Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Mtcn_1637256355_pdf.jar

Overview

General Information

Sample name:Mtcn_1637256355_pdf.jar
Analysis ID:1532153
MD5:44699ea6b454cd863c21fd8128e0fd0e
SHA1:34bd46468b48b25238d40f67a64ad8721f967e38
SHA256:eb51ad2218a1759fd60f956739cbb885eb2ed2422ff23659b97c2547f81cec7b
Tags:jaruser-abuse_ch
Infos:

Detection

Branchlock Obfuscator
Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Branchlock Obfuscator
AI detected suspicious sample
Exploit detected, runtime environment starts unknown processes
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to detect virtual machines (SLDT)
Contains functionality to query CPU information (cpuid)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cmd.exe (PID: 6512 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Mtcn_1637256355_pdf.jar"" >> C:\cmdlinestart.log 2>&1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
    • conhost.exe (PID: 1616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • java.exe (PID: 6484 cmdline: "C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Mtcn_1637256355_pdf.jar" MD5: 9DAA53BAB2ECB33DC0D9CA51552701FA)
      • icacls.exe (PID: 5920 cmdline: C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M MD5: 2E49585E4E08565F52090B144062F97E)
        • conhost.exe (PID: 5196 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • tasklist.exe (PID: 2800 cmdline: tasklist.exe MD5: 0A4448B31CE7F83CB7691A2657F330F1)
        • conhost.exe (PID: 3728 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Mtcn_1637256355_pdf.jarJoeSecurity_BranchlockObfuscatorYara detected Branchlock ObfuscatorJoe Security
    SourceRuleDescriptionAuthorStrings
    00000002.00000003.2113099983.0000000001078000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BranchlockObfuscatorYara detected Branchlock ObfuscatorJoe Security
      00000002.00000002.2172947650.0000000015250000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BranchlockObfuscatorYara detected Branchlock ObfuscatorJoe Security
        Process Memory Space: java.exe PID: 6484JoeSecurity_BranchlockObfuscatorYara detected Branchlock ObfuscatorJoe Security
          No Sigma rule has matched
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 92.8% probability

          Software Vulnerabilities

          barindex
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\tasklist.exe
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: soakawaypit.s3.eu-west-1.amazonaws.com
          Source: java.exe, 00000002.00000002.2171143861.000000000A1F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bugreport.sun.com/bugreport/
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
          Source: java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html
          Source: java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A4CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html0
          Source: java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl
          Source: java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A4CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl0
          Source: java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2162749884.000000000513A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl
          Source: java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A4CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
          Source: java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2162749884.000000000513A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl
          Source: java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A4CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl0
          Source: java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2162749884.000000000513A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl
          Source: java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A4CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl0
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
          Source: java.exe, 00000002.00000002.2171143861.000000000A20F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://java.oracle.com/
          Source: java.exe, 00000002.00000002.2173529549.0000000015A9A000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A40B000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2173529549.00000000158E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://null.oracle.com/
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
          Source: java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://policy.camerfirma.com
          Source: java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A4CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://policy.camerfirma.com0
          Source: java.exe, 00000002.00000002.2171143861.000000000A5DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/
          Source: java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A4CC000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2162749884.000000000504F000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A5DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/0
          Source: java.exe, 00000002.00000002.2162749884.000000000504F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/3
          Source: java.exe, 00000002.00000002.2171143861.000000000A645000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.chambersign.org
          Source: java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A4CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.chambersign.org1
          Source: java.exe, 00000002.00000002.2171143861.000000000A5DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm
          Source: java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A4CC000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2162749884.000000000504F000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A5DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
          Source: java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps
          Source: java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A4CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps0
          Source: Mtcn_1637256355_pdf.jarString found in binary or memory: https://branchlock.net
          Source: java.exe, 00000002.00000003.2113099983.0000000001078000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://branchlock.netU
          Source: java.exe, 00000002.00000002.2171143861.000000000A5DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com
          Source: java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A4CC000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2162749884.000000000504F000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A5DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
          Source: java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://repository.luxtrust.lu
          Source: java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A4CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://repository.luxtrust.lu0
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://soakawaypit.s3.eu-west-1.amazonaws.com/def.jar
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://soakawaypit.s3.eu-west-1.amazonaws.com/email.js
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://soakawaypit.s3.eu-west-1.amazonaws.com/ext.jar
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://soakawaypit.s3.eu-west-1.amazonaws.com/neft.pdf
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://soakawaypit.s3.eu-west-1.amazonaws.com/res.jar
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://soakawaypit.s3.eu-west-1.amazonaws.com/server.jar
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://soakawaypit.s3.eu-west-1.amazonaws.com/server1.jar
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://soakawaypit.s3.eu-west-1.amazonaws.com/startup.jar
          Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_02B09BF02_2_02B09BF0
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_02BA9DD02_2_02BA9DD0
          Source: classification engineClassification label: mal60.expl.evad.winJAR@10/4@1/1
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\83aa4cc77f591dfc2374580bbd95f6ba_9e146be9-c76a-4720-bcdb-53011b87bd06Jump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5196:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1616:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3728:120:WilError_03
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeFile created: C:\Users\user\AppData\Local\Temp\hsperfdata_userJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Mtcn_1637256355_pdf.jar"" >> C:\cmdlinestart.log 2>&1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\java.exe "C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Mtcn_1637256355_pdf.jar"
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
          Source: C:\Windows\SysWOW64\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist.exe
          Source: C:\Windows\SysWOW64\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\java.exe "C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Mtcn_1637256355_pdf.jar" Jump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist.exeJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: version.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\icacls.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior

