Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
5hsRaLKPV6.jar

Overview

General Information

Sample name:5hsRaLKPV6.jar
renamed because original name is a hash value
Original sample name:ae345b40d165255284bf4c6ab00a871fcb035b552ac0b20b3cfb19e4644e49b7
Analysis ID:1590513
MD5:8e96e66f83e748d267df96390c880297
SHA1:bae891900c7c646f62a9b51c27f5b13a30cc9589
SHA256:ae345b40d165255284bf4c6ab00a871fcb035b552ac0b20b3cfb19e4644e49b7
Infos:

Detection

Branchlock Obfuscator
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Branchlock Obfuscator
Exploit detected, runtime environment starts unknown processes
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Contains functionality to detect virtual machines (SLDT)
Contains functionality to query CPU information (cpuid)
Creates a process in suspended mode (likely to inject code)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 7za.exe (PID: 3168 cmdline: 7za.exe x -y -oC:\jar "C:\Users\user\Desktop\5hsRaLKPV6.jar" MD5: 77E556CDFDC5C592F5C46DB4127C6F4C)
    • conhost.exe (PID: 1356 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • java.exe (PID: 6256 cmdline: java.exe -jar "C:\Users\user\Desktop\5hsRaLKPV6.jar" bombastic MD5: 9DAA53BAB2ECB33DC0D9CA51552701FA)
    • conhost.exe (PID: 1244 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • icacls.exe (PID: 6180 cmdline: C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M MD5: 2E49585E4E08565F52090B144062F97E)
      • conhost.exe (PID: 4708 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 1912 cmdline: tasklist.exe MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • conhost.exe (PID: 6060 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
5hsRaLKPV6.jarJoeSecurity_BranchlockObfuscatorYara detected Branchlock ObfuscatorJoe Security
    SourceRuleDescriptionAuthorStrings
    00000001.00000003.1404254971.0000000002DC0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_BranchlockObfuscatorYara detected Branchlock ObfuscatorJoe Security
      00000003.00000003.1412901184.0000000000948000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BranchlockObfuscatorYara detected Branchlock ObfuscatorJoe Security
        00000001.00000002.1404509529.0000000000EE5000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BranchlockObfuscatorYara detected Branchlock ObfuscatorJoe Security
          00000001.00000002.1404433977.0000000000DBD000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_BranchlockObfuscatorYara detected Branchlock ObfuscatorJoe Security
            00000001.00000002.1404564718.0000000000F07000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BranchlockObfuscatorYara detected Branchlock ObfuscatorJoe Security
              Click to see the 3 entries
              No Sigma rule has matched
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 5hsRaLKPV6.jarVirustotal: Detection: 27%Perma Link

              Software Vulnerabilities

              barindex
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeProcess created: C:\Windows\System32\conhost.exe
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeCode function: 4x nop then cmp eax, dword ptr [ecx+04h]3_2_023C8E18
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: seasonmonster.s3.us-east-1.amazonaws.com
              Source: java.exe, 00000003.00000002.1488991611.000000000450B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: HTTP://WWW.CHAMBERSIGN.ORG
              Source: java.exe, 00000003.00000002.1488991611.000000000450B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bugreport.sun.com/bugreport/
              Source: java.exe, 00000003.00000002.1490083892.0000000009A23000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt
              Source: java.exe, 00000003.00000002.1490083892.0000000009A09000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009B34000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.000000000995A000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009984000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.00000000099D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
              Source: java.exe, 00000003.00000002.1490083892.0000000009A23000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.00000000099D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt
              Source: java.exe, 00000003.00000002.1490083892.0000000009B34000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.000000000995A000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009984000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
              Source: java.exe, 00000003.00000002.1490083892.0000000009A23000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt
              Source: java.exe, 00000003.00000002.1490083892.0000000009A09000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009B34000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.000000000995A000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009984000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.00000000099D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
              Source: java.exe, 00000003.00000002.1488991611.00000000048C4000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html
              Source: java.exe, 00000003.00000002.1488991611.0000000004895000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html0
              Source: java.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl
              Source: java.exe, 00000003.00000002.1488991611.00000000048C4000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1488991611.0000000004895000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl0
              Source: java.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl
              Source: java.exe, 00000003.00000002.1488991611.00000000048C4000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1488991611.0000000004895000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
              Source: java.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl
              Source: java.exe, 00000003.00000002.1488991611.0000000004895000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl0
              Source: java.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl
              Source: java.exe, 00000003.00000002.1488991611.00000000048C4000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1488991611.0000000004895000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl0
              Source: java.exe, 00000003.00000002.1490083892.0000000009A23000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl
              Source: java.exe, 00000003.00000002.1490083892.0000000009A09000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009B34000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.000000000995A000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009984000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.00000000099D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
              Source: java.exe, 00000003.00000002.1490083892.0000000009A23000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl
              Source: java.exe, 00000003.00000002.1490083892.0000000009B34000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.000000000995A000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009984000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.00000000099D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
              Source: java.exe, 00000003.00000002.1490083892.0000000009A23000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl
              Source: java.exe, 00000003.00000002.1490083892.0000000009A09000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009B34000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.000000000995A000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009984000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.00000000099D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
              Source: java.exe, 00000003.00000002.1490083892.00000000099D2000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1488991611.000000000450B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://java.oracle.com/
              Source: java.exe, 00000003.00000002.1490083892.0000000009B34000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1491804179.0000000014FA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://null.oracle.com/
              Source: java.exe, 00000003.00000002.1490083892.0000000009A23000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com
              Source: java.exe, 00000003.00000002.1490083892.0000000009A09000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009A23000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009B34000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.000000000995A000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009984000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.00000000099D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
              Source: java.exe, 00000003.00000002.1490083892.0000000009A09000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009A23000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009B34000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.000000000995A000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009984000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.00000000099D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
              Source: java.exe, 00000003.00000002.1490083892.0000000009A23000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009B34000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.000000000995A000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009984000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.00000000099D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
              Source: java.exe, 00000003.00000002.1488991611.00000000048C4000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://policy.camerfirma.com
              Source: java.exe, 00000003.00000002.1488991611.0000000004895000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1491804179.0000000015089000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://policy.camerfirma.com0
              Source: java.exe, 00000003.00000002.1488991611.00000000048C4000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1488991611.000000000450B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/
              Source: java.exe, 00000003.00000002.1488991611.0000000004895000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1488991611.000000000450B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/0
              Source: java.exe, 00000003.00000002.1488991611.000000000450B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/3=
              Source: java.exe, 00000003.00000002.1488991611.000000000450B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/s(
              Source: java.exe, 00000003.00000002.1488991611.000000000450B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.chambersign.org
              Source: java.exe, 00000003.00000002.1488991611.00000000048C4000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1488991611.0000000004895000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.chambersign.org1
              Source: java.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1488991611.000000000450B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm
              Source: java.exe, 00000003.00000002.1488991611.0000000004895000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1488991611.000000000450B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
              Source: java.exe, 00000003.00000002.1488991611.000000000450B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm39
              Source: java.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps
              Source: java.exe, 00000003.00000002.1488991611.0000000004895000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps0
              Source: 5hsRaLKPV6.jarString found in binary or memory: https://branchlock.net
              Source: 7za.exe, 00000001.00000002.1404564718.0000000000F07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://branchlock.netf
              Source: 7za.exe, 00000001.00000002.1404509529.0000000000EE5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://branchlock.netk
              Source: java.exe, 00000003.00000002.1491550634.0000000014B3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://branchlock.nett
              Source: java.exe, 00000003.00000002.1488991611.000000000450B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com
              Source: java.exe, 00000003.00000002.1488991611.0000000004895000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1488991611.000000000450B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
              Source: java.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://repository.luxtrust.lu
              Source: java.exe, 00000003.00000002.1488991611.00000000048C4000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://repository.luxtrust.lu0
              Source: java.exe, 00000003.00000002.1488991611.00000000047B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com
              Source: java.exe, 00000003.00000002.1490083892.0000000009A55000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/1.jar
              Source: java.exe, 00000003.00000002.1490083892.0000000009A55000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/2.jar
              Source: java.exe, 00000003.00000002.1490083892.0000000009A55000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/3.jar
              Source: java.exe, 00000003.00000002.1490083892.0000000009A55000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/checker.jar
              Source: java.exe, 00000003.00000002.1490083892.0000000009A55000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/email.js
              Source: java.exe, 00000003.00000002.1490083892.0000000009A55000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/history.jar
              Source: java.exe, 00000003.00000002.1490083892.0000000009A55000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/recovery.jar
              Source: java.exe, 00000003.00000002.1490083892.0000000009A55000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/res.jar
              Source: java.exe, 00000003.00000002.1488991611.00000000047B4000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009A55000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://seasonmonster.s3.us-east-1.amazonaws.com/swiftcopy.pdf
              Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
              Source: classification engineClassification label: mal64.expl.evad.winJAR@10/8@1/1
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Vault\credJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1356:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1244:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4708:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6060:120:WilError_03
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeFile created: C:\Users\user\AppData\Local\Temp\hsperfdata_userJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
              Source: C:\Windows\System32\7za.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: 5hsRaLKPV6.jarVirustotal: Detection: 27%
              Source: unknownProcess created: C:\Windows\System32\7za.exe 7za.exe x -y -oC:\jar "C:\Users\user\Desktop\5hsRaLKPV6.jar"
              Source: C:\Windows\System32\7za.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exe java.exe -jar "C:\Users\user\Desktop\5hsRaLKPV6.jar" bombastic
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
              Source: C:\Windows\SysWOW64\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist.exe
              Source: C:\Windows\SysWOW64\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist.exeJump to behavior
              Source: C:\Windows\System32\7za.exeSection loaded: 7z.dllJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: version.dllJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\icacls.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior

