Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
5hsRaLKPV6.jar

Overview

General Information

Sample name:5hsRaLKPV6.jar
(renamed file extension from none to jar, renamed because original name is a hash value)
Original sample name:ae345b40d165255284bf4c6ab00a871fcb035b552ac0b20b3cfb19e4644e49b7
Analysis ID:1590513
MD5:8e96e66f83e748d267df96390c880297
SHA1:bae891900c7c646f62a9b51c27f5b13a30cc9589
SHA256:ae345b40d165255284bf4c6ab00a871fcb035b552ac0b20b3cfb19e4644e49b7
Infos:

Detection

Branchlock Obfuscator
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Branchlock Obfuscator
AI detected suspicious sample
Exploit detected, runtime environment starts unknown processes
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to detect virtual machines (SLDT)
Contains functionality to query CPU information (cpuid)
Creates a process in suspended mode (likely to inject code)
Enables debug privileges
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cmd.exe (PID: 6616 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\5hsRaLKPV6.jar"" >> C:\cmdlinestart.log 2>&1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
    • conhost.exe (PID: 6596 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • java.exe (PID: 6812 cmdline: "C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\5hsRaLKPV6.jar" MD5: 9DAA53BAB2ECB33DC0D9CA51552701FA)
      • icacls.exe (PID: 6920 cmdline: C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M MD5: 2E49585E4E08565F52090B144062F97E)
        • conhost.exe (PID: 7008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • tasklist.exe (PID: 7080 cmdline: tasklist.exe MD5: 0A4448B31CE7F83CB7691A2657F330F1)
        • conhost.exe (PID: 7052 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
5hsRaLKPV6.jarJoeSecurity_BranchlockObfuscatorYara detected Branchlock ObfuscatorJoe Security
    SourceRuleDescriptionAuthorStrings
    00000002.00000002.1715939874.0000000014A50000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BranchlockObfuscatorYara detected Branchlock ObfuscatorJoe Security
      00000002.00000003.1655385667.0000000000708000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BranchlockObfuscatorYara detected Branchlock ObfuscatorJoe Security
        Process Memory Space: java.exe PID: 6812JoeSecurity_BranchlockObfuscatorYara detected Branchlock ObfuscatorJoe Security
          No Sigma rule has matched
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 5hsRaLKPV6.jarVirustotal: Detection: 27%Perma Link
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 80.9% probability

          Software Vulnerabilities

          barindex
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\tasklist.exe
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: seasonmonster.s3.us-east-1.amazonaws.com
          Source: java.exe, 00000002.00000002.1714151421.00000000099F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bugreport.sun.com/bugreport/
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
          Source: java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html
          Source: java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html0
          Source: java.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.htmlK
          Source: java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl
          Source: java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl0
          Source: java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl
          Source: java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
          Source: java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl
          Source: java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl0
          Source: java.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crlKW
          Source: java.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crls
          Source: java.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl
          Source: java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl0
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
          Source: java.exe, 00000002.00000002.1714151421.0000000009950000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://java.oracle.com/
          Source: java.exe, 00000002.00000002.1716582426.0000000015288000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000002.1714151421.0000000009C6D000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1716193196.0000000014D44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://null.oracle.com/
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
          Source: java.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://policy.camerfirma.com
          Source: java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1716582426.000000001531C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://policy.camerfirma.com0
          Source: java.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://policy.camerfirma.com;
          Source: java.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://policy.camerfirma.comcC
          Source: java.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/
          Source: java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/0
          Source: java.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/3I
          Source: java.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/S
          Source: java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.chambersign.org
          Source: java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.chambersign.org1
          Source: java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm
          Source: java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
          Source: java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps
          Source: java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps0
          Source: 5hsRaLKPV6.jarString found in binary or memory: https://branchlock.net
          Source: java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com
          Source: java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
          Source: java.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://repository.luxtrust.lu
          Source: java.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://repository.luxtrust.lu#x
          Source: java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://repository.luxtrust.lu0
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/1.jar
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/2.jar
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/3.jar
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/checker.jar
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/email.js
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/history.jar
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/recovery.jar
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/res.jar
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/swiftcopy.pdf
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
          Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
          Source: classification engineClassification label: mal68.expl.evad.winJAR@10/4@1/1
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Vault\credJump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7008:120:WilError_03
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6596:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7052:120:WilError_03
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeFile created: C:\Users\user\AppData\Local\Temp\hsperfdata_userJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: tasklist.exe, 00000005.00000002.1678713116.0000000003510000.00000004.00000020.00020000.00000000.sdmp, tasklist.exe, 00000005.00000003.1676233788.0000000003510000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process|Tbu;;,s
          Source: 5hsRaLKPV6.jarVirustotal: Detection: 27%
          Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\5hsRaLKPV6.jar"" >> C:\cmdlinestart.log 2>&1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\java.exe "C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\5hsRaLKPV6.jar"
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
          Source: C:\Windows\SysWOW64\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist.exe
          Source: C:\Windows\SysWOW64\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\java.exe "C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\5hsRaLKPV6.jar" Jump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist.exeJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: version.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\icacls.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior

          Data Obfuscation

          barindex
          Source: Yara matchFile source: 5hsRaLKPV6.jar, type: SAMPLE
          Source: Yara matchFile source: 00000002.00000002.1715939874.0000000014A50000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000003.1655385667.0000000000708000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: java.exe PID: 6812, type: MEMORYSTR
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_022FD8F7 push 00000000h; mov dword ptr [esp], esp2_2_022FD921
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_022FA20A push ecx; ret 2_2_022FA21A
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_022FA21B push ecx; ret 2_2_022FA225
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_022FBB67 push 00000000h; mov dword ptr [esp], esp2_2_022FBB8D
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_022FB3B7 push 00000000h; mov dword ptr [esp], esp2_2_022FB3DD
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_022FD8D1 push 00000000h; mov dword ptr [esp], esp2_2_022FD921
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_022FB947 push 00000000h; mov dword ptr [esp], esp2_2_022FB96D
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_022FC477 push 00000000h; mov dword ptr [esp], esp2_2_022FC49D
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0239D051 push cs; retf 2_2_0239D071
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0239C1C8 push cs; ret 2_2_0239C211
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0239F5C1 push 00060000h; retn 0007h2_2_0239F66A
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
          Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AUTORUNSC.EXE8
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: PROCMON.EXE
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AUTORUNS.EXE8
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OLLYDBG.EXE8
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: FIDDLER.EXE8
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: REGMON.EXE8
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXE
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: FILEMON.EXE
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0239B836 sldt cx2_2_0239B836
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: java.exe, 00000002.00000002.1701828538.00000000006CB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll6nX
          Source: java.exe, 00000002.00000003.1656734773.0000000014868000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: com/sun/corba/se/impl/util/SUNVMCID.classPK
          Source: java.exe, 00000002.00000003.1656734773.0000000014868000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &com/sun/corba/se/impl/util/SUNVMCID.classPK
          Source: java.exe, 00000002.00000002.1701828538.00000000006CB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [Ljava/lang/VirtualMachineError;
          Source: java.exe, 00000002.00000003.1656734773.0000000014868000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: org/omg/CORBA/OMGVMCID.classPK
          Source: java.exe, 00000002.00000002.1701828538.00000000006CB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: cjava/lang/VirtualMachineError
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware.exe8
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vboxtray.exe8
          Source: java.exe, 00000002.00000003.1656734773.0000000014868000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: java/lang/VirtualMachineError.classPK
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_023063B4 LdrInitializeThunk,2_2_023063B4
          Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeMemory protected: page read and write | page guardJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\java.exe "C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\5hsRaLKPV6.jar" Jump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist.exeJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_022F03C0 cpuid 2_2_022F03C0
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\client\jvm.dll VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Users\user\AppData\Local\Temp\hsperfdata_user\6812 VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\resources.jar VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\rt.jar VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\jce.jar VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\charsets.jar VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\jfr.jar VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: procmon.exe
          Source: java.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: wireshark.exe
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Windows Management Instrumentation
          1
          Services File Permissions Weakness
          11
          Process Injection
          1
          Masquerading
          OS Credential Dumping111
          Security Software Discovery
          Remote ServicesData from Local System2
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts1
          Exploitation for Client Execution
          1
          DLL Side-Loading
          1
          Services File Permissions Weakness
          1
          Virtualization/Sandbox Evasion
          LSASS Memory1
          Virtualization/Sandbox Evasion
          Remote Desktop ProtocolData from Removable Media1
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
          DLL Side-Loading
          1
          Disable or Modify Tools
          Security Account Manager23
          System Information Discovery
          SMB/Windows Admin SharesData from Network Shared Drive2
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
          Process Injection
          NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Obfuscated Files or Information
          LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Services File Permissions Weakness
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          DLL Side-Loading
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1590513 Sample: 5hsRaLKPV6 Startdate: 14/01/2025 Architecture: WINDOWS Score: 68 25 seasonmonster.s3.us-east-1.amazonaws.com 2->25 27 s3-r-w.us-east-1.amazonaws.com 2->27 31 Multi AV Scanner detection for submitted file 2->31 33 Yara detected Branchlock Obfuscator 2->33 35 Exploit detected, runtime environment starts unknown processes 2->35 37 AI detected suspicious sample 2->37 9 cmd.exe 2 2->9         started        signatures3 process4 process5 11 java.exe 23 9->11         started        15 conhost.exe 9->15         started        dnsIp6 29 s3-r-w.us-east-1.amazonaws.com 52.217.130.90, 443, 49730 AMAZON-02US United States 11->29 39 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 11->39 17 tasklist.exe 1 11->17         started        19 icacls.exe 1 11->19         started        signatures7 process8 process9 21 conhost.exe 17->21         started        23 conhost.exe 19->23         started       
          SourceDetectionScannerLabelLink
          5hsRaLKPV6.jar27%VirustotalBrowse
          5hsRaLKPV6.jar0%ReversingLabs
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          https://seasonmonster.s3.us-east-1.amazonaws.com/2.jar0%Avira URL Cloudsafe
          https://seasonmonster.s3.us-east-1.amazonaws.com/email.js0%Avira URL Cloudsafe
          http://policy.camerfirma.comcC0%Avira URL Cloudsafe
          https://seasonmonster.s3.us-east-1.amazonaws.com/1.jar0%Avira URL Cloudsafe
          http://policy.camerfirma.com;0%Avira URL Cloudsafe
          https://seasonmonster.s3.us-east-1.amazonaws.com/res.jar0%Avira URL Cloudsafe
          http://repository.swisssign.com/3I0%Avira URL Cloudsafe
          https://seasonmonster.s3.us-east-1.amazonaws.com/history.jar0%Avira URL Cloudsafe
          http://cps.chambersign.org/cps/chambersroot.htmlK0%Avira URL Cloudsafe
          http://repository.swisssign.com/S0%Avira URL Cloudsafe
          https://seasonmonster.s3.us-east-1.amazonaws.com/3.jar0%Avira URL Cloudsafe
          https://repository.luxtrust.lu#x0%Avira URL Cloudsafe
          https://seasonmonster.s3.us-east-1.amazonaws.com/checker.jar0%Avira URL Cloudsafe
          https://seasonmonster.s3.us-east-1.amazonaws.com/recovery.jar0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          s3-r-w.us-east-1.amazonaws.com
          52.217.130.90
          truefalse
            high
            seasonmonster.s3.us-east-1.amazonaws.com
            unknown
            unknownfalse
              high
              NameSourceMaliciousAntivirus DetectionReputation
              http://policy.camerfirma.comcCjava.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://crl.xrampsecurity.com/XGCA.crljava.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://crl.chambersign.org/chambersroot.crl0java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://repository.luxtrust.lu0java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://bugreport.sun.com/bugreport/java.exe, 00000002.00000002.1714151421.00000000099F9000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://cps.chambersign.org/cps/chambersroot.html0java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://seasonmonster.s3.us-east-1.amazonaws.com/2.jarjava.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://java.oracle.com/java.exe, 00000002.00000002.1714151421.0000000009950000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://null.oracle.com/java.exe, 00000002.00000002.1716582426.0000000015288000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000002.1714151421.0000000009C6D000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1716193196.0000000014D44000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.chambersign.org1java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://repository.swisssign.com/0java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://branchlock.net5hsRaLKPV6.jarfalse
                                  high
                                  http://policy.camerfirma.comjava.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://seasonmonster.s3.us-east-1.amazonaws.com/1.jarjava.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://ocsp.quovadisoffshore.comjava.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://crl.securetrust.com/STCA.crl0java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.quovadisglobal.com/cpsjava.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://cps.chambersign.org/cps/chambersroot.htmljava.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://seasonmonster.s3.us-east-1.amazonaws.com/res.jarjava.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://crl.securetrust.com/STCA.crlsjava.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://seasonmonster.s3.us-east-1.amazonaws.com/email.jsjava.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://crl.securetrust.com/STCA.crljava.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://policy.camerfirma.com;java.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://repository.luxtrust.lujava.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://cps.chambersign.org/cps/chambersroot.htmlKjava.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.quovadisglobal.com/cps0java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://repository.swisssign.com/3Ijava.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://crl.xrampsecurity.com/XGCA.crl0java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://seasonmonster.s3.us-east-1.amazonaws.com/swiftcopy.pdfjava.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://crl.securetrust.com/STCA.crlKWjava.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.quovadis.bmjava.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.quovadis.bm0java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://repository.swisssign.com/Sjava.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://ocsp.quovadisoffshore.com0java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://seasonmonster.s3.us-east-1.amazonaws.com/history.jarjava.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                http://crl.chambersign.org/chambersroot.crljava.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://repository.swisssign.com/java.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://www.chambersign.orgjava.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://policy.camerfirma.com0java.exe, 00000002.00000002.1714151421.0000000009D2A000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1716582426.000000001531C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://repository.luxtrust.lu#xjava.exe, 00000002.00000002.1702819649.00000000048A3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        https://seasonmonster.s3.us-east-1.amazonaws.com/3.jarjava.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        https://seasonmonster.s3.us-east-1.amazonaws.com/checker.jarjava.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        https://seasonmonster.s3.us-east-1.amazonaws.com/recovery.jarjava.exe, 00000002.00000002.1714151421.0000000009A93000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        • No. of IPs < 25%