          Data Obfuscation

          barindex
          Source: Yara matchFile source: Mtcn_1637256355_pdf.jar, type: SAMPLE
          Source: Yara matchFile source: 00000002.00000003.2113099983.0000000001078000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.2172947650.0000000015250000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: java.exe PID: 6484, type: MEMORYSTR
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_02AD428D push ecx; retn 0022h2_2_02AD4342
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_02ACC7C8 push cs; ret 2_2_02ACC811
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_02AD3FD3 push es; iretd 2_2_02AD3FDA
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_02AC9F11 push cs; retf 2_2_02AC9F31
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_02ACAB48 push eax; retf 2_2_02ACAB49
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_02AD399B push es; iretd 2_2_02AD399E
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_02AD3996 push es; iretd 2_2_02AD399A
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_02A2D8F7 push 00000000h; mov dword ptr [esp], esp2_2_02A2D921
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_02A2A20A push ecx; ret 2_2_02A2A21A
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_02A2A21B push ecx; ret 2_2_02A2A225
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_02A2B3B7 push 00000000h; mov dword ptr [esp], esp2_2_02A2B3DD
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_02A2BB67 push 00000000h; mov dword ptr [esp], esp2_2_02A2BB8D
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_02A2D8E0 push 00000000h; mov dword ptr [esp], esp2_2_02A2D921
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_02A2B947 push 00000000h; mov dword ptr [esp], esp2_2_02A2B96D
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_02A2C477 push 00000000h; mov dword ptr [esp], esp2_2_02A2C49D
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
          Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: PROCMON.EXE
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AUTORUNSC.EXE
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OLLYDBG.EXE
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: REGMON.EXE
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AUTORUNS.EXE
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: FIDDLER.EXE
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXE
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: FILEMON.EXE
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_02ACBE36 sldt cx2_2_02ACBE36
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: java.exe, 00000002.00000003.2114653557.000000001506F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: com/sun/corba/se/impl/util/SUNVMCID.classPK
          Source: java.exe, 00000002.00000003.2114653557.000000001506F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &com/sun/corba/se/impl/util/SUNVMCID.classPK
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware.exe
          Source: java.exe, 00000002.00000002.2162049093.000000000103B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [Ljava/lang/VirtualMachineError;
          Source: java.exe, 00000002.00000003.2114653557.000000001506F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: org/omg/CORBA/OMGVMCID.classPK
          Source: java.exe, 00000002.00000002.2162049093.000000000103B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: cjava/lang/VirtualMachineError
          Source: java.exe, 00000002.00000003.2114653557.000000001506F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: java/lang/VirtualMachineError.classPK
          Source: java.exe, 00000002.00000002.2162049093.000000000103B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_02B09BF0 LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,2_2_02B09BF0
          Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeMemory protected: page read and write | page guardJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\java.exe "C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Mtcn_1637256355_pdf.jar" Jump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist.exeJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_02A203C0 cpuid 2_2_02A203C0
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\client\jvm.dll VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Users\user\AppData\Local\Temp\hsperfdata_user\6484 VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\resources.jar VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\jce.jar VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\charsets.jar VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Users\user\AppData\Local\Temp\jartracer.jar VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: procmon.exe
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tcpview.exe
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: wireshark.exe
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: procexp.exe
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autoruns.exe
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ollydbg.exe
          Source: java.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: regmon.exe
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Windows Management Instrumentation
          1
          Services File Permissions Weakness
          11
          Process Injection
          1
          Masquerading
          OS Credential Dumping111
          Security Software Discovery
          Remote Services1
          Archive Collected Data
          12
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts1
          Exploitation for Client Execution
          1
          DLL Side-Loading
          1
          Services File Permissions Weakness
          1
          Virtualization/Sandbox Evasion
          LSASS Memory1
          Virtualization/Sandbox Evasion
          Remote Desktop ProtocolData from Removable Media1
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
          DLL Side-Loading
          1
          Disable or Modify Tools
          Security Account Manager23
          System Information Discovery
          SMB/Windows Admin SharesData from Network Shared Drive2
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
          Process Injection
          NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Obfuscated Files or Information
          LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Services File Permissions Weakness
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          DLL Side-Loading
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1532153 Sample: Mtcn_1637256355_pdf.jar Startdate: 12/10/2024 Architecture: WINDOWS Score: 60 25 soakawaypit.s3.eu-west-1.amazonaws.com 2->25 27 s3-r-w.eu-west-1.amazonaws.com 2->27 31 Yara detected Branchlock Obfuscator 2->31 33 Exploit detected, runtime environment starts unknown processes 2->33 35 AI detected suspicious sample 2->35 9 cmd.exe 2 2->9         started        signatures3 process4 process5 11 java.exe 22 9->11         started        15 conhost.exe 9->15         started        dnsIp6 29 s3-r-w.eu-west-1.amazonaws.com 52.218.60.168, 443, 49710 AMAZON-02US United States 11->29 37 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 11->37 17 tasklist.exe 1 11->17         started        19 icacls.exe 1 11->19         started        signatures7 process8 process9 21 conhost.exe 17->21         started        23 conhost.exe 19->23         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          Mtcn_1637256355_pdf.jar0%ReversingLabs
          Mtcn_1637256355_pdf.jar5%VirustotalBrowse
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          s3-r-w.eu-west-1.amazonaws.com0%VirustotalBrowse
          soakawaypit.s3.eu-west-1.amazonaws.com1%VirustotalBrowse
          SourceDetectionScannerLabelLink
          http://bugreport.sun.com/bugreport/0%URL Reputationsafe
          http://java.oracle.com/0%URL Reputationsafe
          http://repository.swisssign.com/00%URL Reputationsafe
          http://crl.securetrust.com/STCA.crl00%URL Reputationsafe
          http://www.quovadisglobal.com/cps0%URL Reputationsafe
          http://crl.securetrust.com/STCA.crl0%URL Reputationsafe
          http://www.quovadisglobal.com/cps00%URL Reputationsafe
          http://repository.swisssign.com/0%URL Reputationsafe
          http://crl.xrampsecurity.com/XGCA.crl0%VirustotalBrowse
          http://crl.chambersign.org/chambersroot.crl00%VirustotalBrowse
          http://cps.chambersign.org/cps/chambersroot.html00%VirustotalBrowse
          http://null.oracle.com/0%VirustotalBrowse
          http://policy.camerfirma.com0%VirustotalBrowse
          https://branchlock.net1%VirustotalBrowse
          https://ocsp.quovadisoffshore.com0%VirustotalBrowse
          http://repository.swisssign.com/30%VirustotalBrowse
          http://cps.chambersign.org/cps/chambersroot.html0%VirustotalBrowse
          http://crl.xrampsecurity.com/XGCA.crl00%VirustotalBrowse
          http://www.quovadis.bm0%VirustotalBrowse
          https://repository.luxtrust.lu0%VirustotalBrowse
          http://crl.chambersign.org/chambersroot.crl0%VirustotalBrowse
          http://www.chambersign.org0%VirustotalBrowse
          NameIPActiveMaliciousAntivirus DetectionReputation
          s3-r-w.eu-west-1.amazonaws.com
          52.218.60.168
          truefalseunknown
          soakawaypit.s3.eu-west-1.amazonaws.com
          unknown
          unknownfalseunknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://soakawaypit.s3.eu-west-1.amazonaws.com/server.jarjava.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpfalse
            unknown
            http://crl.xrampsecurity.com/XGCA.crljava.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2162749884.000000000513A000.00000004.00000800.00020000.00000000.sdmpfalseunknown
            http://crl.chambersign.org/chambersroot.crl0java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A4CC000.00000004.00000800.00020000.00000000.sdmpfalseunknown
            https://soakawaypit.s3.eu-west-1.amazonaws.com/res.jarjava.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpfalse
              unknown
              https://repository.luxtrust.lu0java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A4CC000.00000004.00000800.00020000.00000000.sdmpfalse
                unknown
                http://bugreport.sun.com/bugreport/java.exe, 00000002.00000002.2171143861.000000000A1F8000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://cps.chambersign.org/cps/chambersroot.html0java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A4CC000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                https://soakawaypit.s3.eu-west-1.amazonaws.com/server1.jarjava.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpfalse
                  unknown
                  https://soakawaypit.s3.eu-west-1.amazonaws.com/ext.jarjava.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpfalse
                    unknown
                    http://java.oracle.com/java.exe, 00000002.00000002.2171143861.000000000A20F000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://null.oracle.com/java.exe, 00000002.00000002.2173529549.0000000015A9A000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A40B000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2173529549.00000000158E4000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                    http://www.chambersign.org1java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A4CC000.00000004.00000800.00020000.00000000.sdmpfalse
                      unknown
                      https://soakawaypit.s3.eu-west-1.amazonaws.com/startup.jarjava.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpfalse
                        unknown
                        http://repository.swisssign.com/0java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A4CC000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2162749884.000000000504F000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A5DC000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://branchlock.netMtcn_1637256355_pdf.jarfalseunknown
                        http://policy.camerfirma.comjava.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                        http://repository.swisssign.com/3java.exe, 00000002.00000002.2162749884.000000000504F000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                        https://ocsp.quovadisoffshore.comjava.exe, 00000002.00000002.2171143861.000000000A5DC000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                        http://crl.securetrust.com/STCA.crl0java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A4CC000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.quovadisglobal.com/cpsjava.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://cps.chambersign.org/cps/chambersroot.htmljava.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                        https://branchlock.netUjava.exe, 00000002.00000003.2113099983.0000000001078000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://crl.securetrust.com/STCA.crljava.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2162749884.000000000513A000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://repository.luxtrust.lujava.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                          http://www.quovadisglobal.com/cps0java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A4CC000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://crl.xrampsecurity.com/XGCA.crl0java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A4CC000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                          https://soakawaypit.s3.eu-west-1.amazonaws.com/neft.pdfjava.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpfalse
                            unknown
                            http://www.quovadis.bmjava.exe, 00000002.00000002.2171143861.000000000A5DC000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                            http://www.quovadis.bm0java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A4CC000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2162749884.000000000504F000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A5DC000.00000004.00000800.00020000.00000000.sdmpfalse
                              unknown
                              https://ocsp.quovadisoffshore.com0java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A4CC000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2162749884.000000000504F000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A5DC000.00000004.00000800.00020000.00000000.sdmpfalse
                                unknown
                                http://crl.chambersign.org/chambersroot.crljava.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                http://repository.swisssign.com/java.exe, 00000002.00000002.2171143861.000000000A5DC000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.chambersign.orgjava.exe, 00000002.00000002.2171143861.000000000A645000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                https://soakawaypit.s3.eu-west-1.amazonaws.com/def.jarjava.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpfalse
                                  unknown
                                  http://policy.camerfirma.com0java.exe, 00000002.00000002.2171143861.000000000A514000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.2171143861.000000000A4CC000.00000004.00000800.00020000.00000000.sdmpfalse
                                    unknown
                                    https://soakawaypit.s3.eu-west-1.amazonaws.com/email.jsjava.exe, 00000002.00000002.2171143861.000000000A24F000.00000004.00000800.00020000.00000000.sdmpfalse
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      52.218.60.168
                                      s3-r-w.eu-west-1.amazonaws.comUnited States
                                      16509AMAZON-02USfalse
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1532153
                                      Start date and time:2024-10-12 16:38:13 +02:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 3m 16s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:defaultwindowsfilecookbook.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:7
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • GSI enabled (Java)
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:Mtcn_1637256355_pdf.jar
                                      Detection:MAL