              Data Obfuscation

              barindex
              Source: Yara matchFile source: 5hsRaLKPV6.jar, type: SAMPLE
              Source: Yara matchFile source: 00000001.00000003.1404254971.0000000002DC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.1412901184.0000000000948000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.1404509529.0000000000EE5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.1404433977.0000000000DBD000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.1404564718.0000000000F07000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.1491550634.0000000014B3B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 7za.exe PID: 3168, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: java.exe PID: 6256, type: MEMORYSTR
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeCode function: 3_2_023CB277 push es; iretd 3_2_023CB27E
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeCode function: 3_2_023CD691 push cs; retf 3_2_023CD6B1
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeCode function: 3_2_023C5870 pushad ; iretd 3_2_023C5871
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeCode function: 3_2_023CB531 push ecx; retn 0022h3_2_023CB5E6
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeCode function: 3_2_0232D8F7 push 00000000h; mov dword ptr [esp], esp3_2_0232D921
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeCode function: 3_2_0232A21B push ecx; ret 3_2_0232A225
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeCode function: 3_2_0232A20A push ecx; ret 3_2_0232A21A
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeCode function: 3_2_0232BB67 push 00000000h; mov dword ptr [esp], esp3_2_0232BB8D
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeCode function: 3_2_0232B3B7 push 00000000h; mov dword ptr [esp], esp3_2_0232B3DD
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeCode function: 3_2_0232D8E0 push 00000000h; mov dword ptr [esp], esp3_2_0232D921
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeCode function: 3_2_0232B947 push 00000000h; mov dword ptr [esp], esp3_2_0232B96D
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeCode function: 3_2_0232C477 push 00000000h; mov dword ptr [esp], esp3_2_0232C49D
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
              Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: java.exe, 00000003.00000002.1490083892.0000000009A55000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AUTORUNSC.EXE8
              Source: java.exe, 00000003.00000002.1490083892.0000000009A55000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AUTORUNS.EXE8
              Source: java.exe, 00000003.00000002.1490083892.0000000009A55000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXE8
              Source: java.exe, 00000003.00000002.1490083892.0000000009A55000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OLLYDBG.EXE8
              Source: java.exe, 00000003.00000002.1490083892.0000000009A55000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: PROCMON.EXE8
              Source: java.exe, 00000003.00000002.1490083892.0000000009A55000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: FILEMON.EXE8
              Source: java.exe, 00000003.00000002.1490083892.0000000009A55000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: FIDDLER.EXE8
              Source: java.exe, 00000003.00000002.1490083892.0000000009A55000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: REGMON.EXE8
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeCode function: 3_2_023CB6C4 sldt word ptr [eax]3_2_023CB6C4
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: java.exe, 00000003.00000002.1487288527.000000000090B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll6oY
              Source: java.exe, 00000003.00000003.1430792617.00000000148F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: com/sun/corba/se/impl/util/SUNVMCID.classPK
              Source: java.exe, 00000003.00000003.1430792617.00000000148F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &com/sun/corba/se/impl/util/SUNVMCID.classPK
              Source: java.exe, 00000003.00000002.1487288527.000000000090B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [Ljava/lang/VirtualMachineError;
              Source: java.exe, 00000003.00000003.1430792617.00000000148F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: org/omg/CORBA/OMGVMCID.classPK
              Source: java.exe, 00000003.00000002.1487288527.000000000090B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: cjava/lang/VirtualMachineError
              Source: java.exe, 00000003.00000002.1490083892.0000000009A55000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware.exe8
              Source: java.exe, 00000003.00000003.1430792617.00000000148F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: java/lang/VirtualMachineError.classPK
              Source: java.exe, 00000003.00000002.1490083892.0000000009A55000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vboxtray.exe8
              Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeMemory protected: page read and write | page guardJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist.exeJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeCode function: 3_2_023203C0 cpuid 3_2_023203C0
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\client\jvm.dll VolumeInformationJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeQueries volume information: C:\Users\user\AppData\Local\Temp\hsperfdata_user\6256 VolumeInformationJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\resources.jar VolumeInformationJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\rt.jar VolumeInformationJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\jce.jar VolumeInformationJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\charsets.jar VolumeInformationJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\jfr.jar VolumeInformationJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\meta-index VolumeInformationJump to behavior
              Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Windows Management Instrumentation
              1
              Services File Permissions Weakness
              11
              Process Injection
              1
              Masquerading
              OS Credential Dumping11
              Security Software Discovery
              Remote ServicesData from Local System2
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts1
              Exploitation for Client Execution
              1
              DLL Side-Loading
              1
              Services File Permissions Weakness
              1
              Virtualization/Sandbox Evasion
              LSASS Memory1
              Virtualization/Sandbox Evasion
              Remote Desktop ProtocolData from Removable Media1
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              1
              Disable or Modify Tools
              Security Account Manager23
              System Information Discovery
              SMB/Windows Admin SharesData from Network Shared Drive2
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
              Process Injection
              NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
              Obfuscated Files or Information
              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              Services File Permissions Weakness
              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              DLL Side-Loading
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1590513 Sample: 5hsRaLKPV6.jar Startdate: 14/01/2025 Architecture: WINDOWS Score: 64 26 seasonmonster.s3.us-east-1.amazonaws.com 2->26 28 s3-r-w.us-east-1.amazonaws.com 2->28 32 Multi AV Scanner detection for submitted file 2->32 34 Yara detected Branchlock Obfuscator 2->34 36 Exploit detected, runtime environment starts unknown processes 2->36 8 java.exe 23 2->8         started        12 7za.exe 15 2->12         started        signatures3 process4 dnsIp5 30 s3-r-w.us-east-1.amazonaws.com 52.216.210.114, 443, 49707 AMAZON-02US United States 8->30 38 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->38 14 tasklist.exe 1 8->14         started        16 icacls.exe 1 8->16         started        18 conhost.exe 8->18         started        20 conhost.exe 12->20         started        signatures6 process7 process8 22 conhost.exe 14->22         started        24 conhost.exe 16->24         started       