                                                                        • 25% < No. of IPs < 50%
                                                                        • 50% < No. of IPs < 75%
                                                                        • 75% < No. of IPs
                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                        52.217.130.90
                                                                        s3-r-w.us-east-1.amazonaws.comUnited States
                                                                        16509AMAZON-02USfalse
                                                                        Joe Sandbox version:42.0.0 Malachite
                                                                        Analysis ID:1590513
                                                                        Start date and time:2025-01-14 08:19:32 +01:00
                                                                        Joe Sandbox product:CloudBasic
                                                                        Overall analysis duration:0h 3m 10s
                                                                        Hypervisor based Inspection enabled:false
                                                                        Report type:full
                                                                        Cookbook file name:defaultwindowsfilecookbook.jbs
                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                        Number of analysed new started processes analysed:7
                                                                        Number of new started drivers analysed:0
                                                                        Number of existing processes analysed:0
                                                                        Number of existing drivers analysed:0
                                                                        Number of injected processes analysed:0
                                                                        Technologies:
                                                                        • HCA enabled
                                                                        • EGA enabled
                                                                        • GSI enabled (Java)
                                                                        • AMSI enabled
                                                                        Analysis Mode:default
                                                                        Analysis stop reason:Timeout
                                                                        Sample name:5hsRaLKPV6.jar
                                                                        (renamed file extension from none to jar, renamed because original name is a hash value)
                                                                        Original Sample Name:ae345b40d165255284bf4c6ab00a871fcb035b552ac0b20b3cfb19e4644e49b7
                                                                        Detection:MAL
                                                                        Classification:mal68.expl.evad.winJAR@10/4@1/1
                                                                        EGA Information:
                                                                        • Successful, ratio: 100%
                                                                        HCA Information:Failed
                                                                        Cookbook Comments:
                                                                        • Stop behavior analysis, all processes terminated
                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                        • Report size getting too big, too many NtSetInformationFile calls found.
                                                                        No simulations
                                                                        No context
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        s3-r-w.us-east-1.amazonaws.comSwift-TT680169 Report.svgGet hashmaliciousBranchlock ObfuscatorBrowse
                                                                        • 3.5.12.103
                                                                        Mansourbank Swift-TT379733 Report.svgGet hashmaliciousBranchlock ObfuscatorBrowse
                                                                        • 52.216.29.192
                                                                        Mansourbank Swift-TT680169 Report.svgGet hashmaliciousBranchlock ObfuscatorBrowse
                                                                        • 52.217.119.34
                                                                        Wupos Reciept.pdf.jarGet hashmaliciousBranchlock ObfuscatorBrowse
                                                                        • 52.216.217.130
                                                                        Swift Transaction Report.jsGet hashmaliciousBranchlock ObfuscatorBrowse
                                                                        • 16.182.70.66
                                                                        Swift Transaction Report.jsGet hashmaliciousBranchlock ObfuscatorBrowse
                                                                        • 54.231.134.106
                                                                        https://midoregoncu-securemessagecenter.s3.us-east-1.amazonaws.com/open/message_12832.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                        • 54.231.130.18
                                                                        http://img1.wsimg.com/blobby/go/9b6ed793-452c-4f8f-8f80-6847f4d114d7/downloads/71318864754.pdfGet hashmaliciousUnknownBrowse
                                                                        • 52.217.134.50
                                                                        https://5qc68jhomepl.blob.core.windows.net/9x0f8/index.htmlGet hashmaliciousUnknownBrowse
                                                                        • 52.217.41.32
                                                                        https://verification.com/omid_error?Get hashmaliciousUnknownBrowse
                                                                        • 52.217.85.136
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        AMAZON-02UShttps://email.lc.haxconsulting.com/c/eJx0k0tv4zgQhH-NdBk4kKgHrQMPdhI5mck78djJRaDIlsSYD4WkpLF__cJOsLvAZq_FLnbhQzWrBCdJS6-fh9_RaK9H9Muk6c9yE3LCCkjrLORGUaGJZGcd_cOMdoP0QrdnzKivt8pMGqzrRF_5fQ-EtqDZvqLOiVYDD4HEOMnxvMB5EoKiQlYKnKMtHLdv5i83BT5n4-tb-75JAbPHy6-p02-Mqp6KVv9LO9pyPE9ZwVKaZjlkgBjkRVEjHIIehTVagfakt4YPzAujw45EeRrF0RziBvIoyeskRxgwwlma0ajAPBQERSiL4jg55o2Ss2YOOYWszps4a5o6CtLoWwySdN73LkgWASoDVE7T9N-pAJXcTFoaymeOSmr3s3YQHGYDhSApG2GdrzRVECQXdyBkgHJJ_5GuqNsJ7QKUnzgEyYUGIbsvNY0644_656a874w-uqIs-lGk6Q-UFjiUrPpkKLQHq6kka1Q6vvq928YBWm7z65vVxHE3FgEq59i-jvvVs0xEw7L6_MK2IhvbP_TKJn77qF7k3TSixbC_V5cBWuI33j_fivpGtZOAqN0Zxga7eJCXr-uXzfMHlIcjgANevhv8USfN_ZM-L_Dhoeu38GTXt4sALYfFzheHl3LNy1VZjw8iQOU6QOWmvb3vrqbc9Y17WtynH9OVVkrF8qdedwDgHtt4eTkPpTn1ebm6Sd7eV-rWxvS93979kt02VOA7wwntRWisaIUm9SB3sxOQsLdmFBwskUA5M1oD88aGlvwv49CZwTIgJ_9MuHE2GbsDG3pyTPFtBE-YUdW31-YJ-Orvpo8E_RUAAP__dHE7QwGet hashmaliciousUnknownBrowse
                                                                        • 18.245.31.88
                                                                        Discord.exeGet hashmaliciousAsyncRATBrowse
                                                                        • 3.127.138.57
                                                                        http://locrmhelp.comGet hashmaliciousUnknownBrowse
                                                                        • 52.84.151.46
                                                                        https://imtcoken.im/Get hashmaliciousUnknownBrowse
                                                                        • 143.204.215.6
                                                                        http://www.toekan.im/Get hashmaliciousUnknownBrowse
                                                                        • 143.204.215.6
                                                                        http://bu9.fysou.web.id/webs6/cx.aktifkn.fiturrGet hashmaliciousUnknownBrowse
                                                                        • 108.138.26.27
                                                                        http://bu9.fysou.web.id/webs6/aktrfn.fitur.pylterGet hashmaliciousUnknownBrowse
                                                                        • 108.138.26.116
                                                                        http://pub-dfc04553e9094cfc93a2df6d57084097.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                        • 3.75.10.80
                                                                        https://metahorizonsfacebooksupport.tempisite.com/italy39Get hashmaliciousHTMLPhisherBrowse
                                                                        • 54.229.247.168
                                                                        http://ubiquitous-twilight-c9292b.netlify.app/Get hashmaliciousUnknownBrowse
                                                                        • 3.75.10.80
                                                                        No context
                                                                        No context
                                                                        Process:C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
                                                                        File Type:ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):52
                                                                        Entropy (8bit):4.858623612163837
                                                                        Encrypted:false
                                                                        SSDEEP:3:oFj4I5vpm4US4XTQXov:oJ5b4XTCov
                                                                        MD5:4F2BEFABC15042E0DB3060D61BB5E25A
                                                                        SHA1:71FD4E985B1BD9889656F3C09E582B6513BE5BF2
                                                                        SHA-256:2105624836497C07D5EE8548CE5332C2D7A870A28DA653B2FEFB273AA489479B
                                                                        SHA-512:3B65A56BAF33409538D7521C9861363B75FB71F9D29A10E20F941FD1094DE072B5E1E610B433C4B4673701E78281E4856114D142635E239DF0B75DB4DF243925
                                                                        Malicious:false
                                                                        Reputation:low
                                                                        Preview:C:\Program Files (x86)\Java\jre-1.8..1736839222652..
                                                                        Process:C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):65536
                                                                        Entropy (8bit):1.2984098908421096
                                                                        Encrypted:false