                                      Classification:mal60.expl.evad.winJAR@10/4@1/1
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:
                                      • Successful, ratio: 53%
                                      • Number of executed functions: 20
                                      • Number of non-executed functions: 3
                                      Cookbook Comments:
                                      • Found application associated with file extension: .jar
                                      • Stop behavior analysis, all processes terminated
                                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, otelrules.azureedge.net
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtSetInformationFile calls found.
                                      No simulations
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      s3-r-w.eu-west-1.amazonaws.comhttp://www.ledger-secure03948.sssgva.com/Get hashmaliciousUnknownBrowse
                                      • 3.5.71.123
                                      https://smallpdf.com/sign-pdf/document#data=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.OqxYiO2DP6wYmX2t6u3X4Qa-FIZ5J__ELTV29qKimLo&eid=2461416d-babf-4309-94ac-aebdc4c2ffcc&esrt=7cfbf3c6-dbae-4056-af61-e159684e1e78Get hashmaliciousHTMLPhisherBrowse
                                      • 3.5.66.206
                                      https://smallpdf.com/sign-pdf/document#data=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJodHRwczovL2VzaWduLnNtYWxscGRmLXN0YWdpbmcuY29tIiwic3ViIjoiNjE3MmQyMzMtODcyNy00M2NhLWI1NjQtYjgwZDUyZjYxYmVjIiwiYXVkIjpbImVzaWduIl0sImV4cCI6MTcyODYzODEyMCwibmJmIjoxNzI3NDI4NTIwLCJpYXQiOjE3Mjc0Mjg1MjAsImp0aSI6IjYxNzJkMjMzLTg3MjctNDNjYS1iNTY0LWI4MGQ1MmY2MWJlYyIsInBheWxvYWQiOnsiZW52ZWxvcGVfaWQiOiI2ZWRlMzFjZS00Mzc2LTQwYzItYjJjNy1jMDc2Y2M3MjY4NjIiLCJzaWduX3JlcXVlc3RfaWQiOiI2MTcyZDIzMy04NzI3LTQzY2EtYjU2NC1iODBkNTJmNjFiZWMiLCJ0b2tlbl90eXBlIjoibm90aWZpY2F0aW9uIiwidXNlcl9lbWFpbCI6ImNoYW8ud3VAd3JpLm9yZyIsInVzZXJfZmlyc3RuYW1lIjoiY2hhby53dUB3cmkub3JnIiwidXNlcl9sYXN0bmFtZSI6ImNoYW8ud3VAd3JpLm9yZyJ9fQ.UX67GiHBKgjV8XyH-SFTt_KgB2I_q2j9cbGTSqbzRvY&eid=6ede31ce-4376-40c2-b2c7-c076cc726862&esrt=6172d233-8727-43ca-b564-b80d52f61becGet hashmaliciousUnknownBrowse
                                      • 3.5.66.42
                                      http://allegro-wosp-2023.4hosting2.4ourclient.com/Get hashmaliciousUnknownBrowse
                                      • 3.5.65.134
                                      https://f1nancier.com/?r=9d755ee7-eeac-4657-b730-d10960eca9d4&rg=euGet hashmaliciousUnknownBrowse
                                      • 3.5.69.212
                                      https://f1nancier.com/?r=9d755ee7-eeac-4657-b730-d10960eca9d4&rg=euGet hashmaliciousUnknownBrowse
                                      • 52.218.36.35
                                      Remittance-Slip.jarGet hashmaliciousBranchlock ObfuscatorBrowse
                                      • 3.5.71.206
                                      passport_Copy_pdf.jarGet hashmaliciousBranchlock ObfuscatorBrowse
                                      • 52.92.2.234
                                      http://ymc8.informz.net/z/cjUucD9taT0zOTI4MzU0JnU9NDExMjkzMTk0JmxpPTQxMDE5ODI2Jmw9aHR0cHM6Ly9iNGIwbGF0LXQzbm4xNS1jMHVyNy1iNDExMG4uczMuZXUtd2VzdC0xLmFtYXpvbmF3cy5jb20vaW5kZXguaHRtbA==/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                      • 52.92.18.162
                                      https://qrco.de.mcas-gov.ms/mysharepoint-document-invoice?McasTsid=20893&McasCSRF=fc590cd217a913ae6fe5ca1f44c85f6f9edfe2fac3a68608cef7b5feeaf0d38fGet hashmaliciousUnknownBrowse
                                      • 3.5.71.55
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      AMAZON-02USna.elfGet hashmaliciousUnknownBrowse
                                      • 54.247.62.1
                                      http://coin-have.c0mGet hashmaliciousUnknownBrowse
                                      • 34.210.170.212
                                      na.elfGet hashmaliciousUnknownBrowse
                                      • 54.171.230.55
                                      na.elfGet hashmaliciousUnknownBrowse
                                      • 34.249.145.219
                                      na.elfGet hashmaliciousUnknownBrowse
                                      • 34.249.145.219
                                      na.elfGet hashmaliciousUnknownBrowse
                                      • 34.249.145.219
                                      na.elfGet hashmaliciousUnknownBrowse
                                      • 34.254.182.186
                                      z198902873827.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                      • 185.166.143.49
                                      http://myweatherradar.org./Get hashmaliciousUnknownBrowse
                                      • 34.249.211.147
                                      http://link.adultspace.com/link/67097a59d79290df75176b77/aHR0cHM6Ly93d3cuZnVja2Jvb2tkYXRpbmcubmV0L2VuL2F1dGg_dXNlcj00MzMwMDA4NzEmY29kZT0xZDE3OTYyMTE3YWUwMzNjN2QyOWFlOTdkZWFhZjY1MyZyZWRpcmVjdFBhZ2U9JTJGYWNjb3VudCZyZWRpcmVjdFBhZ2VQYXJhbXMlNUJ1c2VyJTVEPTQzMzAwMDg3MQ==?linkId=link_9Get hashmaliciousUnknownBrowse
                                      • 3.128.228.77
                                      No context
                                      No context
                                      Process:C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):52
                                      Entropy (8bit):4.92611928532397
                                      Encrypted:false
                                      SSDEEP:3:oFj4I5vpm4US0bRsXyn:oJ5bER2yn
                                      MD5:5841566035FF98D90DE58D90347118BD
                                      SHA1:1842727524995F32902F30062CFD0495A5977BFC
                                      SHA-256:B3BE4158DD7DFFC5F471956968B6EFAA8A244658AF36337A664A979DD576CC43
                                      SHA-512:731AD6B08BC6780818057DD581E6CF4C44F635F02A09121921A9A7F372330DECEEF97B4A8A8E5306E8B5192D20E4CDA649A847C8619CC307F7EB38ED35D7459D
                                      Malicious:false
                                      Reputation:low
                                      Preview:C:\Program Files (x86)\Java\jre-1.8..1728743946582..
                                      Process:C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):65536
                                      Entropy (8bit):1.3012510522145688
                                      Encrypted:false
                                      SSDEEP:96:zH+r+w8GuIsUK6eabk3sQNELeySBYH/1jo1q:zHg8GuIsUK6E8QNEL+yH/5
                                      MD5:E224EFE5F1CAAA2E7E83CBB2E873439F
                                      SHA1:1DB58EEE07FC2CADA5940F184646CE9BEEFB61B8
                                      SHA-256:E609A46BBA92A31648B4901DF409FCA220EACF15920E37C10F614CA86A042606
                                      SHA-512:993890162D762F2B8057F893BF3EFE8138151E7CBB7EF20BBA49B5CB9EE7B47E6409266781CCE96339296C79AFC857BCE7B58A6CD7A76E327E64CBF57B7D4E5D
                                      Malicious:false
                                      Reputation:low
                                      Preview:.........9.............. .......8...........J...0...sun.rt._sync_Inflations.............8...........J...0...sun.rt._sync_Deflations.............@...........J...8...sun.rt._sync_ContendedLockAttempts..........8...........J...0...sun.rt._sync_FutileWakeups..........0...........J...(...sun.rt._sync_Parks..9.......@...........J...8...sun.rt._sync_EmptyNotifications.............8...........J...0...sun.rt._sync_Notifications..2.......8...........J...0...sun.rt._sync_SlowEnter..............8...........J...0...sun.rt._sync_SlowExit...............8...........J...0...sun.rt._sync_SlowNotify.............8...........J...0...sun.rt._sync_SlowNotifyAll..........8...........J...0...sun.rt._sync_FailedSpins............@...........J...8...sun.rt._sync_SuccessfulSpins................8...........J...0...sun.rt._sync_PrivateA...............8...........J...0...sun.rt._sync_PrivateB...............@...........J...8...sun.rt._sync_MonInCirculation...............8...........J...0...sun.rt._sync_MonScavenged...
                                      Process:C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):45
                                      Entropy (8bit):0.9111711733157262
                                      Encrypted:false
                                      SSDEEP:3:/lwlt7n:WNn
                                      MD5:C8366AE350E7019AEFC9D1E6E6A498C6
                                      SHA1:5731D8A3E6568A5F2DFBBC87E3DB9637DF280B61
                                      SHA-256:11E6ACA8E682C046C83B721EEB5C72C5EF03CB5936C60DF6F4993511DDC61238
                                      SHA-512:33C980D5A638BFC791DE291EBF4B6D263B384247AB27F261A54025108F2F85374B579A026E545F81395736DD40FA4696F2163CA17640DD47F1C42BC9971B18CD
                                      Malicious:false
                                      Reputation:high, very likely benign file
                                      Preview:........................................J2SE.
                                      Process:C:\Windows\SysWOW64\cmd.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:modified
                                      Size (bytes):3481
                                      Entropy (8bit):4.909649020414966
                                      Encrypted:false
                                      SSDEEP:48:j6Hv++fj1zQwLDZ25JOJYYN8oNRHsIaHsP6HDTZIhwv2:jMv++LPLDyJOJYu8eRHsIaHsPMDTZIhR
                                      MD5:4202AE794FADF197A277A8CB08DF32F7
                                      SHA1:197FA71CB016E772891E574D1EC9182E0189CFA9
                                      SHA-256:FB2D047756D7EB33DAA180C91588AB6B08B0A97D5D6BF8E2E6936B63B7929169
                                      SHA-512:92A6AC960B59D383E82EDFA0D0E17CA65EBF42336F78D85028D5CCE219D9C30EED2B8B00859D18B0FBDD7238DF006DA75008EADAC17D41F024340C0738AE279C
                                      Malicious:false
                                      Preview:javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target...at sun.security.ssl.Alert.createSSLException(Unknown Source)...at sun.security.ssl.TransportContext.fatal(Unknown Source)...at sun.security.ssl.TransportContext.fatal(Unknown Source)...at sun.security.ssl.TransportContext.fatal(Unknown Source)...at sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(Unknown Source)...at sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(Unknown Source)...at sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(Unknown Source)...at sun.security.ssl.SSLHandshake.consume(Unknown Source)...at sun.security.ssl.HandshakeContext.dispatch(Unknown Source)...at sun.security.ssl.HandshakeContext.dispatch(Unknown Source)...at sun.security.ssl.TransportContext.dispatch(Unknow
                                      File type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                      Entropy (8bit):4.792083140519132
                                      TrID:
                                      • Java Archive (13504/1) 62.80%
                                      • ZIP compressed archive (8000/1) 37.20%
                                      File name:Mtcn_1637256355_pdf.jar
                                      File size:151'008 bytes
                                      MD5:44699ea6b454cd863c21fd8128e0fd0e
                                      SHA1:34bd46468b48b25238d40f67a64ad8721f967e38
                                      SHA256:eb51ad2218a1759fd60f956739cbb885eb2ed2422ff23659b97c2547f81cec7b
                                      SHA512:42cf4c6e8dd0d06b21303fb786416889d489d3c2220942f986ccf657b2db667ed7734cd49c773a408ddf85a7f74d4fce34b156145eabb7752a59b63774bf815f
                                      SSDEEP:384:UDxzrbA+xjbK4MhNDeDnxtpL3/380P7TnVHmWixZ7YyWxtZItYIQUmJeZ:KxAE6fhotpLv803nVGB98ERkk
                                      TLSH:DAE38666E44B95E43D45FE73B30CCEB76AC3255C8717D90AD0B08A6248918FEAF80DC6
                                      File Content Preview:PK........0oHY................META-INF/MANIFEST.MFUT...L:.g.....M..LK-...K-*....R0.3..M...u.I,..R()./O-...t..K2......PK..AU..6...8...PK..........HY................J/g.class..=o.P......I.R....|.Z;.LJaI..:.D..0.*X....7..)../.......@,,...v.&..s-.#....s.y....
                                      Icon Hash:d08c8e8ea2868a54
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 12, 2024 16:39:09.599325895 CEST49710443192.168.2.652.218.60.168
                                      Oct 12, 2024 16:39:09.599375963 CEST4434971052.218.60.168192.168.2.6
                                      Oct 12, 2024 16:39:09.599445105 CEST49710443192.168.2.652.218.60.168
                                      Oct 12, 2024 16:39:09.847143888 CEST49710443192.168.2.652.218.60.168
                                      Oct 12, 2024 16:39:09.847162962 CEST4434971052.218.60.168192.168.2.6
                                      Oct 12, 2024 16:39:10.586201906 CEST4434971052.218.60.168192.168.2.6
                                      Oct 12, 2024 16:39:10.586313963 CEST49710443192.168.2.652.218.60.168
                                      Oct 12, 2024 16:39:10.586329937 CEST4434971052.218.60.168192.168.2.6
                                      Oct 12, 2024 16:39:10.591681004 CEST49710443192.168.2.652.218.60.168
                                      Oct 12, 2024 16:39:10.879311085 CEST49710443192.168.2.652.218.60.168
                                      Oct 12, 2024 16:39:10.879338026 CEST4434971052.218.60.168192.168.2.6
                                      Oct 12, 2024 16:39:10.988984108 CEST49710443192.168.2.652.218.60.168
                                      Oct 12, 2024 16:39:10.988996983 CEST4434971052.218.60.168192.168.2.6
                                      Oct 12, 2024 16:39:10.989803076 CEST4434971052.218.60.168192.168.2.6
                                      Oct 12, 2024 16:39:10.990418911 CEST49710443192.168.2.652.218.60.168
                                      Oct 12, 2024 16:39:10.991024017 CEST49710443192.168.2.652.218.60.168
                                      Oct 12, 2024 16:39:10.991041899 CEST4434971052.218.60.168192.168.2.6
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 12, 2024 16:39:09.581120968 CEST5016553192.168.2.61.1.1.1
                                      Oct 12, 2024 16:39:09.592999935 CEST53501651.1.1.1192.168.2.6
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Oct 12, 2024 16:39:09.581120968 CEST192.168.2.61.1.1.10x7263Standard query (0)soakawaypit.s3.eu-west-1.amazonaws.comA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Oct 12, 2024 16:39:09.592999935 CEST1.1.1.1192.168.2.60x7263No error (0)soakawaypit.s3.eu-west-1.amazonaws.coms3-r-w.eu-west-1.amazonaws.comCNAME (Canonical name)IN (0x0001)false
                                      Oct 12, 2024 16:39:09.592999935 CEST1.1.1.1192.168.2.60x7263No error (0)s3-r-w.eu-west-1.amazonaws.com52.218.60.168A (IP address)IN (0x0001)false
                                      Oct 12, 2024 16:39:09.592999935 CEST1.1.1.1192.168.2.60x7263No error (0)s3-r-w.eu-west-1.amazonaws.com3.5.66.254A (IP address)IN (0x0001)false
                                      Oct 12, 2024 16:39:09.592999935 CEST1.1.1.1192.168.2.60x7263No error (0)s3-r-w.eu-west-1.amazonaws.com52.92.2.114A (IP address)IN (0x0001)false
                                      Oct 12, 2024 16:39:09.592999935 CEST1.1.1.1192.168.2.60x7263No error (0)s3-r-w.eu-west-1.amazonaws.com52.218.1.24A (IP address)IN (0x0001)false
                                      Oct 12, 2024 16:39:09.592999935 CEST1.1.1.1192.168.2.60x7263No error (0)s3-r-w.eu-west-1.amazonaws.com52.218.106.72A (IP address)IN (0x0001)false
                                      Oct 12, 2024 16:39:09.592999935 CEST1.1.1.1192.168.2.60x7263No error (0)s3-r-w.eu-west-1.amazonaws.com52.92.0.66A (IP address)IN (0x0001)false
                                      Oct 12, 2024 16:39:09.592999935 CEST1.1.1.1192.168.2.60x7263No error (0)s3-r-w.eu-west-1.amazonaws.com52.218.106.160A (IP address)IN (0x0001)false
                                      Oct 12, 2024 16:39:09.592999935 CEST1.1.1.1192.168.2.60x7263No error (0)s3-r-w.eu-west-1.amazonaws.com52.92.35.82A (IP address)IN (0x0001)false