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              5hsRaLKPV6.jar0%ReversingLabs
              5hsRaLKPV6.jar27%VirustotalBrowse
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://www.quovadis.bm390%Avira URL Cloudsafe
              https://branchlock.netk0%Avira URL Cloudsafe
              https://seasonmonster.s3.us-east-1.amazonaws.com/2.jar0%Avira URL Cloudsafe
              https://seasonmonster.s3.us-east-1.amazonaws.com/1.jar0%Avira URL Cloudsafe
              https://seasonmonster.s3.us-east-1.amazonaws.com0%Avira URL Cloudsafe
              https://branchlock.nett0%Avira URL Cloudsafe
              http://repository.swisssign.com/s(0%Avira URL Cloudsafe
              http://repository.swisssign.com/3=0%Avira URL Cloudsafe
              https://seasonmonster.s3.us-east-1.amazonaws.com/res.jar0%Avira URL Cloudsafe
              https://seasonmonster.s3.us-east-1.amazonaws.com/email.js0%Avira URL Cloudsafe
              https://branchlock.netf0%Avira URL Cloudsafe
              https://seasonmonster.s3.us-east-1.amazonaws.com/recovery.jar0%Avira URL Cloudsafe
              https://seasonmonster.s3.us-east-1.amazonaws.com/checker.jar0%Avira URL Cloudsafe
              https://seasonmonster.s3.us-east-1.amazonaws.com/3.jar0%Avira URL Cloudsafe
              https://seasonmonster.s3.us-east-1.amazonaws.com/history.jar0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              s3-r-w.us-east-1.amazonaws.com
              52.216.210.114
              truefalse
                high
                seasonmonster.s3.us-east-1.amazonaws.com
                unknown
                unknownfalse
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://crl.xrampsecurity.com/XGCA.crljava.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://branchlock.nettjava.exe, 00000003.00000002.1491550634.0000000014B3B000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://crl.chambersign.org/chambersroot.crl0java.exe, 00000003.00000002.1488991611.00000000048C4000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1488991611.0000000004895000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://repository.swisssign.com/s(java.exe, 00000003.00000002.1488991611.000000000450B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://repository.luxtrust.lu0java.exe, 00000003.00000002.1488991611.00000000048C4000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://branchlock.netk7za.exe, 00000001.00000002.1404509529.0000000000EE5000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://bugreport.sun.com/bugreport/java.exe, 00000003.00000002.1488991611.000000000450B000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://cps.chambersign.org/cps/chambersroot.html0java.exe, 00000003.00000002.1488991611.0000000004895000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://seasonmonster.s3.us-east-1.amazonaws.com/2.jarjava.exe, 00000003.00000002.1490083892.0000000009A55000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://java.oracle.com/java.exe, 00000003.00000002.1490083892.00000000099D2000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1488991611.000000000450B000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://null.oracle.com/java.exe, 00000003.00000002.1490083892.0000000009B34000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1491804179.0000000014FA8000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.chambersign.org1java.exe, 00000003.00000002.1488991611.00000000048C4000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1488991611.0000000004895000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://repository.swisssign.com/0java.exe, 00000003.00000002.1488991611.0000000004895000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1488991611.000000000450B000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    HTTP://WWW.CHAMBERSIGN.ORGjava.exe, 00000003.00000002.1488991611.000000000450B000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://branchlock.net5hsRaLKPV6.jarfalse
                                        high
                                        http://policy.camerfirma.comjava.exe, 00000003.00000002.1488991611.00000000048C4000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://seasonmonster.s3.us-east-1.amazonaws.com/1.jarjava.exe, 00000003.00000002.1490083892.0000000009A55000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.quovadis.bm39java.exe, 00000003.00000002.1488991611.000000000450B000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://ocsp.quovadisoffshore.comjava.exe, 00000003.00000002.1488991611.000000000450B000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://crl.securetrust.com/STCA.crl0java.exe, 00000003.00000002.1488991611.0000000004895000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.quovadisglobal.com/cpsjava.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://cps.chambersign.org/cps/chambersroot.htmljava.exe, 00000003.00000002.1488991611.00000000048C4000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://repository.swisssign.com/3=java.exe, 00000003.00000002.1488991611.000000000450B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://seasonmonster.s3.us-east-1.amazonaws.com/res.jarjava.exe, 00000003.00000002.1490083892.0000000009A55000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://seasonmonster.s3.us-east-1.amazonaws.com/email.jsjava.exe, 00000003.00000002.1490083892.0000000009A55000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://crl.securetrust.com/STCA.crljava.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://repository.luxtrust.lujava.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.quovadisglobal.com/cps0java.exe, 00000003.00000002.1488991611.0000000004895000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://seasonmonster.s3.us-east-1.amazonaws.comjava.exe, 00000003.00000002.1488991611.00000000047B4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://crl.xrampsecurity.com/XGCA.crl0java.exe, 00000003.00000002.1488991611.00000000048C4000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1488991611.0000000004895000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://seasonmonster.s3.us-east-1.amazonaws.com/swiftcopy.pdfjava.exe, 00000003.00000002.1488991611.00000000047B4000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009A55000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://branchlock.netf7za.exe, 00000001.00000002.1404564718.0000000000F07000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://www.quovadis.bmjava.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1488991611.000000000450B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.quovadis.bm0java.exe, 00000003.00000002.1488991611.0000000004895000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1488991611.000000000450B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://ocsp.quovadisoffshore.com0java.exe, 00000003.00000002.1488991611.0000000004895000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1488991611.000000000450B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://seasonmonster.s3.us-east-1.amazonaws.com/history.jarjava.exe, 00000003.00000002.1490083892.0000000009A55000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  http://crl.chambersign.org/chambersroot.crljava.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://repository.swisssign.com/java.exe, 00000003.00000002.1488991611.00000000048C4000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1490083892.0000000009BD8000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1488991611.000000000450B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://www.chambersign.orgjava.exe, 00000003.00000002.1488991611.000000000450B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://policy.camerfirma.com0java.exe, 00000003.00000002.1488991611.0000000004895000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000003.00000002.1491804179.0000000015089000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://seasonmonster.s3.us-east-1.amazonaws.com/3.jarjava.exe, 00000003.00000002.1490083892.0000000009A55000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          unknown
                                                                          https://seasonmonster.s3.us-east-1.amazonaws.com/checker.jarjava.exe, 00000003.00000002.1490083892.0000000009A55000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          unknown
                                                                          https://seasonmonster.s3.us-east-1.amazonaws.com/recovery.jarjava.exe, 00000003.00000002.1490083892.0000000009A55000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          unknown
                                                                          • No. of IPs < 25%
                                                                          • 25% < No. of IPs < 50%
                                                                          • 50% < No. of IPs < 75%
                                                                          • 75% < No. of IPs
                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                          52.216.210.114
                                                                          s3-r-w.us-east-1.amazonaws.comUnited States
                                                                          16509AMAZON-02USfalse
                                                                          Joe Sandbox version:42.0.0 Malachite
                                                                          Analysis ID:1590513
                                                                          Start date and time:2025-01-14 08:23:10 +01:00
                                                                          Joe Sandbox product:CloudBasic
                                                                          Overall analysis duration:0h 2m 55s
                                                                          Hypervisor based Inspection enabled:false
                                                                          Report type:full
                                                                          Cookbook file name:defaultwindowsfilecookbook.jbs
                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                          Run name:Without Tracing
                                                                          Number of analysed new started processes analysed:10
                                                                          Number of new started drivers analysed:0
                                                                          Number of existing processes analysed:0
                                                                          Number of existing drivers analysed:0
                                                                          Number of injected processes analysed:0
                                                                          Technologies:
                                                                          • HCA enabled
                                                                          • EGA enabled
                                                                          • AMSI enabled
                                                                          Analysis Mode:default
                                                                          Analysis stop reason:Timeout
                                                                          Sample name:5hsRaLKPV6.jar
                                                                          renamed because original name is a hash value
                                                                          Original Sample Name:ae345b40d165255284bf4c6ab00a871fcb035b552ac0b20b3cfb19e4644e49b7
                                                                          Detection:MAL
                                                                          Classification:mal64.expl.evad.winJAR@10/8@1/1
                                                                          EGA Information:Failed
                                                                          HCA Information:
                                                                          • Successful, ratio: 71%
                                                                          • Number of executed functions: 18
                                                                          • Number of non-executed functions: 3
                                                                          Cookbook Comments:
                                                                          • Found application associated with file extension: .jar
                                                                          • Stop behavior analysis, all processes terminated
                                                                          • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
                                                                          • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.95.31.18
                                                                          • Excluded domains from analysis (whitelisted): fe3.delivery.mp.microsoft.com, slscr.update.microsoft.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, glb.sls.prod.dcat.dsp.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                                                          • Execution Graph export aborted for target java.exe, PID 6256 because it is empty
                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                          • Report size getting too big, too many NtSetInformationFile calls found.
