffb9a5b59772277281
                                                                  • Instruction Fuzzy Hash: F8F0C2B5D00A06ABDB24CF61C10439AFBB4BB44B14F14421AC42C63350C378B465CBC1
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2180802196.0000000002675000.00000040.00000800.00020000.00000000.sdmp, Offset: 02675000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2675000_java.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a850f411fcea5bcf0d8895780172ad7d3267a014bd016f6d8035546dfb10d0f7
                                                                  • Instruction ID: 4a7aad03377331cfb8511109ba8c93549042ced6789964bce785ccbbe207b92e
                                                                  • Opcode Fuzzy Hash: a850f411fcea5bcf0d8895780172ad7d3267a014bd016f6d8035546dfb10d0f7
                                                                  • Instruction Fuzzy Hash: E1B16F71904700CFC714EF58C09472AB7E2BF94718F298BADE88A5B391E735E891CB85
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2180802196.0000000002675000.00000040.00000800.00020000.00000000.sdmp, Offset: 02675000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2675000_java.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b8e5bc347c2b4cb5500d6bc7124a84b40f138abffad67e887df239bff9d49058
                                                                  • Instruction ID: 93a3fa5b940edbb17ac7966085786af3d8a60d87e54a0110f4281ed5f5f761cc
                                                                  • Opcode Fuzzy Hash: b8e5bc347c2b4cb5500d6bc7124a84b40f138abffad67e887df239bff9d49058
                                                                  • Instruction Fuzzy Hash: AA91D5759046118BCB05AF14C484B6AF7A2AF8531CF398A9DD8985B306E736DC83CFD6
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2180802196.0000000002675000.00000040.00000800.00020000.00000000.sdmp, Offset: 02675000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2675000_java.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0b8460e8fd41968c0e4e5b906c84f0bba74e2172f3534fc27141b9aacc3a0d20
                                                                  • Instruction ID: e415bf5d93aba1ac44f8708f906c9a5c65291f20fd3910e31151d334ecceded2
                                                                  • Opcode Fuzzy Hash: 0b8460e8fd41968c0e4e5b906c84f0bba74e2172f3534fc27141b9aacc3a0d20
                                                                  • Instruction Fuzzy Hash: 7E513AB1A04700CBC715DB24E49877EB7A3AF80724F598A5DE4869B381D735DC82DB42
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2180802196.00000000025D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025D0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_25d0000_java.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a012a9fb5cf5d9e1554885d89a3030425dd9bcc3e3bcfa4e280c99466c7885fc
                                                                  • Instruction ID: f7aa31331e7ba132802da6205840d5c335f113eed6df43b78f3a2fa48ca249bd
                                                                  • Opcode Fuzzy Hash: a012a9fb5cf5d9e1554885d89a3030425dd9bcc3e3bcfa4e280c99466c7885fc
                                                                  • Instruction Fuzzy Hash: 3E21F6BA5082568FDB358F198C407DABBE5FB58314F21482EDECDE7710D3306A898B95
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2180802196.0000000002675000.00000040.00000800.00020000.00000000.sdmp, Offset: 02675000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2675000_java.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 35cfca38a64c3ff3937ba3edcbc8bb1544487143f9c1f7a554a90dce2bed6829
                                                                  • Instruction ID: d80f39aca5c87c5e874190d0985c3c095158185e79a5596655d3cef11b0c67d0
                                                                  • Opcode Fuzzy Hash: 35cfca38a64c3ff3937ba3edcbc8bb1544487143f9c1f7a554a90dce2bed6829
                                                                  • Instruction Fuzzy Hash: FCF01EA240E3C18FC3039B348C366813F704E63205B2E45EBD081DF0E3E25A4A6AD322