                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:10:39:05
                                      Start date:12/10/2024
                                      Path:C:\Windows\SysWOW64\cmd.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Mtcn_1637256355_pdf.jar"" >> C:\cmdlinestart.log 2>&1
                                      Imagebase:0x1c0000
                                      File size:236'544 bytes
                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:1
                                      Start time:10:39:05
                                      Start date:12/10/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff66e660000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:2
                                      Start time:10:39:05
                                      Start date:12/10/2024
                                      Path:C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Mtcn_1637256355_pdf.jar"
                                      Imagebase:0x7c0000
                                      File size:257'664 bytes
                                      MD5 hash:9DAA53BAB2ECB33DC0D9CA51552701FA
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_BranchlockObfuscator, Description: Yara detected Branchlock Obfuscator, Source: 00000002.00000003.2113099983.0000000001078000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_BranchlockObfuscator, Description: Yara detected Branchlock Obfuscator, Source: 00000002.00000002.2172947650.0000000015250000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:3
                                      Start time:10:39:06
                                      Start date:12/10/2024
                                      Path:C:\Windows\SysWOW64\icacls.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
                                      Imagebase:0x830000
                                      File size:29'696 bytes
                                      MD5 hash:2E49585E4E08565F52090B144062F97E
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:4
                                      Start time:10:39:06
                                      Start date:12/10/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff66e660000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:5
                                      Start time:10:39:06
                                      Start date:12/10/2024
                                      Path:C:\Windows\SysWOW64\tasklist.exe
                                      Wow64 process (32bit):true
                                      Commandline:tasklist.exe
                                      Imagebase:0xec0000
                                      File size:79'360 bytes
                                      MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:6
                                      Start time:10:39:06
                                      Start date:12/10/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff66e660000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:1.6%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:3
                                        Total number of Limit Nodes:0
                                        execution_graph 9895 2a20672 9896 2a206a5 KiUserExceptionDispatcher 9895->9896 9898 2a206d7 9896->9898
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2162366584.0000000002AC7000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC7000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_2ac7000_java.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (=$$(B$
                                        • API String ID: 0-1751454547
                                        • Opcode ID: 4d5baf8f985975635e6ad29ea590b78aa77da6356573f2038d2f162dbf65e64c
                                        • Instruction ID: 440ef1296d72c9d55f730ed3808643287ab39bd7c10bd31e3b93cd1c36567914
                                        • Opcode Fuzzy Hash: 4d5baf8f985975635e6ad29ea590b78aa77da6356573f2038d2f162dbf65e64c
                                        • Instruction Fuzzy Hash: F6822C75A057418FC716CF24C18471ABBE2FF89318F6689ADD9599F392CB35E842CB80