                                                                        SSDEEP:96:THerjA58G6QOLDlKTH623w3oQXcwST+HE19o2z:TH358G6QOLcTH6aQ+iHEr
                                                                        MD5:F4FE22EE0FD57A3237D4A55F03677F9E
                                                                        SHA1:76767CFDDDB83A1F44075DE066D9D86B329C7A2A
                                                                        SHA-256:B8F822138B7885AF2D363F578BC95BEEF88297C33D1E42C77F775E111EBFE92B
                                                                        SHA-512:C3AEDB76862276770AB815068EA80956E33D9B2C45A4CCEF8DA3832F84E7D92C49AEBD03D1EABD97B9CFFA827810C73878D2986CD292D75DE70D1F6C7302BBB1
                                                                        Malicious:false
                                                                        Reputation:low
                                                                        Preview:........x9............. .......8...........J...0...sun.rt._sync_Inflations.............8...........J...0...sun.rt._sync_Deflations.............@...........J...8...sun.rt._sync_ContendedLockAttempts..........8...........J...0...sun.rt._sync_FutileWakeups..........0...........J...(...sun.rt._sync_Parks..7.......@...........J...8...sun.rt._sync_EmptyNotifications.............8...........J...0...sun.rt._sync_Notifications..4.......8...........J...0...sun.rt._sync_SlowEnter..............8...........J...0...sun.rt._sync_SlowExit...............8...........J...0...sun.rt._sync_SlowNotify.............8...........J...0...sun.rt._sync_SlowNotifyAll..........8...........J...0...sun.rt._sync_FailedSpins............@...........J...8...sun.rt._sync_SuccessfulSpins................8...........J...0...sun.rt._sync_PrivateA...............8...........J...0...sun.rt._sync_PrivateB...............@...........J...8...sun.rt._sync_MonInCirculation...............8...........J...0...sun.rt._sync_MonScavenged...
                                                                        Process:C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):45
                                                                        Entropy (8bit):0.9111711733157262
                                                                        Encrypted:false
                                                                        SSDEEP:3:/lwlt7n:WNn
                                                                        MD5:C8366AE350E7019AEFC9D1E6E6A498C6
                                                                        SHA1:5731D8A3E6568A5F2DFBBC87E3DB9637DF280B61
                                                                        SHA-256:11E6ACA8E682C046C83B721EEB5C72C5EF03CB5936C60DF6F4993511DDC61238
                                                                        SHA-512:33C980D5A638BFC791DE291EBF4B6D263B384247AB27F261A54025108F2F85374B579A026E545F81395736DD40FA4696F2163CA17640DD47F1C42BC9971B18CD
                                                                        Malicious:false
                                                                        Reputation:high, very likely benign file
                                                                        Preview:........................................J2SE.
                                                                        Process:C:\Windows\SysWOW64\cmd.exe
                                                                        File Type:ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):3254
                                                                        Entropy (8bit):4.919077234352184
                                                                        Encrypted:false
                                                                        SSDEEP:48:j6Hv++fj1zQwLDZ25JOYHsrgeNSHsrge26HDTZI5wv1:jMv++LPLDyJOYHsGHsoMDTZI56
                                                                        MD5:A8D484D615C3A68B9706343EB34FD7E0
                                                                        SHA1:9A5434B50379F31189543E61DBD42E5568C1D12D
                                                                        SHA-256:58C688E12BCEC765F88CFFF81F68FA816A3D77DA2E579EB7C1242EE31F1B310E
                                                                        SHA-512:B11B11807FC22FF10BC5B3ABEA092096144E3E9607431F126C6AB7AF9D4DB70353EF20603A809781EFAC53571A0A4DE252B91812564D5D83FB4FB19F72373807
                                                                        Malicious:false
                                                                        Preview:javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target...at sun.security.ssl.Alert.createSSLException(Unknown Source)...at sun.security.ssl.TransportContext.fatal(Unknown Source)...at sun.security.ssl.TransportContext.fatal(Unknown Source)...at sun.security.ssl.TransportContext.fatal(Unknown Source)...at sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(Unknown Source)...at sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(Unknown Source)...at sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(Unknown Source)...at sun.security.ssl.SSLHandshake.consume(Unknown Source)...at sun.security.ssl.HandshakeContext.dispatch(Unknown Source)...at sun.security.ssl.HandshakeContext.dispatch(Unknown Source)...at sun.security.ssl.TransportContext.dispatch(Unknow
                                                                        File type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                        Entropy (8bit):7.948030467353428
                                                                        TrID:
                                                                        • Java Archive (13504/1) 62.80%
                                                                        • ZIP compressed archive (8000/1) 37.20%
                                                                        File name:5hsRaLKPV6.jar
                                                                        File size:21'359 bytes
                                                                        MD5:8e96e66f83e748d267df96390c880297
                                                                        SHA1:bae891900c7c646f62a9b51c27f5b13a30cc9589
                                                                        SHA256:ae345b40d165255284bf4c6ab00a871fcb035b552ac0b20b3cfb19e4644e49b7
                                                                        SHA512:cee16641bbbbf2da2d1ae7af00e6b266de0374b955c37933061c4d1641aac4cd1216a05c2140cb9203b0dc9cf565c686d5c04cd884eb44c578cd40605f7f7224
                                                                        SSDEEP:384:OAJjyCdE1n02lxzHm8QkdduiQpbkl/JZ476rvusoEyPsh719/buA5OB5/6RkhZgK:PJy1npQm5QxkBcyvulbkB19/buAoX/Rf
                                                                        TLSH:D6A2E1263CF6065DD43BE071AC374873D08D967848CAD22B1576ABA5427AE3313A2FDC
                                                                        File Content Preview:PK........%.$Z................META-INF/MANIFEST.MFUT.....yg.....M..LK-...K-*....R0.3..M...u.I,..RH..MJ,..L.....$.dX).qq..PK..{D.Y:...;...PK.........9%Z................../....class.R[O.A.=C...k..P.*h.E]. J.....bDI..m....k.-../..7..Q|...@c..f..^.!./..4.....
                                                                        Icon Hash:d08c8e8ea2868a54
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Jan 14, 2025 08:20:26.289171934 CET49730443192.168.2.452.217.130.90
                                                                        Jan 14, 2025 08:20:26.289287090 CET4434973052.217.130.90192.168.2.4
                                                                        Jan 14, 2025 08:20:26.289396048 CET49730443192.168.2.452.217.130.90
                                                                        Jan 14, 2025 08:20:26.462063074 CET49730443192.168.2.452.217.130.90
                                                                        Jan 14, 2025 08:20:26.462120056 CET4434973052.217.130.90192.168.2.4
                                                                        Jan 14, 2025 08:20:27.058911085 CET4434973052.217.130.90192.168.2.4
                                                                        Jan 14, 2025 08:20:27.059046984 CET49730443192.168.2.452.217.130.90
                                                                        Jan 14, 2025 08:20:27.059108019 CET4434973052.217.130.90192.168.2.4
                                                                        Jan 14, 2025 08:20:27.059171915 CET49730443192.168.2.452.217.130.90
                                                                        Jan 14, 2025 08:20:27.087277889 CET49730443192.168.2.452.217.130.90
                                                                        Jan 14, 2025 08:20:27.087362051 CET4434973052.217.130.90192.168.2.4
                                                                        Jan 14, 2025 08:20:27.175218105 CET49730443192.168.2.452.217.130.90
                                                                        Jan 14, 2025 08:20:27.175270081 CET4434973052.217.130.90192.168.2.4
                                                                        Jan 14, 2025 08:20:27.175983906 CET4434973052.217.130.90192.168.2.4
                                                                        Jan 14, 2025 08:20:27.175986052 CET49730443192.168.2.452.217.130.90
                                                                        Jan 14, 2025 08:20:27.176043987 CET4434973052.217.130.90192.168.2.4
                                                                        Jan 14, 2025 08:20:27.176090002 CET49730443192.168.2.452.217.130.90
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Jan 14, 2025 08:20:26.230004072 CET6343753192.168.2.41.1.1.1
                                                                        Jan 14, 2025 08:20:26.254848003 CET53634371.1.1.1192.168.2.4
                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                        Jan 14, 2025 08:20:26.230004072 CET192.168.2.41.1.1.10x983Standard query (0)seasonmonster.s3.us-east-1.amazonaws.comA (IP address)IN (0x0001)false
                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                        Jan 14, 2025 08:20:26.254848003 CET1.1.1.1192.168.2.40x983No error (0)seasonmonster.s3.us-east-1.amazonaws.coms3-r-w.us-east-1.amazonaws.comCNAME (Canonical name)IN (0x0001)false
                                                                        Jan 14, 2025 08:20:26.254848003 CET1.1.1.1192.168.2.40x983No error (0)s3-r-w.us-east-1.amazonaws.com52.217.130.90A (IP address)IN (0x0001)false
                                                                        Jan 14, 2025 08:20:26.254848003 CET1.1.1.1192.168.2.40x983No error (0)s3-r-w.us-east-1.amazonaws.com3.5.1.188A (IP address)IN (0x0001)false
                                                                        Jan 14, 2025 08:20:26.254848003 CET1.1.1.1192.168.2.40x983No error (0)s3-r-w.us-east-1.amazonaws.com54.231.163.170A (IP address)IN (0x0001)false
                                                                        Jan 14, 2025 08:20:26.254848003 CET1.1.1.1192.168.2.40x983No error (0)s3-r-w.us-east-1.amazonaws.com54.231.229.82A (IP address)IN (0x0001)false
                                                                        Jan 14, 2025 08:20:26.254848003 CET1.1.1.1192.168.2.40x983No error (0)s3-r-w.us-east-1.amazonaws.com52.216.48.194A (IP address)IN (0x0001)false
                                                                        Jan 14, 2025 08:20:26.254848003 CET1.1.1.1192.168.2.40x983No error (0)s3-r-w.us-east-1.amazonaws.com54.231.130.18A (IP address)IN (0x0001)false
                                                                        Jan 14, 2025 08:20:26.254848003 CET1.1.1.1192.168.2.40x983No error (0)s3-r-w.us-east-1.amazonaws.com54.231.161.82A (IP address)IN (0x0001)false
                                                                        Jan 14, 2025 08:20:26.254848003 CET1.1.1.1192.168.2.40x983No error (0)s3-r-w.us-east-1.amazonaws.com16.15.176.228A (IP address)IN (0x0001)false