                                                                          No simulations
                                                                          No context
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          s3-r-w.us-east-1.amazonaws.comSwift-TT680169 Report.svgGet hashmaliciousBranchlock ObfuscatorBrowse
                                                                          • 3.5.12.103
                                                                          Mansourbank Swift-TT379733 Report.svgGet hashmaliciousBranchlock ObfuscatorBrowse
                                                                          • 52.216.29.192
                                                                          Mansourbank Swift-TT680169 Report.svgGet hashmaliciousBranchlock ObfuscatorBrowse
                                                                          • 52.217.119.34
                                                                          Wupos Reciept.pdf.jarGet hashmaliciousBranchlock ObfuscatorBrowse
                                                                          • 52.216.217.130
                                                                          Swift Transaction Report.jsGet hashmaliciousBranchlock ObfuscatorBrowse
                                                                          • 16.182.70.66
                                                                          Swift Transaction Report.jsGet hashmaliciousBranchlock ObfuscatorBrowse
                                                                          • 54.231.134.106
                                                                          https://midoregoncu-securemessagecenter.s3.us-east-1.amazonaws.com/open/message_12832.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                          • 54.231.130.18
                                                                          http://img1.wsimg.com/blobby/go/9b6ed793-452c-4f8f-8f80-6847f4d114d7/downloads/71318864754.pdfGet hashmaliciousUnknownBrowse
                                                                          • 52.217.134.50
                                                                          https://5qc68jhomepl.blob.core.windows.net/9x0f8/index.htmlGet hashmaliciousUnknownBrowse
                                                                          • 52.217.41.32
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          AMAZON-02UShttps://email.lc.haxconsulting.com/c/eJx0k0tv4zgQhH-NdBk4kKgHrQMPdhI5mck78djJRaDIlsSYD4WkpLF__cJOsLvAZq_FLnbhQzWrBCdJS6-fh9_RaK9H9Muk6c9yE3LCCkjrLORGUaGJZGcd_cOMdoP0QrdnzKivt8pMGqzrRF_5fQ-EtqDZvqLOiVYDD4HEOMnxvMB5EoKiQlYKnKMtHLdv5i83BT5n4-tb-75JAbPHy6-p02-Mqp6KVv9LO9pyPE9ZwVKaZjlkgBjkRVEjHIIehTVagfakt4YPzAujw45EeRrF0RziBvIoyeskRxgwwlma0ajAPBQERSiL4jg55o2Ss2YOOYWszps4a5o6CtLoWwySdN73LkgWASoDVE7T9N-pAJXcTFoaymeOSmr3s3YQHGYDhSApG2GdrzRVECQXdyBkgHJJ_5GuqNsJ7QKUnzgEyYUGIbsvNY0644_656a874w-uqIs-lGk6Q-UFjiUrPpkKLQHq6kka1Q6vvq928YBWm7z65vVxHE3FgEq59i-jvvVs0xEw7L6_MK2IhvbP_TKJn77qF7k3TSixbC_V5cBWuI33j_fivpGtZOAqN0Zxga7eJCXr-uXzfMHlIcjgANevhv8USfN_ZM-L_Dhoeu38GTXt4sALYfFzheHl3LNy1VZjw8iQOU6QOWmvb3vrqbc9Y17WtynH9OVVkrF8qdedwDgHtt4eTkPpTn1ebm6Sd7eV-rWxvS93979kt02VOA7wwntRWisaIUm9SB3sxOQsLdmFBwskUA5M1oD88aGlvwv49CZwTIgJ_9MuHE2GbsDG3pyTPFtBE-YUdW31-YJ-Orvpo8E_RUAAP__dHE7QwGet hashmaliciousUnknownBrowse
                                                                          • 18.245.31.88
                                                                          Discord.exeGet hashmaliciousAsyncRATBrowse
                                                                          • 3.127.138.57
                                                                          http://locrmhelp.comGet hashmaliciousUnknownBrowse
                                                                          • 52.84.151.46
                                                                          https://imtcoken.im/Get hashmaliciousUnknownBrowse
                                                                          • 143.204.215.6
                                                                          http://www.toekan.im/Get hashmaliciousUnknownBrowse
                                                                          • 143.204.215.6
                                                                          http://bu9.fysou.web.id/webs6/cx.aktifkn.fiturrGet hashmaliciousUnknownBrowse
                                                                          • 108.138.26.27
                                                                          http://bu9.fysou.web.id/webs6/aktrfn.fitur.pylterGet hashmaliciousUnknownBrowse
                                                                          • 108.138.26.116
                                                                          http://pub-dfc04553e9094cfc93a2df6d57084097.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                          • 3.75.10.80
                                                                          https://metahorizonsfacebooksupport.tempisite.com/italy39Get hashmaliciousHTMLPhisherBrowse
                                                                          • 54.229.247.168
                                                                          No context
                                                                          No context
                                                                          Process:C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exe
                                                                          File Type:ASCII text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):52
                                                                          Entropy (8bit):4.935546689086913
                                                                          Encrypted:false
                                                                          SSDEEP:3:oFj4I5vpm4UStyXyn:oJ5bPn
                                                                          MD5:71BB2661A134E044A3E3CF0B48A4785C
                                                                          SHA1:9295AB1F4C70B60EB427B20D37E6AEFA38A42A7F
                                                                          SHA-256:BE7F306BDD7A646968F6038C461AF4B27DB699C227D6F7914F4DAB6E7A1BA406
                                                                          SHA-512:BB05987658BC36FCDAC3939C3F459E13A1321B8571D9FDB089DDC2154E035639B7F69E3A3FB9D0A7656E7648EE4408DEE9215A7882D3B121E1039517460FD248
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview:C:\Program Files (x86)\Java\jre-1.8..1736839455772..
                                                                          Process:C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):65536
                                                                          Entropy (8bit):1.2828140813520312
                                                                          Encrypted:false
                                                                          SSDEEP:96:hZpryk8GEJlPLAe6L6JCwgUUvWFi7JYpHG1bow4:hZR8GEBLAe6L6TU+FuJUHGd
                                                                          MD5:64AD91969A66215D94D5AF26B75ED389
                                                                          SHA1:1DB22F90DE654BB22B721E4B843991E191DAAB88
                                                                          SHA-256:50D1CF9831B7CEFE7D3C67F80071E551475F6C54F3C6E9C36078F9BBC8C618BC
                                                                          SHA-512:1CEC1FDF94CC97B241DCCAB637B533117EB146AA7787545301C4328CC82DC1DAA846DAD11F71A8B6F9566F977E4EE80DC1774BE82676E7B4026A9C2C89133024
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview:.........8.......m...... .......8...........J...0...sun.rt._sync_Inflations.............8...........J...0...sun.rt._sync_Deflations.............@...........J...8...sun.rt._sync_ContendedLockAttempts..........8...........J...0...sun.rt._sync_FutileWakeups..........0...........J...(...sun.rt._sync_Parks..........@...........J...8...sun.rt._sync_EmptyNotifications.............8...........J...0...sun.rt._sync_Notifications..........8...........J...0...sun.rt._sync_SlowEnter..............8...........J...0...sun.rt._sync_SlowExit...............8...........J...0...sun.rt._sync_SlowNotify.............8...........J...0...sun.rt._sync_SlowNotifyAll..........8...........J...0...sun.rt._sync_FailedSpins............@...........J...8...sun.rt._sync_SuccessfulSpins................8...........J...0...sun.rt._sync_PrivateA...............8...........J...0...sun.rt._sync_PrivateB...............@...........J...8...sun.rt._sync_MonInCirculation...............8...........J...0...sun.rt._sync_MonScavenged...
                                                                          Process:C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):45
                                                                          Entropy (8bit):0.9111711733157262
                                                                          Encrypted:false
                                                                          SSDEEP:3:/lwlt7n:WNn
                                                                          MD5:C8366AE350E7019AEFC9D1E6E6A498C6
                                                                          SHA1:5731D8A3E6568A5F2DFBBC87E3DB9637DF280B61
                                                                          SHA-256:11E6ACA8E682C046C83B721EEB5C72C5EF03CB5936C60DF6F4993511DDC61238
                                                                          SHA-512:33C980D5A638BFC791DE291EBF4B6D263B384247AB27F261A54025108F2F85374B579A026E545F81395736DD40FA4696F2163CA17640DD47F1C42BC9971B18CD
                                                                          Malicious:false
                                                                          Preview:........................................J2SE.
                                                                          Process:C:\Windows\System32\7za.exe
                                                                          File Type:compiled Java class data, version 52.0 (Java 1.8)
                                                                          Category:dropped
                                                                          Size (bytes):7467
                                                                          Entropy (8bit):6.386422292092153
                                                                          Encrypted:false
                                                                          SSDEEP:96:pyeC0vsKCbHxPLLBfvmG8L6d7xyBdxa7/ky8mnMINS5ju/Nn1:pyjGlCbRTLBfvw6dkG7/ky1ZNAS11
                                                                          MD5:7453970A7579358CC210524FBA8D3DAA
                                                                          SHA1:1B2A7B1240AA287521867830E7ADE213AC872B98
                                                                          SHA-256:B8BA3624315FC214D9BEDABE20E9851D4E7BF6131CC426BA15181D00EA997B79
                                                                          SHA-512:EF4E77595745D6476DBA10BB8B51D890C010966D5E577999991C91FF03AAAD4A2F204B1A5B60F5A1B76D9FC385DE23058BD323DC44CFBAD4E5D11B32E5F088F9
                                                                          Malicious:false
                                                                          Preview:.......4.A..........java/lang/Throwable..........[Ljava/lang/Object;.......[Ljava/lang/String;...(Ljava/lang/Object;II)V...java/io/IOException......java/lang/InterruptedException......java/lang/Exception............&java/lang/ReflectiveOperationException...............96....8...java/lang/String......bombastic............)(Ljava/lang/Object;[Ljava/lang/Object;I)I............../...!.........#...<init>..'(Ljava/lang/String;Ljava/lang/String;)V..%.&..".'......_(Ljava/lang/Object;Ljava/lang/Object;ILjava/lang/Object;[Ljava/lang/Object;I)Ljava/lang/Object;..).*....+......N(Ljava/lang/Object;IILjava/lang/Object;[Ljava/lang/Object;I)Ljava/lang/Object;..-....../....l..../...2......;(CLjava/lang/Object;[Ljava/lang/Object;I)Ljava/lang/Object;..4.5....6..$java/util/concurrent/ExecutorService..8...()V..:...(Ljava/io/File;)V....<....=...>...(Ljava/lang/invoke/MethodHandles$Lookup;Ljava/lang/String;Ljava/lang/invoke/MethodType;Ljava/lang/invoke/MethodType;Ljava/lang/invoke/MethodHandl
                                                                          Process:C:\Windows\System32\7za.exe
                                                                          File Type:compiled Java class data, version 52.0 (Java 1.8)
                                                                          Category:dropped
                                                                          Size (bytes):709
                                                                          Entropy (8bit):5.436349643687698
                                                                          Encrypted:false
                                                                          SSDEEP:12:QwpbRaBt0ETsn+2TRsf5VUuNh+TQdldqPgNj4w8MFMjgMu1:Q6aVTsn/9QfH8MFugMK
                                                                          MD5:5D09EAC457D870F1D508AEB4D2F005F4
                                                                          SHA1:52E9AC3556123DECC93C5494C742DC4BE01631BC