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 192 2a20672-2a2069f 193 2a206a5 192->193 194 2a206ac-2a206b7 192->194 193->194 195 2a206cd-2a206d5 KiUserExceptionDispatcher 194->195 196 2a206bd-2a206c0 194->196 197 2a206d7-2a206e0 195->197 198 2a206c2-2a206cb 196->198 199 2a206e6-2a206e9 197->199 200 2a2070f-2a20714 197->200 198->195 202 2a20716-2a2071a 199->202 203 2a206ef-2a206f2 199->203 204 2a206fa-2a2070e 200->204 202->204 205 2a206f8 203->205 206 2a2071c-2a20720 203->206 205->204 206->204
                                        APIs
                                        • KiUserExceptionDispatcher.NTDLL ref: 02A206D5
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2162366584.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_2a20000_java.jbxd
                                        Similarity
                                        • API ID: DispatcherExceptionUser
                                        • String ID:
                                        • API String ID: 6842923-0
                                        • Opcode ID: 797d99b91ce07dffead3ff367cfaf895e9b2a9c3710aa2d173e0a1d562508624
                                        • Instruction ID: 3c8ed6088d8065db99053feefdda3549347f4c795f0a5427fa0aed0e5eaf4766
                                        • Opcode Fuzzy Hash: 797d99b91ce07dffead3ff367cfaf895e9b2a9c3710aa2d173e0a1d562508624
                                        • Instruction Fuzzy Hash: 1F113AB6C0027ADFCB28CF5CC4855AEB7B1FFA8314B168525DC65A3341EB346924CB91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 207 2a2066f-2a20671 208 2a20673-2a2069f 207->208 209 2a206c8-2a206cb 207->209 212 2a206a5 208->212 213 2a206ac-2a206b7 208->213 210 2a206c2-2a206c6 209->210 211 2a206cd-2a206d5 KiUserExceptionDispatcher 209->211 210->209 214 2a206d7-2a206e0 211->214 212->213 213->211 215 2a206bd-2a206c0 213->215 216 2a206e6-2a206e9 214->216 217 2a2070f-2a20714 214->217 215->210 218 2a20716-2a2071a 216->218 219 2a206ef-2a206f2 216->219 220 2a206fa-2a2070e 217->220 218->220 221 2a206f8 219->221 222 2a2071c-2a20720 219->222 221->220 222->220
                                        APIs
                                        • KiUserExceptionDispatcher.NTDLL ref: 02A206D5
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2162366584.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_2a20000_java.jbxd
                                        Similarity
                                        • API ID: DispatcherExceptionUser
                                        • String ID:
                                        • API String ID: 6842923-0
                                        • Opcode ID: 88c0446a7af5de7949776c1010f0b7de4e56f325c90ad334f59947cd2f43b44b
                                        • Instruction ID: ea0d5967a485609a6db4c993afc8655234c1217c00fe24e68b330c9bae73f3ee
                                        • Opcode Fuzzy Hash: 88c0446a7af5de7949776c1010f0b7de4e56f325c90ad334f59947cd2f43b44b
                                        • Instruction Fuzzy Hash: 681136B6D0027A8BCF28CF8CC4855AEB7B1FF58218B064569EC64A3341E734A964CB81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 223 2aff890-2aff8c4 224 2aff94c-2aff957 223->224 225 2aff8ca-2aff8e4 223->225 226 2aff96d-2aff973 224->226 228 2aff95d-2aff967 224->228 225->226 227 2aff8ea-2aff8ef 225->227 232 2affb39-2affb52 226->232 233 2aff979-2aff995 226->233 229 2aff8f1-2aff8f6 227->229 230 2aff940-2aff948 227->230 228->226 231 2affb8d-2affb99 228->231 234 2aff91c-2aff935 229->234 235 2aff8f8-2aff911 229->235 230->224 231->226 236 2affb58-2affb65 232->236 237 2affc07-2affc0e 232->237 238 2aff99b-2aff99e 233->238 239 2affb13 233->239 234->231 242 2aff93b 234->242 235->231 241 2aff917 235->241 244 2affb6a-2affb72 236->244 251 2affb74-2affc4b 237->251 245 2affada-2affae9 238->245 246 2aff9a4-2aff9a9 238->246 243 2affb18-2affbf6 239->243 241->226 242->226 244->244 244->251 248 2affaef-2affaf3 245->248 249 2affb03-2affb12 245->249 252 2aff9ac-2aff9d9 call 2b01a70 246->252 248->249 253 2affaf9-2affafd 248->253 264 2affc65-2affc6a 251->264 265 2affc51-2affc55 251->265 259 2aff9df-2aff9e5 252->259 260 2affa9e-2affaad 252->260 253->249 255 2affbd6-2affbe2 253->255 255->249 262 2aff9eb-2aff9f9 259->262 263 2affa68-2affa77 259->263 267 2affac7-2affad9 260->267 268 2affab3-2affab7 260->268 270 2aff9ff-2affa07 call 2aca774 262->270 271 2affa15-2affa2b 262->271 273 2affa7d-2affa81 263->273 274 2affa91-2affa9d 263->274 277 2affc70-2affc7c 264->277 265->264 272 2affc5b-2affc5f 265->272 268->267 269 2affabd-2affac1 268->269 269->267 275 2affbc5-2affbd1 269->275 279 2affa0c-2affa0f 270->279 271->252 272->264 272->277 273->274 278 2affa87-2affa8b 273->278 275->267 277->264 278->274 280 2affbb4-2affbc0 278->280 279->271 281 2affa30-2affa3f 279->281 280->274 285 2affa59-2affa67 281->285 286 2affa45-2affa49 281->286 286->285 287 2affa4f-2affa53 286->287 287->285 288 2affba3-2affbaf 287->288 288->285
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2162366584.0000000002AC7000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC7000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_2ac7000_java.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e752ca34232d8504108c8afeef02e1cc6fe6a6298188a72ab7548d6d5b910714
                                        • Instruction ID: 9beab40df133a3da9c32834703f300448eb3069d1f74c6d92d820371732a18a9
                                        • Opcode Fuzzy Hash: e752ca34232d8504108c8afeef02e1cc6fe6a6298188a72ab7548d6d5b910714
                                        • Instruction Fuzzy Hash: 1EA15A316057048FC756DF64C5C061AB3F2FB89318F29886DEA85DBB94DB39E842CB81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 290 2a2d8f7-2a2d93b 291 2a2d9b0-2a2d9c7 290->291 292 2a2d941-2a2d9aa call 2a2d94b 290->292 294 2a2de5f-2a2de64 call 2a2de6e 291->294 295 2a2d9cd-2a2d9ed 291->295 292->291 292->295 301 2a2de69-2a2dec8 294->301 298 2a2d9f3-2a2da08 295->298 299 2a2da0b-2a2da25 295->299 298->299 302 2a2da95-2a2daa6 299->302 303 2a2da2b call 2a2da35 299->303 309 2a2dac2-2a2dacb 302->309 310 2a2daac-2a2dabe 302->310 307 2a2da30-2a2da92 303->307 307->302 312 2a2dad1-2a2db38 call 2a2dadb 309->312 313 2a2db3b-2a2db65 309->313 310->309 312->313 316 2a2db71-2a2db73 313->316 318 2a2daf6-2a2db34 316->318 319 2a2db75 316->319 321 2a2db83-2a2db8d 319->321 322 2a2db77-2a2db82 319->322 323 2a2db90-2a2dbc7 321->323 322->323 324 2a2db84-2a2dbc7 322->324 325 2a2dbda-2a2dbeb 323->325 326 2a2dbcd-2a2dbd4 323->326 324->325 324->326 327 2a2dbee-2a2dc2a 325->327 326->325 326->327 328 2a2dc30-2a2dc3b 327->328 329 2a2dc5b-2a2dc65 327->329 331 2a2dc41-2a2dc46 328->331 332 2a2dc56-2a2dc5a 328->332 333 2a2dc72-2a2dc82 329->333 334 2a2dc6b-2a2dc71 329->334 335 2a2dc54 331->335 336 2a2dc4c-2a2dc4f 331->336 332->329 337 2a2dc88-2a2dcf0 call 2a2dc92 call 2a2dcf5 333->337 338 2a2dcfc-2a2dd05 333->338 334->333 335->332 336->332 337->338 341 2a2dd0b-2a2dd13 338->341 342 2a2de28-2a2de2f 338->342 343 2a2dd19-2a2dd81 call 2a2dd23 call 2a2dd86 341->343 344 2a2dd8d-2a2dda4 341->344 346 2a2de35-2a2de4a 342->346 347 2a2de4d-2a2de5b 342->347 343->344 349 2a2de25 344->349 350 2a2ddaa-2a2ddae 344->350 346->347 347->294 349->342 350->349 354 2a2ddb4-2a2ddb8 350->354 354->349 358 2a2ddbe-2a2ddc6 call 2a2ddcb 354->358 358->349
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2162366584.0000000002A22000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A22000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_2a22000_java.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9f25c512c087025236075771d938de6719d7ccd31a1fc6d20cd97d87093f551c
                                        • Instruction ID: 0777ca7fa7a26b7c698d92a1bdad8f8457e45b3bfbc39e0564651433eede2608
                                        • Opcode Fuzzy Hash: 9f25c512c087025236075771d938de6719d7ccd31a1fc6d20cd97d87093f551c
                                        • Instruction Fuzzy Hash: 0EA18B71A05A51DFEB18CF28C5D4BAAFBB1FF49314F088199D9195B382CB74A848CF91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 364 2abf408-2abf40c 365 2abf40e-2abf422 364->365 366 2abf484-2abf486 364->366 365->366 368 2abf48c-2abf4a5 366->368 369 2abf631-2abf67e 366->369 371 2abf4ab-2abf5be 368->371 372 2abf4bc-2abf4c5 368->372 373 2abf689-2abf6b1 369->373 378 2abf5c1-2abf5cc 371->378 375 2abf4cb-2abf4ee 372->375 376 2abf4f2-2abf4f5 372->376 379 2abf6c9-2abf71b 373->379 380 2abf6b7-2abf6ba 373->380 375->376 377 2abf4f8-2abf503 376->377 377->369 381 2abf509-2abf50f 377->381 378->369 382 2abf5d2-2abf5d8 378->382 380->379 381->369 383 2abf515-2abf51d 381->383 382->369 384 2abf5de-2abf5e6 382->384 383->377 385 2abf51f-2abf55e 383->385 384->378 386 2abf5e8-2abf60b 384->386 385->369 392 2abf564-2abf583 385->392 388 2abf611-2abf616 386->388 389 2abf630 386->389 390 2abf61c-2abf61f 388->390 391 2abf625-2abf62e 388->391 389->369 390->389 390->391 391->389 391->391 393 2abf589-2abf58e 392->393 394 2abf5a8 392->394 395 2abf59d-2abf5a6 393->395 396 2abf594-2abf597 393->396 395->394 395->395 396->394 396->395
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2162366584.0000000002ABE000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ABE000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_2abe000_java.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 37041f2a314b11e49a60743d5675f64a1536585235f13d45060635e7e73eee6d
                                        • Instruction ID: 60303a258bff0a7014b60a53a04f6277b81afaa27b7be15439329133353843a9
                                        • Opcode Fuzzy Hash: 37041f2a314b11e49a60743d5675f64a1536585235f13d45060635e7e73eee6d
                                        • Instruction Fuzzy Hash: 6161C8B29006519FD3668F28C9903A5FBB4FF40318F5A426EDC5557A53DB3AA816CFC0