                                                                        Click to jump to process

                                                                        Click to jump to process

                                                                        Click to dive into process behavior distribution

                                                                        Click to jump to process

                                                                        Target ID:0
                                                                        Start time:02:20:21
                                                                        Start date:14/01/2025
                                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\5hsRaLKPV6.jar"" >> C:\cmdlinestart.log 2>&1
                                                                        Imagebase:0x240000
                                                                        File size:236'544 bytes
                                                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:1
                                                                        Start time:02:20:21
                                                                        Start date:14/01/2025
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff7699e0000
                                                                        File size:862'208 bytes
                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:2
                                                                        Start time:02:20:21
                                                                        Start date:14/01/2025
                                                                        Path:C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\5hsRaLKPV6.jar"
                                                                        Imagebase:0x5f0000
                                                                        File size:257'664 bytes
                                                                        MD5 hash:9DAA53BAB2ECB33DC0D9CA51552701FA
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_BranchlockObfuscator, Description: Yara detected Branchlock Obfuscator, Source: 00000002.00000002.1715939874.0000000014A50000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_BranchlockObfuscator, Description: Yara detected Branchlock Obfuscator, Source: 00000002.00000003.1655385667.0000000000708000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                        Reputation:moderate
                                                                        Has exited:true

                                                                        Target ID:3
                                                                        Start time:02:20:22
                                                                        Start date:14/01/2025
                                                                        Path:C:\Windows\SysWOW64\icacls.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
                                                                        Imagebase:0xfe0000
                                                                        File size:29'696 bytes
                                                                        MD5 hash:2E49585E4E08565F52090B144062F97E
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:4
                                                                        Start time:02:20:22
                                                                        Start date:14/01/2025
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff7699e0000
                                                                        File size:862'208 bytes
                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:5
                                                                        Start time:02:20:22
                                                                        Start date:14/01/2025
                                                                        Path:C:\Windows\SysWOW64\tasklist.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:tasklist.exe
                                                                        Imagebase:0xe50000
                                                                        File size:79'360 bytes
                                                                        MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:6
                                                                        Start time:02:20:22
                                                                        Start date:14/01/2025
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff7699e0000
                                                                        File size:862'208 bytes
                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Reset < >

                                                                          Execution Graph

                                                                          Execution Coverage:1.6%
                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                          Signature Coverage:0%
                                                                          Total number of Nodes:3
                                                                          Total number of Limit Nodes:0
                                                                          execution_graph 8737 22f0672 8738 22f06a5 KiUserExceptionDispatcher 8737->8738 8740 22f06d7 8738->8740

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 022F06D5
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1702291887.00000000022F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022F0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_22f0000_java.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser
                                                                          • String ID:
                                                                          • API String ID: 6842923-0
                                                                          • Opcode ID: 5cf75aaba01b5f7ed1f24ecb2bbd60a22b9d75a1251be1aa343e68c7fbe5b3b5
                                                                          • Instruction ID: 64ae2b742840a4d89deb8bc7bad0fb051ffd16fbeba9324cbe498bc02e355207
                                                                          • Opcode Fuzzy Hash: 5cf75aaba01b5f7ed1f24ecb2bbd60a22b9d75a1251be1aa343e68c7fbe5b3b5
                                                                          • Instruction Fuzzy Hash: 151149B691022B9FCF58CF88C4854ADF7B0FB98314B568565DD69A334AE3346A60CB90