                                                                          SHA-256:CABEA422089E3C7DF8808727733F2EBAE6B312C856834196A0D74D3CDCFB183F
                                                                          SHA-512:F0DBB371D4F46CA2197A4C7AEAAEAA58023FDF5D1B480C37C79C24C66382D0061BF66E158A6FDE7B0C1A9068DDE5A09F615A1F07FA3516CFCE450E11C91178F2
                                                                          Malicious:false
                                                                          Preview:.......4.+..../.......java/io/InputStreamReader..........[Ljava/lang/Object;...<clinit>...()V...java/lang/Object....f#.........java/lang/Long......valueOf...(J)Ljava/lang/Long;............[.....>................'(I)Ljava/lang/management/RuntimeMXBean;..&java/lang/management/ManagementFactory............:(Ljava/lang/Object;[Ljava/lang/Object;I)Ljava/lang/Object;............"java/lang/management/RuntimeMXBean.. ...<init>...(Ljava/io/InputStream;)V..".#....$.......(C)Ljava/awt/Desktop;...java/awt/Desktop..(...Code.............................*...&............Y.......SY.......S.................*..................7.....!........".#...*............*+..%........&.'...*.............)....6.....).......
                                                                          Process:C:\Windows\System32\7za.exe
                                                                          File Type:compiled Java class data, version 52.0 (Java 1.8)
                                                                          Category:dropped
                                                                          Size (bytes):1834
                                                                          Entropy (8bit):3.4908661873375055
                                                                          Encrypted:false
                                                                          SSDEEP:24:b4m8AuMo7QDsoE9fYy4aSwm5ehz6FB2HR/8Ecaf+D88Zq6ZbvVDn5TJyyRDsaZQm:b4m8somTmR02WJEVvrfrs
                                                                          MD5:238309786CC1B908892502E152A49A60
                                                                          SHA1:72D78AF1A6C8905F8802C991402EF08ECC1612E9
                                                                          SHA-256:7B63F628961DF21D2C89A794574D26D171A40FA5C98857309D54D011279884DB
                                                                          SHA-512:CC046818C6E7BBD94D2FCCBF389A1C8EBE16E9225414B119DDF24CE153FD73B2884C5DF650BAAFE12EE36FAC6D3C2A9511BF7F3D968700C272F3AE2EAB4D808B
                                                                          Malicious:false
                                                                          Preview:.......4.D...Branchlock_.......java/lang/Object..........Ljava/lang/String;..: * .........: *###. .........: *#######( .........: *################# .........: *## .################## .........: (####### .####. .*######### .........: ########, .#. .#######. .........: #######, #######. .........: ######, #######. .........: (######. #######. .."..........: #######. #######, ..&......: ######## (#######, ## ..)......: ##########. ##### ..,......: ########
                                                                          Process:C:\Windows\System32\7za.exe
                                                                          File Type:ASCII text
                                                                          Category:dropped
                                                                          Size (bytes):59
                                                                          Entropy (8bit):4.375258354962731
                                                                          Encrypted:false
                                                                          SSDEEP:3:ZLCAWIzBEnbzHELGvS14:1KItUbzHyGJ
                                                                          MD5:3C6B699D521DDBB93869D35610D86ADA
                                                                          SHA1:4747133B51B6171DB1F68D8B7119310333D8807E
                                                                          SHA-256:AD8EFAA22B3BA49B93ADFC93BEF58B3C618AAC0BC3BEBB7558EA507504F7053F
                                                                          SHA-512:0E4B2FD657E70E49CFB8F49CBCD23CB11A29EE734EA4827670E9B6129C1D4CA0B52FC7EBE0020B6FF94378347334F722D4861EC423DD99A9A5199CBA92C5DF58
                                                                          Malicious:false
                                                                          Preview:Manifest-Version: 1.0.Main-Class: bombastic.Class-Path: ...
                                                                          Process:C:\Windows\System32\7za.exe
                                                                          File Type:compiled Java class data, version 52.0 (Java 1.8)
                                                                          Category:dropped
                                                                          Size (bytes):14875
                                                                          Entropy (8bit):6.638357662906348
                                                                          Encrypted:false
                                                                          SSDEEP:384:NuZ7hHpqqNdAQP79S+VytV34p4doxVyAyKpAF:vkdPU+VytV34p4doxsFKuF
                                                                          MD5:07CDA5F9F90C234106CC7E8887B17145
                                                                          SHA1:5B74EE2D8C3930A56941AFFC0B0C9C4C242A64CE
                                                                          SHA-256:FFBF3D15A8D52E694D7AAC03483F0D228888DDEC7A78107FB0D5EFBF55D0539D
                                                                          SHA-512:A3377FC40E82F9441D1E0C9BFA2FEE186AAE931FE4ED3891D397F889B5E15A62474DEC96302F430BDFEC4B1D62BE1E76E71584E3DCC872268D19DCB643F1A979
                                                                          Malicious:false
                                                                          Preview:.......4.....bombastic......java/lang/Object..........I...................Ljava/util/List;.......[Ljava/lang/String;...........[Ljava/lang/Object;...<clinit>...()V..#java/lang/IndexOutOfBoundsException....................G...........Q............G........F...............................K......B.....C...............................................C.L........................]...........P..................Q........N...............A..............]....#...7....-....../...........)..................................C.(...K....................
                                                                          File type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                          Entropy (8bit):7.948030467353428
                                                                          TrID:
                                                                          • Java Archive (13504/1) 62.80%
                                                                          • ZIP compressed archive (8000/1) 37.20%
                                                                          File name:5hsRaLKPV6.jar
                                                                          File size:21'359 bytes
                                                                          MD5:8e96e66f83e748d267df96390c880297
                                                                          SHA1:bae891900c7c646f62a9b51c27f5b13a30cc9589
                                                                          SHA256:ae345b40d165255284bf4c6ab00a871fcb035b552ac0b20b3cfb19e4644e49b7
                                                                          SHA512:cee16641bbbbf2da2d1ae7af00e6b266de0374b955c37933061c4d1641aac4cd1216a05c2140cb9203b0dc9cf565c686d5c04cd884eb44c578cd40605f7f7224
                                                                          SSDEEP:384:OAJjyCdE1n02lxzHm8QkdduiQpbkl/JZ476rvusoEyPsh719/buA5OB5/6RkhZgK:PJy1npQm5QxkBcyvulbkB19/buAoX/Rf
                                                                          TLSH:D6A2E1263CF6065DD43BE071AC374873D08D967848CAD22B1576ABA5427AE3313A2FDC
                                                                          File Content Preview:PK........%.$Z................META-INF/MANIFEST.MFUT.....yg.....M..LK-...K-*....R0.3..M...u.I,..RH..MJ,..L.....$.dX).qq..PK..{D.Y:...;...PK.........9%Z................../....class.R[O.A.=C...k..P.*h.E]. J.....bDI..m....k.-../..7..Q|...@c..f..^.!./..4.....
                                                                          Icon Hash:d08c8e8ea2868a54
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Jan 14, 2025 08:24:19.994956970 CET49707443192.168.2.952.216.210.114
                                                                          Jan 14, 2025 08:24:19.994982004 CET4434970752.216.210.114192.168.2.9
                                                                          Jan 14, 2025 08:24:19.995162964 CET49707443192.168.2.952.216.210.114
                                                                          Jan 14, 2025 08:24:20.130414963 CET49707443192.168.2.952.216.210.114
                                                                          Jan 14, 2025 08:24:20.130446911 CET4434970752.216.210.114192.168.2.9
                                                                          Jan 14, 2025 08:24:20.685987949 CET4434970752.216.210.114192.168.2.9
                                                                          Jan 14, 2025 08:24:20.686065912 CET49707443192.168.2.952.216.210.114
                                                                          Jan 14, 2025 08:24:20.686088085 CET4434970752.216.210.114192.168.2.9
                                                                          Jan 14, 2025 08:24:20.686165094 CET49707443192.168.2.952.216.210.114
                                                                          Jan 14, 2025 08:24:20.717562914 CET49707443192.168.2.952.216.210.114
                                                                          Jan 14, 2025 08:24:20.717600107 CET4434970752.216.210.114192.168.2.9
                                                                          Jan 14, 2025 08:24:21.311986923 CET49707443192.168.2.952.216.210.114
                                                                          Jan 14, 2025 08:24:21.312064886 CET4434970752.216.210.114192.168.2.9
                                                                          Jan 14, 2025 08:24:21.312342882 CET4434970752.216.210.114192.168.2.9
                                                                          Jan 14, 2025 08:24:21.312350035 CET49707443192.168.2.952.216.210.114
                                                                          Jan 14, 2025 08:24:21.312371016 CET4434970752.216.210.114192.168.2.9
                                                                          Jan 14, 2025 08:24:21.312402964 CET49707443192.168.2.952.216.210.114
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Jan 14, 2025 08:24:19.973506927 CET5647453192.168.2.91.1.1.1
                                                                          Jan 14, 2025 08:24:19.992058992 CET53564741.1.1.1192.168.2.9
                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                          Jan 14, 2025 08:24:19.973506927 CET192.168.2.91.1.1.10x9de4Standard query (0)seasonmonster.s3.us-east-1.amazonaws.comA (IP address)IN (0x0001)false
                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                          Jan 14, 2025 08:24:19.992058992 CET1.1.1.1192.168.2.90x9de4No error (0)seasonmonster.s3.us-east-1.amazonaws.coms3-r-w.us-east-1.amazonaws.comCNAME (Canonical name)IN (0x0001)false
                                                                          Jan 14, 2025 08:24:19.992058992 CET1.1.1.1192.168.2.90x9de4No error (0)s3-r-w.us-east-1.amazonaws.com52.216.210.114A (IP address)IN (0x0001)false
                                                                          Jan 14, 2025 08:24:19.992058992 CET1.1.1.1192.168.2.90x9de4No error (0)s3-r-w.us-east-1.amazonaws.com54.231.135.210A (IP address)IN (0x0001)false
                                                                          Jan 14, 2025 08:24:19.992058992 CET1.1.1.1192.168.2.90x9de4No error (0)s3-r-w.us-east-1.amazonaws.com16.182.107.250A (IP address)IN (0x0001)false
                                                                          Jan 14, 2025 08:24:19.992058992 CET1.1.1.1192.168.2.90x9de4No error (0)s3-r-w.us-east-1.amazonaws.com52.216.250.8A (IP address)IN (0x0001)false
                                                                          Jan 14, 2025 08:24:19.992058992 CET1.1.1.1192.168.2.90x9de4No error (0)s3-r-w.us-east-1.amazonaws.com52.216.62.42A (IP address)IN (0x0001)false
                                                                          Jan 14, 2025 08:24:19.992058992 CET1.1.1.1192.168.2.90x9de4No error (0)s3-r-w.us-east-1.amazonaws.com52.216.78.0A (IP address)IN (0x0001)false
                                                                          Jan 14, 2025 08:24:19.992058992 CET1.1.1.1192.168.2.90x9de4No error (0)s3-r-w.us-east-1.amazonaws.com54.231.170.90A (IP address)IN (0x0001)false
                                                                          Jan 14, 2025 08:24:19.992058992 CET1.1.1.1192.168.2.90x9de4No error (0)s3-r-w.us-east-1.amazonaws.com16.15.177.238A (IP address)IN (0x0001)false