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 397 2a2d8e0-2a2d93b 399 2a2d9b0-2a2d9c7 397->399 400 2a2d941-2a2d9aa call 2a2d94b 397->400 402 2a2de5f-2a2dec8 call 2a2de6e 399->402 403 2a2d9cd-2a2d9ed 399->403 400->399 400->403 406 2a2d9f3-2a2da08 403->406 407 2a2da0b-2a2da25 403->407 406->407 410 2a2da95-2a2daa6 407->410 411 2a2da2b-2a2da92 call 2a2da35 407->411 417 2a2dac2-2a2dacb 410->417 418 2a2daac-2a2dabe 410->418 411->410 420 2a2dad1-2a2db38 call 2a2dadb 417->420 421 2a2db3b-2a2db65 417->421 418->417 420->421 424 2a2db71-2a2db73 421->424 426 2a2daf6-2a2db34 424->426 427 2a2db75 424->427 429 2a2db83-2a2db8d 427->429 430 2a2db77-2a2db82 427->430 431 2a2db90-2a2dbc7 429->431 430->431 432 2a2db84-2a2dbc7 430->432 433 2a2dbda-2a2dbeb 431->433 434 2a2dbcd-2a2dbd4 431->434 432->433 432->434 435 2a2dbee-2a2dc2a 433->435 434->433 434->435 436 2a2dc30-2a2dc3b 435->436 437 2a2dc5b-2a2dc65 435->437 439 2a2dc41-2a2dc46 436->439 440 2a2dc56-2a2dc5a 436->440 441 2a2dc72-2a2dc82 437->441 442 2a2dc6b-2a2dc71 437->442 443 2a2dc54 439->443 444 2a2dc4c-2a2dc4f 439->444 440->437 445 2a2dc88-2a2dcf0 call 2a2dc92 call 2a2dcf5 441->445 446 2a2dcfc-2a2dd05 441->446 442->441 443->440 444->440 445->446 449 2a2dd0b-2a2dd13 446->449 450 2a2de28-2a2de2f 446->450 451 2a2dd19-2a2dd81 call 2a2dd23 call 2a2dd86 449->451 452 2a2dd8d-2a2dda4 449->452 454 2a2de35-2a2de4a 450->454 455 2a2de4d-2a2de5b 450->455 451->452 457 2a2de25 452->457 458 2a2ddaa-2a2ddae 452->458 454->455 455->402 457->450 458->457 462 2a2ddb4-2a2ddb8 458->462 462->457 466 2a2ddbe-2a2ddc6 call 2a2ddcb 462->466 466->457
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2162366584.0000000002A22000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A22000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_2a22000_java.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8370c60dbbdf70c22342447732a4391251ec8183ce0aa1c8601a3089e6256517
                                        • Instruction ID: b9eafe8f2b06e3fa3c845754e81de41fd7878914d2d394b33cddb81ad2c517de
                                        • Opcode Fuzzy Hash: 8370c60dbbdf70c22342447732a4391251ec8183ce0aa1c8601a3089e6256517
                                        • Instruction Fuzzy Hash: 6D61CC71604A11DFEB18CF28C5D4BAAF7B1FB48718F04819CD9095B382CB74A848CB90