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 14 23cf450-23cf484 15 23cf50c-23cf517 14->15 16 23cf48a-23cf4a4 14->16 17 23cf52d-23cf533 15->17 19 23cf51d-23cf527 15->19 16->17 18 23cf4aa-23cf4af 16->18 23 23cf6f9-23cf712 17->23 24 23cf539-23cf555 17->24 20 23cf500-23cf508 18->20 21 23cf4b1-23cf4b6 18->21 19->17 22 23cf74d-23cf759 19->22 20->15 25 23cf4dc-23cf4f5 21->25 26 23cf4b8-23cf4d1 21->26 22->17 27 23cf718-23cf725 23->27 28 23cf7c7-23cf7ce 23->28 29 23cf55b-23cf55e 24->29 30 23cf6d3 24->30 25->22 33 23cf4fb 25->33 26->22 32 23cf4d7 26->32 35 23cf72a-23cf732 27->35 42 23cf734-23cf80b 28->42 36 23cf69a-23cf6a9 29->36 37 23cf564-23cf569 29->37 34 23cf6d8-23cf7b6 30->34 32->17 33->17 35->35 35->42 39 23cf6af-23cf6b3 36->39 40 23cf6c3-23cf6d2 36->40 43 23cf56c-23cf599 call 23cfc70 37->43 39->40 44 23cf6b9-23cf6bd 39->44 55 23cf825-23cf82a 42->55 56 23cf811-23cf815 42->56 50 23cf65e-23cf66d 43->50 51 23cf59f-23cf5a5 43->51 44->40 46 23cf796-23cf7a2 44->46 46->40 58 23cf687-23cf699 50->58 59 23cf673-23cf677 50->59 53 23cf628-23cf637 51->53 54 23cf5ab-23cf5b9 51->54 64 23cf63d-23cf641 53->64 65 23cf651-23cf65d 53->65 61 23cf5bf-23cf5c7 call 239a174 54->61 62 23cf5d5-23cf5eb 54->62 68 23cf830-23cf83c 55->68 56->55 63 23cf81b-23cf81f 56->63 59->58 60 23cf67d-23cf681 59->60 60->58 66 23cf785-23cf791 60->66 70 23cf5cc-23cf5cf 61->70 62->43 63->55 63->68 64->65 69 23cf647-23cf64b 64->69 66->58 68->55 69->65 71 23cf774-23cf780 69->71 70->62 72 23cf5f0-23cf5ff 70->72 71->65 76 23cf619-23cf627 72->76 77 23cf605-23cf609 72->77 77->76 78 23cf60f-23cf613 77->78 78->76 79 23cf763-23cf76f 78->79 79->76
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1702291887.0000000002395000.00000040.00000800.00020000.00000000.sdmp, Offset: 02395000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2395000_java.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: df4ea3be5b3b2377da816d6969df4eadb4314d28d0c9d4a0d2d15e2bf2cd571b
                                                                          • Instruction ID: 7703b17691786a915da10acd241b619a0c34cfc9cfb7d268ca371d069d532542
                                                                          • Opcode Fuzzy Hash: df4ea3be5b3b2377da816d6969df4eadb4314d28d0c9d4a0d2d15e2bf2cd571b
                                                                          • Instruction Fuzzy Hash: D8A108756097008FC715DF28C58472AB7E3BB89318F39896ED9859BB24D731EC52CB82

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 81 22fd8f7-22fd93b 82 22fd941-22fd9aa call 22fd94b 81->82 83 22fd9b0-22fd9c7 81->83 82->83 86 22fd9cd-22fd9ed 82->86 85 22fde5f-22fde64 call 22fde6e 83->85 83->86 93 22fde69-22fdec8 85->93 89 22fda0b-22fda25 86->89 90 22fd9f3-22fda08 86->90 91 22fda2b call 22fda35 89->91 92 22fda95-22fdaa6 89->92 90->89 98 22fda30-22fda92 91->98 101 22fdaac-22fdabe 92->101 102 22fdac2-22fdacb 92->102 98->92 101->102 103 22fdb3b-22fdb65 102->103 104 22fdad1-22fdb38 call 22fdadb 102->104 106 22fdb71-22fdb73 103->106 104->103 108 22fdaf6-22fdb34 106->108 109 22fdb75 106->109 111 22fdb77-22fdb82 109->111 112 22fdb83-22fdb8d 109->112 111->112 114 22fdb90-22fdbc7 111->114 112->114 115 22fdbcd-22fdbd4 114->115 116 22fdbda-22fdbeb 114->116 115->116 117 22fdbee-22fdc2a 115->117 116->117 119 22fdc5b-22fdc65 117->119 120 22fdc30-22fdc3b 117->120 121 22fdc6b-22fdc71 119->121 122 22fdc72-22fdc82 119->122 123 22fdc56-22fdc5a 120->123 124 22fdc41-22fdc46 120->124 121->122 127 22fdcfc-22fdd05 122->127 128 22fdc88-22fdcf0 call 22fdc92 call 22fdcf5 122->128 123->119 125 22fdc4c-22fdc4f 124->125 126 22fdc54 124->126 125->123 126->123 131 22fdd0b-22fdd13 127->131 132 22fde28-22fde2f 127->132 128->127 136 22fdd8d-22fdda4 131->136 137 22fdd19-22fdd81 call 22fdd23 call 22fdd86 131->137 134 22fde4d-22fde5b 132->134 135 22fde35-22fde4a 132->135 134->85 135->134 139 22fddaa-22fddae 136->139 140 22fde25 136->140 137->136 139->140 144 22fddb4-22fddb8 139->144 140->132 144->140 148 22fddbe-22fddc6 call 22fddcb 144->148 148->140
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1702291887.00000000022F2000.00000040.00000800.00020000.00000000.sdmp, Offset: 022F2000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_22f2000_java.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 6353ed2891c67698bf780a99a03c582035ef390a9a59d0fce1a7de401875c753
                                                                          • Instruction ID: b1d021b74db7cd0fba094e4221e6937ecc4189b7309aaad18859459e97e05cba
                                                                          • Opcode Fuzzy Hash: 6353ed2891c67698bf780a99a03c582035ef390a9a59d0fce1a7de401875c753
                                                                          • Instruction Fuzzy Hash: C8A1ED71A24602DFDB58CFA4C494BA9FBB1FF49314F0881ADDA1A4B389D774A844CF90

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 152 238eb80-238eb83 153 238eb85-238eb86 152->153 154 238eb87-238eba2 152->154 153->154 155 238ec1c-238ec24 154->155 156 238eba4-238ebdb 154->156 159 238ec28-238ec2b 155->159 157 238ebe1-238ecbd 156->157 158 238ebf2-238ebfb 156->158 163 238ecc0-238eccb 157->163 158->159 161 238ec01-238ec19 158->161 162 238ec2e-238ec39 159->162 161->155 164 238ec3f-238ec45 162->164 165 238ed23-238ed24 162->165 163->165 167 238ecd1-238ecd7 163->167 164->165 168 238ec4b-238ec53 164->168 166 238ed25-238ed71 165->166 172 238ed7c-238eda4 166->172 167->165 170 238ecdd-238ece5 167->170 168->162 169 238ec55-238ec7f 168->169 169->165 174 238ec85-238ec95 169->174 170->163 173 238ece7-238ecfb 170->173 175 238edaa-238edad 172->175 176 238edbc-238ee0e 172->176 177 238ed20-238ed22 173->177 178 238ed01-238ed06 173->178 179 238ecba-238ecbc 174->179 180 238ec9b-238eca0 174->180 181 238ed0c-238ed10 178->181 182 238ed16-238ed1e 178->182 183 238ecb0-238ecb8 180->183 184 238eca6-238ecaa 180->184 181->177 181->182 182->177 182->182 183->179 183->183 184->179 184->183
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1702291887.000000000238E000.00000040.00000800.00020000.00000000.sdmp, Offset: 0238E000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_238e000_java.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 7625df5e30b63daa17a6a81f5cfcdbe6cf85cd4978892b0311b5203e07a44e8a
                                                                          • Instruction ID: 84bde40c6cab43fd66cff50c6c4de881c0c64642d2e352906c570095471fff1f
                                                                          • Opcode Fuzzy Hash: 7625df5e30b63daa17a6a81f5cfcdbe6cf85cd4978892b0311b5203e07a44e8a
                                                                          • Instruction Fuzzy Hash: 7661FEB29057129FC756DF24C8C4B95FBB1FB85314F4A866EE9454BA22C735B808CB80