                                                                          Click to jump to process

                                                                          Click to jump to process

                                                                          Click to dive into process behavior distribution

                                                                          Click to jump to process

                                                                          Target ID:1
                                                                          Start time:02:24:11
                                                                          Start date:14/01/2025
                                                                          Path:C:\Windows\System32\7za.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:7za.exe x -y -oC:\jar "C:\Users\user\Desktop\5hsRaLKPV6.jar"
                                                                          Imagebase:0xe90000
                                                                          File size:289'792 bytes
                                                                          MD5 hash:77E556CDFDC5C592F5C46DB4127C6F4C
                                                                          Has elevated privileges:false
                                                                          Has administrator privileges:false
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_BranchlockObfuscator, Description: Yara detected Branchlock Obfuscator, Source: 00000001.00000003.1404254971.0000000002DC0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_BranchlockObfuscator, Description: Yara detected Branchlock Obfuscator, Source: 00000001.00000002.1404509529.0000000000EE5000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_BranchlockObfuscator, Description: Yara detected Branchlock Obfuscator, Source: 00000001.00000002.1404433977.0000000000DBD000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_BranchlockObfuscator, Description: Yara detected Branchlock Obfuscator, Source: 00000001.00000002.1404564718.0000000000F07000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:2
                                                                          Start time:02:24:11
                                                                          Start date:14/01/2025
                                                                          Path:C:\Windows\System32\conhost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                          Imagebase:0x7ff70f010000
                                                                          File size:862'208 bytes
                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                          Has elevated privileges:false
                                                                          Has administrator privileges:false
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:3
                                                                          Start time:02:24:12
                                                                          Start date:14/01/2025
                                                                          Path:C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:java.exe -jar "C:\Users\user\Desktop\5hsRaLKPV6.jar" bombastic
                                                                          Imagebase:0xbe0000
                                                                          File size:257'664 bytes
                                                                          MD5 hash:9DAA53BAB2ECB33DC0D9CA51552701FA
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_BranchlockObfuscator, Description: Yara detected Branchlock Obfuscator, Source: 00000003.00000003.1412901184.0000000000948000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_BranchlockObfuscator, Description: Yara detected Branchlock Obfuscator, Source: 00000003.00000002.1491550634.0000000014B3B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                          Reputation:moderate
                                                                          Has exited:true