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 472 2a5b88f-2a5b8a7 473 2a5b8b2-2a5b8da 472->473 474 2a5b957-2a5b9c3 473->474 475 2a5b8e0-2a5b954 473->475 475->474
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2162366584.0000000002A5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A5A000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_2a5a000_java.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4a9289bd73349a1919e5dc7b71ae69cec4811113b5b0bea99d61955d21f3991f
                                        • Instruction ID: 9b686ee022a04fb3ab8613101791f494936a2d15a72a20eebb3b2014c214fc3e
                                        • Opcode Fuzzy Hash: 4a9289bd73349a1919e5dc7b71ae69cec4811113b5b0bea99d61955d21f3991f
                                        • Instruction Fuzzy Hash: 2531A1B6949B806FE3134B20A6723D5BFF1BF57324F060196C89C8B753E33956298B91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 476 2b86127-2b86141 477 2b8614b-2b86159 476->477 478 2b86147 476->478 479 2b8615e-2b86166 477->479 478->477 480 2b8617b-2b86184 479->480 481 2b86167-2b86178 479->481 482 2b86193-2b86195 480->482 481->480 482->479 484 2b86197-2b861bc 482->484 485 2b861cf-2b861db 484->485 486 2b861c2-2b861c9 484->486 487 2b861de-2b861f2 485->487 486->485 486->487 489 2b861f8-2b861ff 487->489 490 2b8624c-2b86257 487->490 491 2b8621a-2b86242 489->491 492 2b86205-2b86217 489->492 490->489 493 2b86248-2b8624b 491->493 494 2b86259-2b8625d 491->494 492->491
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2162366584.0000000002AC7000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC7000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_2ac7000_java.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6170d7eee24cddbfd813eafa491c100ea5d80120cf663ee0501067de05f3fb7b
                                        • Instruction ID: efa750929dd177a5a91f21deb2bf1bbea3af999c516d62ab286a98ad45e6d8a9
                                        • Opcode Fuzzy Hash: 6170d7eee24cddbfd813eafa491c100ea5d80120cf663ee0501067de05f3fb7b
                                        • Instruction Fuzzy Hash: 15318BB0909786AFE725EF20C4087B9FBB4FF42308F0581ADC84857382D7346999CB92

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 497 2abf631-2abf67e 498 2abf689-2abf6b1 497->498 499 2abf6c9-2abf71b 498->499 500 2abf6b7-2abf6ba 498->500 500->499
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2162366584.0000000002ABE000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ABE000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_2abe000_java.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 62413eb8966013a054b5b82b0006a1d01c6d9ffdf7d24e1b9b2e795f654a740f
                                        • Instruction ID: 4cbfa74bdb61d5ee2afb95551baa72f0a0aff25030ecb4c3cec146100969096e
                                        • Opcode Fuzzy Hash: 62413eb8966013a054b5b82b0006a1d01c6d9ffdf7d24e1b9b2e795f654a740f
                                        • Instruction Fuzzy Hash: B12160765087919BE351CF2098803C6FBA2FBC0369F99062EEC9923116CB3B5459C7C2

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 510 2a34ccd-2a34ce9 511 2a34cf4-2a34d38 510->511
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2162366584.0000000002A22000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A22000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_2a22000_java.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e9b4bd9a32cfb00575ad81376ca5e20b0db1f3141f4de2e6767968d8717b2ef3
                                        • Instruction ID: b36e3d565d13ac77bd63992ae4d65ead580b322a00d1af550d5a10267200dc70
                                        • Opcode Fuzzy Hash: e9b4bd9a32cfb00575ad81376ca5e20b0db1f3141f4de2e6767968d8717b2ef3
                                        • Instruction Fuzzy Hash: 93F0DFB5900A06EBEB25CF64C004BEAF7B4FB88704F04420AD82C53310C7787429CBD0