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 185 22fd8d1-22fd93b 187 22fd941-22fd9aa call 22fd94b 185->187 188 22fd9b0-22fd9c7 185->188 187->188 191 22fd9cd-22fd9ed 187->191 190 22fde5f-22fdec8 call 22fde6e 188->190 188->191 194 22fda0b-22fda25 191->194 195 22fd9f3-22fda08 191->195 196 22fda2b-22fda92 call 22fda35 194->196 197 22fda95-22fdaa6 194->197 195->194 196->197 206 22fdaac-22fdabe 197->206 207 22fdac2-22fdacb 197->207 206->207 208 22fdb3b-22fdb65 207->208 209 22fdad1-22fdb38 call 22fdadb 207->209 211 22fdb71-22fdb73 208->211 209->208 213 22fdaf6-22fdb34 211->213 214 22fdb75 211->214 216 22fdb77-22fdb82 214->216 217 22fdb83-22fdb8d 214->217 216->217 219 22fdb90-22fdbc7 216->219 217->219 220 22fdbcd-22fdbd4 219->220 221 22fdbda-22fdbeb 219->221 220->221 222 22fdbee-22fdc2a 220->222 221->222 224 22fdc5b-22fdc65 222->224 225 22fdc30-22fdc3b 222->225 226 22fdc6b-22fdc71 224->226 227 22fdc72-22fdc82 224->227 228 22fdc56-22fdc5a 225->228 229 22fdc41-22fdc46 225->229 226->227 232 22fdcfc-22fdd05 227->232 233 22fdc88-22fdcf0 call 22fdc92 call 22fdcf5 227->233 228->224 230 22fdc4c-22fdc4f 229->230 231 22fdc54 229->231 230->228 231->228 236 22fdd0b-22fdd13 232->236 237 22fde28-22fde2f 232->237 233->232 241 22fdd8d-22fdda4 236->241 242 22fdd19-22fdd81 call 22fdd23 call 22fdd86 236->242 239 22fde4d-22fde5b 237->239 240 22fde35-22fde4a 237->240 239->190 240->239 244 22fddaa-22fddae 241->244 245 22fde25 241->245 242->241 244->245 249 22fddb4-22fddb8 244->249 245->237 249->245 253 22fddbe-22fddc6 call 22fddcb 249->253 253->245
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1702291887.00000000022F2000.00000040.00000800.00020000.00000000.sdmp, Offset: 022F2000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_22f2000_java.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: cd15b2b181082342d4cde132ae1fe8b26914419c046632c8c05fbf8e6e2afab3
                                                                          • Instruction ID: 0c6c64a89eb0bb91d68e6e100b842aa22f5a72e228b9c6450ac97ad66e18fa35
                                                                          • Opcode Fuzzy Hash: cd15b2b181082342d4cde132ae1fe8b26914419c046632c8c05fbf8e6e2afab3
                                                                          • Instruction Fuzzy Hash: 8071DE71614642DFEB58CFA0C494BAAFBB1FF49314F0881ADDA098B389C774A845CF91

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 257 2450de7-2450e01 258 2450e07 257->258 259 2450e0b-2450e19 257->259 258->259 260 2450e1e-2450e26 259->260 261 2450e27-2450e38 260->261 262 2450e3b-2450e44 260->262 261->262 263 2450e53-2450e55 262->263 263->260 265 2450e57-2450e7c 263->265 266 2450e82-2450e89 265->266 267 2450e8f-2450e9b 265->267 266->267 268 2450e9e-2450eb2 266->268 267->268 270 2450f0c-2450f17 268->270 271 2450eb8-2450ebf 268->271 270->271 272 2450ec5-2450ed7 271->272 273 2450eda-2450f02 271->273 272->273 275 2450f19-2450f1d 273->275 276 2450f08-2450f0b 273->276
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1702291887.0000000002395000.00000040.00000800.00020000.00000000.sdmp, Offset: 02395000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2395000_java.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: da860cabbb677721ce48cb6b03d076cd9b42fe915d0ffbf8637b6275655c6fa3
                                                                          • Instruction ID: 84fc84aee3b8bbd571cfd1075476ad5634ee6436e342e96ec53393801f678a16
                                                                          • Opcode Fuzzy Hash: da860cabbb677721ce48cb6b03d076cd9b42fe915d0ffbf8637b6275655c6fa3
                                                                          • Instruction Fuzzy Hash: BD31D1B4908345EFD725CF64C5183AAFBB0BF4A308F1482AEC88957782D7346559CBC2

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 278 238ed25-238ed71 279 238ed7c-238eda4 278->279 280 238edaa-238edad 279->280 281 238edbc-238ee0e 279->281
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1702291887.000000000238E000.00000040.00000800.00020000.00000000.sdmp, Offset: 0238E000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_238e000_java.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 4b12cee4cddb90bd182d0c7f97270d0eb2a4b1e50358d7fa103e65f3fad042fb
                                                                          • Instruction ID: e2507cc8a563eb8a094cba64da3872f312cb4b5b0425c1c87a4a133db9b25cbd
                                                                          • Opcode Fuzzy Hash: 4b12cee4cddb90bd182d0c7f97270d0eb2a4b1e50358d7fa103e65f3fad042fb
                                                                          • Instruction Fuzzy Hash: F62171765087919BE351CF1088803C6FBA2FBC0369F99062EEC9823116CB7B545EC7C2

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 291 2304ccd-2304ce9 292 2304cf4-2304d38 291->292
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1702291887.00000000022F2000.00000040.00000800.00020000.00000000.sdmp, Offset: 022F2000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_22f2000_java.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 6159768df70fff078c515411925a0f5dd65ca4c8cd36e91e31614619eff0b167
                                                                          • Instruction ID: 60ba270271ed501a9b5dd6e4e78c8b7a85a8a86a99bbee1ff6dc5fd760aca9c1
                                                                          • Opcode Fuzzy Hash: 6159768df70fff078c515411925a0f5dd65ca4c8cd36e91e31614619eff0b167
                                                                          • Instruction Fuzzy Hash: 8FF0DFB5900A06EBEB15CF61C4047EAF7B4FB88704F04420AD42C53750C378B429CBD0

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 293 2304b78-2304b93 294 2304b9e-2304be2 293->294
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1702291887.00000000022F2000.00000040.00000800.00020000.00000000.sdmp, Offset: 022F2000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_22f2000_java.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 62077047c7e88c2adb9f66303068645412ba4b9f8008045db6dbb64a303011d0
                                                                          • Instruction ID: db7baedb0c0798f507ea46fe471e01f6bbaf2e45413ab0f9e5e8780db064eb96
                                                                          • Opcode Fuzzy Hash: 62077047c7e88c2adb9f66303068645412ba4b9f8008045db6dbb64a303011d0
                                                                          • Instruction Fuzzy Hash: DFF07FB5900A16EBDB158F61C5047DAFBB4BB88718F14421AD52C57750D778B4658BC0

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 295 22fec1c-22fec36 296 22fec41-22fec85 295->296
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1702291887.00000000022F2000.00000040.00000800.00020000.00000000.sdmp, Offset: 022F2000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_22f2000_java.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 0b78d511d5f03a2ebf32432d176bc0943033386b50ecaa10c07850e9a041631c
                                                                          • Instruction ID: fdf5e1137f39d74a78e4f46bdb63a05e84cee8c1b39e98587c4e5043185c8eac
                                                                          • Opcode Fuzzy Hash: 0b78d511d5f03a2ebf32432d176bc0943033386b50ecaa10c07850e9a041631c
                                                                          • Instruction Fuzzy Hash: 85F09BB6A10A16EBDB29CF61C5047DAFBB4BB88718F14421AC52C67750D778B469CBC0