                                                                          Target ID:4
                                                                          Start time:02:24:12
                                                                          Start date:14/01/2025
                                                                          Path:C:\Windows\System32\conhost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                          Imagebase:0x7ff70f010000
                                                                          File size:862'208 bytes
                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:5
                                                                          Start time:02:24:15
                                                                          Start date:14/01/2025
                                                                          Path:C:\Windows\SysWOW64\icacls.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
                                                                          Imagebase:0x8d0000
                                                                          File size:29'696 bytes
                                                                          MD5 hash:2E49585E4E08565F52090B144062F97E
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:6
                                                                          Start time:02:24:16
                                                                          Start date:14/01/2025
                                                                          Path:C:\Windows\System32\conhost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                          Imagebase:0x7ff70f010000
                                                                          File size:862'208 bytes
                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:7
                                                                          Start time:02:24:16
                                                                          Start date:14/01/2025
                                                                          Path:C:\Windows\SysWOW64\tasklist.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:tasklist.exe
                                                                          Imagebase:0x350000
                                                                          File size:79'360 bytes
                                                                          MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:8
                                                                          Start time:02:24:16
                                                                          Start date:14/01/2025
                                                                          Path:C:\Windows\System32\conhost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                          Imagebase:0x7ff70f010000
                                                                          File size:862'208 bytes
                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Reset < >
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1487935620.00000000023C4000.00000040.00000800.00020000.00000000.sdmp, Offset: 023C4000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_23c4000_java.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 7a54ae548c75b9de9339da8f0eea08a2462a141ac6c99107225f285d5a0f1a1e
                                                                            • Instruction ID: 72a5a1ffc5351f93f545f9a46a2879517189acbf007349e574f4893261d9d0bd
                                                                            • Opcode Fuzzy Hash: 7a54ae548c75b9de9339da8f0eea08a2462a141ac6c99107225f285d5a0f1a1e
                                                                            • Instruction Fuzzy Hash: E2D13A71A083408FC719DF28D08062ABBF2FF89714F65896EE4999B755C735E842CF81
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1487935620.0000000002322000.00000040.00000800.00020000.00000000.sdmp, Offset: 02322000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_2322000_java.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 1f25d27d5b479f18f26941c83160ea5d03d67ff476df8b191e41a0c569ee7cdd
                                                                            • Instruction ID: 5b0818eb357f63e9350cbd928dc91f4344be2dbbaa5645d956cc45abef122669
                                                                            • Opcode Fuzzy Hash: 1f25d27d5b479f18f26941c83160ea5d03d67ff476df8b191e41a0c569ee7cdd
                                                                            • Instruction Fuzzy Hash: 4EA1F1B1A04669DFDB28CF24C494BAAF7B1FF49714F08819DD81A5B382C774A849CF91
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1487935620.0000000002322000.00000040.00000800.00020000.00000000.sdmp, Offset: 02322000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_2322000_java.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 10eef2a38d22b7d1ad470fc258010e8eab47762a21a0e04e620e4ae8e229f9bb
                                                                            • Instruction ID: eab0441e3e6b32b5fd76aacc4cdc15c2a24dc7d101767e1212e7f6d3f285bdd4
                                                                            • Opcode Fuzzy Hash: 10eef2a38d22b7d1ad470fc258010e8eab47762a21a0e04e620e4ae8e229f9bb
                                                                            • Instruction Fuzzy Hash: C761CCB1600669DFDB28CF24C494BAAF7B1FF49714F18819DE81A5B381C774A849CF91
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1487935620.00000000023C4000.00000040.00000800.00020000.00000000.sdmp, Offset: 023C4000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_23c4000_java.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b4775897f13683b8721dd7fa8145fe034cbf6f2506baffb60db1a8c4f150ca49
                                                                            • Instruction ID: 24e0d4878545bf9245c5c5520b95102718057be3d7f2e5bc7b2bfab6a7771f13
                                                                            • Opcode Fuzzy Hash: b4775897f13683b8721dd7fa8145fe034cbf6f2506baffb60db1a8c4f150ca49
                                                                            • Instruction Fuzzy Hash: BD418F329047508FC7229F28D48076AFBF2FF45324F56896DD8D96B692D730E882CB91
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1487935620.00000000023C4000.00000040.00000800.00020000.00000000.sdmp, Offset: 023C4000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_23c4000_java.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c433bf6f6ae13abff2d37cf4f6bec8c99c5c3c712e329db2c354011d0cd8fd85
                                                                            • Instruction ID: 23a707c02d9975af877342d0b15466d982fd92782a90212d4c04560528c173d3
                                                                            • Opcode Fuzzy Hash: c433bf6f6ae13abff2d37cf4f6bec8c99c5c3c712e329db2c354011d0cd8fd85
                                                                            • Instruction Fuzzy Hash: C931BFB1A08749EFD715CF20E4587A9BBF0BB42308F1881ADC84897791D7346959DB82
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1487935620.0000000002320000.00000040.00000800.00020000.00000000.sdmp, Offset: 02320000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_2320000_java.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d642b47957fdf052be8e6638cce2d99a13f02a464640ca92b0a0cad82bcdbb6b
                                                                            • Instruction ID: d01c0a8967dcb454a65e7065fae313365fb0d4dfd90a282240bce3ee8034eef4
                                                                            • Opcode Fuzzy Hash: d642b47957fdf052be8e6638cce2d99a13f02a464640ca92b0a0cad82bcdbb6b
                                                                            • Instruction Fuzzy Hash: 55115BB6D0023ADFCF28CF48C4855EDB7B1FBA9314B164525DC66A7751D334A928CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1487935620.00000000023C4000.00000040.00000800.00020000.00000000.sdmp, Offset: 023C4000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_23c4000_java.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: dc7475fefce16eac26c2481ae15cfdec3447d540578ff4f6937dd86a7f52724c
                                                                            • Instruction ID: 9f97f9ed7c64b04d7f44cf11d858d3d868d02ea545b03f4488fa0ece903001be
                                                                            • Opcode Fuzzy Hash: dc7475fefce16eac26c2481ae15cfdec3447d540578ff4f6937dd86a7f52724c
                                                                            • Instruction Fuzzy Hash: 7FF027768183488BC301AB34AC41535FFB1BF03220F1857CDE8E8A72C2D322984ACF51
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1487935620.0000000002320000.00000040.00000800.00020000.00000000.sdmp, Offset: 02320000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_2320000_java.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 7a4e564fb47a9687075d9a230bc5d95f1e278810fb7c482313b1a277565ad90a
                                                                            • Instruction ID: 19802e2b41dcb71af220ace7a320a78dcaffdc74f9e120ea9fadb5a08b48bc65
                                                                            • Opcode Fuzzy Hash: 7a4e564fb47a9687075d9a230bc5d95f1e278810fb7c482313b1a277565ad90a
                                                                            • Instruction Fuzzy Hash: 6FF01576C00229DBCF18CF48C4400ADF7B1EB14218B1A8496DC2837241D332AD6ACF91
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1487935620.00000000023C4000.00000040.00000800.00020000.00000000.sdmp, Offset: 023C4000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_23c4000_java.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a1d0682de9db020b95774ce49807adfaa5cc96241df8c732df4c42ba62e9099b
                                                                            • Instruction ID: 7c86b2a1861bc1a8bfdd8c95b5dbca59fc14fd0851529c43bf6912bed767dc24