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 512 2a34b78-2a34b93 513 2a34b9e-2a34be2 512->513
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2162366584.0000000002A22000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A22000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_2a22000_java.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8a4c1139768bc4f87c66d8edb726e240dbca067728504f529730131ef21c4e98
                                        • Instruction ID: 9b19b73dcff9bc1a441e996cc68391e48bb9641757645c51213269d7cfe96e0e
                                        • Opcode Fuzzy Hash: 8a4c1139768bc4f87c66d8edb726e240dbca067728504f529730131ef21c4e98
                                        • Instruction Fuzzy Hash: 3EF07FB6900A16EBDB258F65C0447DAFBB4BB88718F14421AD82C57350D77874698BC0

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 514 2a2ec1c-2a2ec36 515 2a2ec41-2a2ec85 514->515
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2162366584.0000000002A22000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A22000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_2a22000_java.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 00196549652a4af62a4b5b08b9aebb2c34b418c9bf0404c14d0084046acd6cfd
                                        • Instruction ID: df0b8c9e48bccfed1656a7dbe96890e76ed766965e0af9b2249ec8b30d5519f7
                                        • Opcode Fuzzy Hash: 00196549652a4af62a4b5b08b9aebb2c34b418c9bf0404c14d0084046acd6cfd
                                        • Instruction Fuzzy Hash: 94F092B5900A16EBDB25CF65C0447DAFBB4BB88714F14421AC42C67750D778B469CBC0

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 518 2a2da35-2a2da4f 519 2a2da5a-2a2da8e 518->519
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2162366584.0000000002A22000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A22000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_2a22000_java.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1fd2b1ad2a2bc4ed61f2fe41bd04fb1effe0e684402fc1b0fc1ff521539ac69e
                                        • Instruction ID: 6bcabf72e6229b894a30a376d6564cc4dbfa7c052d4e9fa285140cd27ec2c903
                                        • Opcode Fuzzy Hash: 1fd2b1ad2a2bc4ed61f2fe41bd04fb1effe0e684402fc1b0fc1ff521539ac69e
                                        • Instruction Fuzzy Hash: D0F0C2B6D00A16ABDB248F65C4447DAFBB4BB44714F14461AC82C67310D7787469CBC0
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2162366584.0000000002A22000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A22000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_2a22000_java.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 39f4b72d770764672fd25ca4c18ea24eef121ab2c3f36a1f1beb2253054f1cd3
                                        • Instruction ID: 74fc3f442b81138aa28cb059b81c4e163414cf8cf4e31e2a7ca4f3270d0b1548
                                        • Opcode Fuzzy Hash: 39f4b72d770764672fd25ca4c18ea24eef121ab2c3f36a1f1beb2253054f1cd3
                                        • Instruction Fuzzy Hash: CEF0C2B6D00A16ABDB248F65C0447CAFBB4BB48714F14421AC42C67310D778B469CBC0
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2162366584.0000000002A22000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A22000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_2a22000_java.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 591d206b3abdbfd00e63b0ea67309dfbca4ab12974d9c77d298d8d2026d3efad
                                        • Instruction ID: ee20284e65166a25bcf71f49292bdc6c5aa064aa66ce5201c51dc3981ee90ef2
                                        • Opcode Fuzzy Hash: 591d206b3abdbfd00e63b0ea67309dfbca4ab12974d9c77d298d8d2026d3efad
                                        • Instruction Fuzzy Hash: 5FF0CAB6D00A16ABDB248F61C0447CAFBB4BB88714F14421AC82C63720DBB8B469CBD0

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 516 2a2b407-2a2b421 517 2a2b42c-2a2b460 516->517
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2162366584.0000000002A22000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A22000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_2a22000_java.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: be5f41e157946c754b856ecaa2a7cd5a14f993c10b38c7c7b2999547f1ee3166
                                        • Instruction ID: 781f8db245a9aed3d2aee9fa665488d31c70f9d05c1c87718fd74010cd038769
                                        • Opcode Fuzzy Hash: be5f41e157946c754b856ecaa2a7cd5a14f993c10b38c7c7b2999547f1ee3166
                                        • Instruction Fuzzy Hash: 3CF0C2B6D00A16ABDB248F65C0447CAFBB4BB44714F15421AC42C63350D7787469CBC0
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2162366584.0000000002A22000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A22000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_2a22000_java.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: eff8a0711e91ad3cbb615ee8762067f1ee4d114f9a27b677a94eb09d25b18f43
                                        • Instruction ID: decbe3f701e3a1b68a2e4867510afe0f3b40e44aeb904e5c2d3dc1d8f17fc137
                                        • Opcode Fuzzy Hash: eff8a0711e91ad3cbb615ee8762067f1ee4d114f9a27b677a94eb09d25b18f43
                                        • Instruction Fuzzy Hash: E1F0C2B6D00A16ABDB248F65C0447CAFBB4BB44714F14461AC82C67310D7787469CBC0
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2162366584.0000000002A22000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A22000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_2a22000_java.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 09095eaf7c2f557b82ddb7220bd3523aff6a5fa2165d4a0c524492914e3877a0
                                        • Instruction ID: 10220dcd4f8e7e6ae3ba9bb5200e561e922ccf945216ea59bd19dfa6683569f7
                                        • Opcode Fuzzy Hash: 09095eaf7c2f557b82ddb7220bd3523aff6a5fa2165d4a0c524492914e3877a0
                                        • Instruction Fuzzy Hash: 20F0C2B6D00A16ABDB248FA5C0447CAFBB4BB44714F14461AC92C63310D7B87469CBC0
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2162366584.0000000002A22000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A22000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_2a22000_java.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 90c9306eb77e4858559877b955631d2959aff1f58ef50a3b5ba5c472a3f1f999
                                        • Instruction ID: 480e44a2ffe9088820b167f4f722a14958e90353c83ad95fd9f50a852b8fe046
                                        • Opcode Fuzzy Hash: 90c9306eb77e4858559877b955631d2959aff1f58ef50a3b5ba5c472a3f1f999
                                        • Instruction Fuzzy Hash: 22F0C2B5D00A16ABDB24CF61C10438AF7B0BB44B14F14421AC82C63310D778B465CBC0
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2162366584.0000000002AC7000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC7000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_2ac7000_java.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d15431ab66ce2c6020d10faf28e4b88d38a1cfcd6ff56ef114373cd187d0bd61
                                        • Instruction ID: b4a0a208b7f03516d9c2ffdecd95c3cde95cd6756c16166eabe020c646680f9f
                                        • Opcode Fuzzy Hash: d15431ab66ce2c6020d10faf28e4b88d38a1cfcd6ff56ef114373cd187d0bd61
                                        • Instruction Fuzzy Hash: 7AE1FB75A097409FC354DF14C194619BBB2FB89314F66D9ADE8495F3A2CB36E842CF80
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2162366584.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_2a20000_java.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a012a9fb5cf5d9e1554885d89a3030425dd9bcc3e3bcfa4e280c99466c7885fc
                                        • Instruction ID: 1c79ae4963c29b812d3a2046a668b5ce1cda49d0d2ca9b873f3bbabdd07ad411
                                        • Opcode Fuzzy Hash: a012a9fb5cf5d9e1554885d89a3030425dd9bcc3e3bcfa4e280c99466c7885fc
                                        • Instruction Fuzzy Hash: 7A21F9BA5042668FDB358F198C403D9B7E5FB58314F21882EDECDE7710D7306A898B51
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2162366584.0000000002AC7000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC7000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_2ac7000_java.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9648e87a7b50ac75c21ce1a2cf0c962df324a7c6b7e70e3b7563904a9a40dc16
                                        • Instruction ID: 1599a2af3fb643b0ff2d5e21bc48ba12825caf1f87a71e773f4e57220c95b09e
                                        • Opcode Fuzzy Hash: 9648e87a7b50ac75c21ce1a2cf0c962df324a7c6b7e70e3b7563904a9a40dc16
                                        • Instruction Fuzzy Hash: 69F01CA240D7D08FE703872098A66D17F70DF1372474A85CBC0C0CE1A7D55A450FC722