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 299 22fda35-22fda4f 300 22fda5a-22fda8e 299->300
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1702291887.00000000022F2000.00000040.00000800.00020000.00000000.sdmp, Offset: 022F2000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_22f2000_java.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: bd836b1a2853b50734f389ea491b833d1aafc1f89dbab209d455766829e9678f
                                                                          • Instruction ID: 8084301d546e1a06c21fbd50b6cf30d8817a9157f04e81a253af3807f47e4638
                                                                          • Opcode Fuzzy Hash: bd836b1a2853b50734f389ea491b833d1aafc1f89dbab209d455766829e9678f
                                                                          • Instruction Fuzzy Hash: CEF0C2B6D00A06ABDB248F61C5047DAFBB4BB44714F14421AC52C63750D378B465CBC0
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1702291887.00000000022F2000.00000040.00000800.00020000.00000000.sdmp, Offset: 022F2000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_22f2000_java.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 0bf8f27dbeb6228148a40c5fda8f33a51b6888b599d160292e21318c62784ef1
                                                                          • Instruction ID: 84acd50fcf6edc4fab7678a8983bcc7f273f2c21854f1cff6dead919ddadd24a
                                                                          • Opcode Fuzzy Hash: 0bf8f27dbeb6228148a40c5fda8f33a51b6888b599d160292e21318c62784ef1
                                                                          • Instruction Fuzzy Hash: E8F0CAB6D00A06ABDB248FA1C5047CAFBB4BB88714F14421AC52C67760D378B469CBC0

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 301 22fde6e-22fde88 302 22fde93-22fdec7 301->302
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1702291887.00000000022F2000.00000040.00000800.00020000.00000000.sdmp, Offset: 022F2000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_22f2000_java.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: fa48e1ba76fc61ec885926a3732ae45226ffca2f5ec922dd01e425124a13b27a
                                                                          • Instruction ID: 73c93782a2c4665d3e7aaab262fe80bf4e9f02637a683f87841f34f6c15206fb
                                                                          • Opcode Fuzzy Hash: fa48e1ba76fc61ec885926a3732ae45226ffca2f5ec922dd01e425124a13b27a
                                                                          • Instruction Fuzzy Hash: AAF0CAB6D00A06ABDB258F61C5047CAFBB4BB88714F15421AC52C63760C778B469CBC0

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 297 22fb407-22fb421 298 22fb42c-22fb460 297->298
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1702291887.00000000022F2000.00000040.00000800.00020000.00000000.sdmp, Offset: 022F2000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_22f2000_java.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 2dadf8e8d29e398380834ac83596971e9136deedc4a9eec91b2280b50a0899c7
                                                                          • Instruction ID: 18fe3dfa3895d8ba01a9108ed82b45fd37962cf9b4e4886e92a73422ab59db15
                                                                          • Opcode Fuzzy Hash: 2dadf8e8d29e398380834ac83596971e9136deedc4a9eec91b2280b50a0899c7
                                                                          • Instruction Fuzzy Hash: D5F0CAB6D00A06ABDB248FA1C5047CAFBB4BB88714F19421AC52C63760D378B469CBC0

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 303 2303c76-2303c90 304 2303c9b-2303ccf 303->304
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1702291887.00000000022F2000.00000040.00000800.00020000.00000000.sdmp, Offset: 022F2000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_22f2000_java.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d1b34130d4a07ea729859561b2fdc1fa7bae2e37c49e50054437ce96c95006c7
                                                                          • Instruction ID: 48c12c94ea6a3ed7878fad4e88481e2809f42d07b6f4b1d291e79ffe3e26a4d4
                                                                          • Opcode Fuzzy Hash: d1b34130d4a07ea729859561b2fdc1fa7bae2e37c49e50054437ce96c95006c7
                                                                          • Instruction Fuzzy Hash: 15F0C2B6D00A06ABDB648F61C5047CAFBB4BB44714F14421AC52C67750D378B465CBC0
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1702291887.00000000022F2000.00000040.00000800.00020000.00000000.sdmp, Offset: 022F2000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_22f2000_java.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 0251c8cffd34c8682c0754841ce30659789f76074b52ad277b264f1272215697
                                                                          • Instruction ID: 6e747e4f91367f1efd7b74b711032b524d8b8eba7e9d6d649b5fb6c7ea054950
                                                                          • Opcode Fuzzy Hash: 0251c8cffd34c8682c0754841ce30659789f76074b52ad277b264f1272215697
                                                                          • Instruction Fuzzy Hash: 0AF0C2B6D00A06ABDB258F61C5047CAFBB4BB44714F14421AC52C63750D378B465CBC0
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1702291887.00000000022F2000.00000040.00000800.00020000.00000000.sdmp, Offset: 022F2000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_22f2000_java.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c1c8b794536c93ec357b568c3748c6d19000d951d3d8823f817b738c7236859d
                                                                          • Instruction ID: 2bac55b2f61a6c198c301b8a0df577e52bb76f85cdc428c0018da96fa5a7f33e
                                                                          • Opcode Fuzzy Hash: c1c8b794536c93ec357b568c3748c6d19000d951d3d8823f817b738c7236859d
                                                                          • Instruction Fuzzy Hash: 48F0C2B5D00A06ABDB24CF61C10438AF7B0BB44B14F14421AC52C63750D378B465CBC0
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1702291887.00000000022F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022F0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_22f0000_java.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: a012a9fb5cf5d9e1554885d89a3030425dd9bcc3e3bcfa4e280c99466c7885fc
                                                                          • Instruction ID: f1f89b2e84561bb88144e7d2ceaa187ef809c0f836f584b52bfe1aaafd033c3d
                                                                          • Opcode Fuzzy Hash: a012a9fb5cf5d9e1554885d89a3030425dd9bcc3e3bcfa4e280c99466c7885fc
                                                                          • Instruction Fuzzy Hash: 442147BA1142568FDB358F588C407C9B7E6FB08314F21482EDEC9EB715D3306B898B54
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1702291887.00000000022F2000.00000040.00000800.00020000.00000000.sdmp, Offset: 022F2000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_22f2000_java.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: e4ebad731d4e0ab1726e450473ebae904bd809162f446ff743e19b6a8ac028ea
                                                                          • Instruction ID: 8aa354ead552410ed6fddc7b62f6db568dfe67dea60d462eb346af8cc9c3ddcc
                                                                          • Opcode Fuzzy Hash: e4ebad731d4e0ab1726e450473ebae904bd809162f446ff743e19b6a8ac028ea
                                                                          • Instruction Fuzzy Hash: A501F972E04665CFCB16CE1894D40A9B771AB8A321B2A85D5C8586B5DAD730F8128FE0
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1702291887.0000000002395000.00000040.00000800.00020000.00000000.sdmp, Offset: 02395000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2395000_java.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 9648e87a7b50ac75c21ce1a2cf0c962df324a7c6b7e70e3b7563904a9a40dc16
                                                                          • Instruction ID: 69077620adbd6658f129ab31324244faccbd80dfdcf849d92b0de2c07d4e2b95
                                                                          • Opcode Fuzzy Hash: 9648e87a7b50ac75c21ce1a2cf0c962df324a7c6b7e70e3b7563904a9a40dc16
                                                                          • Instruction Fuzzy Hash: D6F01CA240D7D08FE7038720A8A66D17F70DF2372474A85CBC0C0CE1A7D159450FC722