                                                                            • Opcode Fuzzy Hash: a1d0682de9db020b95774ce49807adfaa5cc96241df8c732df4c42ba62e9099b
                                                                            • Instruction Fuzzy Hash: 6AD05E758042088BC714BB28E84152AB7A5BF05324F594B8DFCDCA7281E732E8818F92
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1487935620.0000000002322000.00000040.00000800.00020000.00000000.sdmp, Offset: 02322000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_2322000_java.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4a83513acd4d4c711aaa7be9aeb9f4ebef0a71d983e10225254abaa228f8f1e3
                                                                            • Instruction ID: b884319d01bff04a0f9f0865604ad4142daeec1e7d0f6fa04bbbfbefce21afc4
                                                                            • Opcode Fuzzy Hash: 4a83513acd4d4c711aaa7be9aeb9f4ebef0a71d983e10225254abaa228f8f1e3
                                                                            • Instruction Fuzzy Hash: 89F07FB5900A16EBDB258F61C1047DAFBB4FB88718F14421AD42C67350D77874698BD0
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1487935620.0000000002322000.00000040.00000800.00020000.00000000.sdmp, Offset: 02322000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_2322000_java.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d160823c3d11f29b98b03732ce915d0251671857d96bfb5f7563c30739200965
                                                                            • Instruction ID: 466b09dc7e19a23739e642cc7b1cb12f10bffbbcb91085c9688cf221dc647a3b
                                                                            • Opcode Fuzzy Hash: d160823c3d11f29b98b03732ce915d0251671857d96bfb5f7563c30739200965
                                                                            • Instruction Fuzzy Hash: 74F09BB6A00A16EBDB29CF61C1047DAFBB4BB88718F14421AC42C67750D779B469CBC0
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1487935620.0000000002322000.00000040.00000800.00020000.00000000.sdmp, Offset: 02322000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_2322000_java.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 549f7761985e6588f0f7572da54faf6f0cb5957edcb1b3c667eb12391eb18259
                                                                            • Instruction ID: 9e62dfff83f162e89865cd7c2acc7165b3db8ec0bc2171be4be6a408bf771126
                                                                            • Opcode Fuzzy Hash: 549f7761985e6588f0f7572da54faf6f0cb5957edcb1b3c667eb12391eb18259
                                                                            • Instruction Fuzzy Hash: EBF09BBAA04A16EBDB29CF65C1447DAFBB4BB88714F14421AC52C67350D778B469CBC0
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1487935620.0000000002322000.00000040.00000800.00020000.00000000.sdmp, Offset: 02322000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_2322000_java.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 8a3d13f53f2b0caa742d36c9108561f968472d6ff24db9dd5d0857158a2004a7
                                                                            • Instruction ID: 4dd083914f62752ba202b9d2565bebef6aa9db0a1f2070d91f5ce40983c7cb3f
                                                                            • Opcode Fuzzy Hash: 8a3d13f53f2b0caa742d36c9108561f968472d6ff24db9dd5d0857158a2004a7
                                                                            • Instruction Fuzzy Hash: 3DF0CAB6D01A1AABDB248FA1C1447DAFBB5BB88714F18421AC42C63320D378B469CBD0
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1487935620.0000000002322000.00000040.00000800.00020000.00000000.sdmp, Offset: 02322000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_2322000_java.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a76748662bb31f9550c48935de1bdad6743e968d4c62d30813247cf9c14c4b91
                                                                            • Instruction ID: 2662bb8d9a09c21af103fea0cbf57c591b1c4a71826dbbc9430803b11b009818
                                                                            • Opcode Fuzzy Hash: a76748662bb31f9550c48935de1bdad6743e968d4c62d30813247cf9c14c4b91
                                                                            • Instruction Fuzzy Hash: 29F0CAB6D00A16ABDB248F61C5047DAFBB4BB88B14F14421AC42C67320D3B8B469CBC1
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1487935620.0000000002322000.00000040.00000800.00020000.00000000.sdmp, Offset: 02322000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_2322000_java.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b1476d833cb70b0ffdd6871f4ae87a27a4777411af65ac9a51711e8733d7fe4d
                                                                            • Instruction ID: 86d2e0bdbb064ea4b9abd39f92188afbeb4c75b5ccb37285dfe86908fd215e82
                                                                            • Opcode Fuzzy Hash: b1476d833cb70b0ffdd6871f4ae87a27a4777411af65ac9a51711e8733d7fe4d
                                                                            • Instruction Fuzzy Hash: DFF0CAB6D00A16ABDB248F61C1047DAFBB4BB88714F14421AC42C63720C778B469CBC0
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1487935620.0000000002322000.00000040.00000800.00020000.00000000.sdmp, Offset: 02322000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_2322000_java.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 6ef97eb8a23831b748f4aeebc88b39fb90eb38a44cdc9d27639370280eeed70c
                                                                            • Instruction ID: fc4bdffc3edfb307d12863cf84e22f47d5c8f9184f3811a368394d4144b34910
                                                                            • Opcode Fuzzy Hash: 6ef97eb8a23831b748f4aeebc88b39fb90eb38a44cdc9d27639370280eeed70c
                                                                            • Instruction Fuzzy Hash: D0F0CAB6D00A16ABDB248F61C1047DAFBB4BB88714F19421AC42C63360D378B469CBC0
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1487935620.0000000002322000.00000040.00000800.00020000.00000000.sdmp, Offset: 02322000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_2322000_java.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: da45740652e67e8114f7b57d9468ce515be3d7dc9fe73160b130df648415883f
                                                                            • Instruction ID: 6c786ebec32eb3194dfc35eaca2db6b21c2a5e0f7f042c8dfb972b007cceaf0c
                                                                            • Opcode Fuzzy Hash: da45740652e67e8114f7b57d9468ce515be3d7dc9fe73160b130df648415883f
                                                                            • Instruction Fuzzy Hash: 63F0CAB6D00A1AABDB248F61C5447DAFBB4BB88714F14421AC42C67320D378B469CBC0
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1487935620.0000000002322000.00000040.00000800.00020000.00000000.sdmp, Offset: 02322000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_2322000_java.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3e962ef3accde3f2af2b53745b16bae7fc30975e0c12fba12cc0683f1f0d3c3f
                                                                            • Instruction ID: c94f6342d88fd843a84b68c017974bf06b6cdeda442ed76b60ad5820a5b0e990
                                                                            • Opcode Fuzzy Hash: 3e962ef3accde3f2af2b53745b16bae7fc30975e0c12fba12cc0683f1f0d3c3f
                                                                            • Instruction Fuzzy Hash: A4F0C2B6D00A1AABDB248F61C1447DAFBB4BB44714F14421AC52C63320D3787469CBC0
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1487935620.00000000023C4000.00000040.00000800.00020000.00000000.sdmp, Offset: 023C4000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_23c4000_java.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 06b8af5438c7e77ab04ff9ee08e9123c48a921a9c64ace1195274b1a3355606a
                                                                            • Instruction ID: 3d4432f990fafbeaef2ab4f486b855f168ba337b7393d7e5ba4fb152152c09e4
                                                                            • Opcode Fuzzy Hash: 06b8af5438c7e77ab04ff9ee08e9123c48a921a9c64ace1195274b1a3355606a
                                                                            • Instruction Fuzzy Hash: 94516E719043218FC711DF28C48076AF7E2BF89728F298A5DE898A7355D732ED46CB91
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1487935620.00000000023C4000.00000040.00000800.00020000.00000000.sdmp, Offset: 023C4000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_23c4000_java.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 78b5e46fd764642a316965d621364c8f23013f227b3638614c770532d5f5935d
                                                                            • Instruction ID: 471126c4afd6b2d430bd43669b214624f6b10d77473b312328e823ea92f03ab5
                                                                            • Opcode Fuzzy Hash: 78b5e46fd764642a316965d621364c8f23013f227b3638614c770532d5f5935d
                                                                            • Instruction Fuzzy Hash: 0231996248E7C64FD7435B709CAA2817FB19F13224B1A04DBC4C4CF9A3E59D494ECB62
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1487935620.0000000002320000.00000040.00000800.00020000.00000000.sdmp, Offset: 02320000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_2320000_java.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a012a9fb5cf5d9e1554885d89a3030425dd9bcc3e3bcfa4e280c99466c7885fc
                                                                            • Instruction ID: d47f0f8e019ab64096cf0e39516513be9307ccc4c1aff0750bb8da1d98f024eb
                                                                            • Opcode Fuzzy Hash: a012a9fb5cf5d9e1554885d89a3030425dd9bcc3e3bcfa4e280c99466c7885fc
                                                                            • Instruction Fuzzy Hash: 0C21FCBA6042668FDB358F158C403D9B7E5FB58314F21482DDECDE7711D330AA898B51