Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Fattura.jar

Overview

General Information

Sample name:Fattura.jar
Analysis ID:1546104
MD5:990b962cd76803618551ae3f9106c259
SHA1:5d0cdb63d854c2c21ff022dedf684a7265d15250
SHA256:11c6b880f061119b388eb5a94e3d25fec328baf95cf9822c0ee5f3ed723ab624
Tags:jarSPAM-ITAuser-JAMESWT_MHT
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to detect virtual machines (SLDT)
Contains functionality to query CPU information (cpuid)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cmd.exe (PID: 7400 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Fattura.jar"" >> C:\cmdlinestart.log 2>&1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
    • conhost.exe (PID: 7408 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • java.exe (PID: 7456 cmdline: "C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Fattura.jar" MD5: 9DAA53BAB2ECB33DC0D9CA51552701FA)
      • icacls.exe (PID: 7504 cmdline: C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M MD5: 2E49585E4E08565F52090B144062F97E)
        • conhost.exe (PID: 7512 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Fattura.jarAvira: detected
Source: Fattura.jarReversingLabs: Detection: 29%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 89.2% probability
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 4x nop then cmp eax, dword ptr [ecx+04h]2_2_028C8298
Source: global trafficTCP traffic: 192.168.2.9:49707 -> 3.124.154.255:27788
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: 8.tcp.eu.ngrok.io
Source: java.exe, 00000002.00000002.1420950532.0000000009FEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bugreport.sun.com/bugreport/
Source: java.exe, 00000002.00000002.1420950532.000000000A0E8000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1420950532.000000000A0FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt
Source: java.exe, 00000002.00000002.1441715537.00000000157E5000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000002.1420950532.000000000A0FD000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1420950532.000000000A03C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: java.exe, 00000002.00000002.1420950532.000000000A0E8000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1420950532.000000000A0FD000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1420950532.000000000A03C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt
Source: java.exe, 00000002.00000002.1420950532.000000000A0FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: java.exe, 00000002.00000002.1420950532.000000000A0E8000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1420950532.000000000A0FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt
Source: java.exe, 00000002.00000002.1420950532.000000000A0FD000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1420950532.000000000A03C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: java.exe, 00000002.00000002.1420950532.000000000A0E8000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1420950532.000000000A0FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl
Source: java.exe, 00000002.00000002.1441715537.00000000157E5000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000002.1420950532.000000000A0FD000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1420950532.000000000A03C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: java.exe, 00000002.00000002.1420950532.000000000A0E8000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1420950532.000000000A0FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl
Source: java.exe, 00000002.00000002.1420950532.000000000A0FD000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1420950532.000000000A03C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: java.exe, 00000002.00000002.1420950532.000000000A0E8000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1420950532.000000000A0FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl
Source: java.exe, 00000002.00000002.1441715537.00000000157E5000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000002.1420950532.000000000A0FD000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1420950532.000000000A03C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: java.exe, 00000002.00000002.1420950532.0000000009F50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://java.oracle.com/
Source: java.exe, 00000002.00000002.1420950532.000000000A0FD000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1441498590.0000000015270000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000002.1441715537.000000001582A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://null.oracle.com/
Source: java.exe, 00000002.00000002.1420950532.000000000A0FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com
Source: java.exe, 00000002.00000002.1420950532.000000000A0E8000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1420950532.000000000A0FD000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1420950532.000000000A03C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
Source: java.exe, 00000002.00000002.1420950532.000000000A0E8000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1441715537.00000000157E5000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000002.1420950532.000000000A0FD000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1420950532.000000000A03C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
Source: java.exe, 00000002.00000002.1420950532.000000000A0E8000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1420950532.000000000A0FD000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1420950532.000000000A03C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_028D1AAB2_2_028D1AAB
Source: classification engineClassification label: mal60.winJAR@7/3@1/1
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7512:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7408:120:WilError_03
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeFile created: C:\Users\user\AppData\Local\Temp\hsperfdata_userJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Fattura.jarReversingLabs: Detection: 29%
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Fattura.jar"" >> C:\cmdlinestart.log 2>&1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\java.exe "C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Fattura.jar"
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
Source: C:\Windows\SysWOW64\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\java.exe "C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Fattura.jar" Jump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: winmm.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: version.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: wldp.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: profapi.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\SysWOW64\icacls.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0282D8F7 push 00000000h; mov dword ptr [esp], esp2_2_0282D921
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0282A20A push ecx; ret 2_2_0282A21A
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0282A21B push ecx; ret 2_2_0282A225
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0282B3B7 push 00000000h; mov dword ptr [esp], esp2_2_0282B3DD
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0282BB67 push 00000000h; mov dword ptr [esp], esp2_2_0282BB8D
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0282D8E0 push 00000000h; mov dword ptr [esp], esp2_2_0282D921
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0282B947 push 00000000h; mov dword ptr [esp], esp2_2_0282B96D
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_0282C477 push 00000000h; mov dword ptr [esp], esp2_2_0282C49D
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_028CC34B push cs; ret 2_2_028CC351
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_028CB976 sldt cx2_2_028CB976
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: java.exe, 00000002.00000003.1390573898.0000000014E62000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: com/sun/corba/se/impl/util/SUNVMCID.classPK
Source: java.exe, 00000002.00000003.1390573898.0000000014E62000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &com/sun/corba/se/impl/util/SUNVMCID.classPK
Source: java.exe, 00000002.00000002.1420440849.0000000000F8B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [Ljava/lang/VirtualMachineError;
Source: java.exe, 00000002.00000003.1390573898.0000000014E62000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: org/omg/CORBA/OMGVMCID.classPK
Source: java.exe, 00000002.00000002.1420440849.0000000000F8B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: cjava/lang/VirtualMachineError
Source: java.exe, 00000002.00000003.1390573898.0000000014E62000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: java/lang/VirtualMachineError.classPK
Source: java.exe, 00000002.00000002.1420440849.0000000000F8B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_02820672 LdrInitializeThunk,2_2_02820672
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeMemory protected: page read and write | page guardJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Java\jre-1.8\bin\java.exe "C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Fattura.jar" Jump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeCode function: 2_2_028203C0 cpuid 2_2_028203C0
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\client\jvm.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\bin\java.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Users\user\AppData\Local\Temp\hsperfdata_user\7456 VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\resources.jar VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\rt.jar VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Program Files (x86)\Java\jre-1.8\lib\jce.jar VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre-1.8\bin\java.exeQueries volume information: C:\Users\user\AppData\Local\Temp\jartracer.jar VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Services File Permissions Weakness
11
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
Services File Permissions Weakness
1
Disable or Modify Tools
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
11
Process Injection
Security Account Manager21
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Services File Permissions Weakness
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1546104 Sample: Fattura.jar Startdate: 31/10/2024 Architecture: WINDOWS Score: 60 20 8.tcp.eu.ngrok.io 2->20 24 Antivirus / Scanner detection for submitted sample 2->24 26 Multi AV Scanner detection for submitted file 2->26 28 AI detected suspicious sample 2->28 9 cmd.exe 2 2->9         started        signatures3 process4 process5 11 java.exe 9 9->11         started        14 conhost.exe 9->14         started        dnsIp6 22 8.tcp.eu.ngrok.io 3.124.154.255, 27788, 49707 AMAZON-02US United States 11->22 16 icacls.exe 1 11->16         started        process7 process8 18 conhost.exe 16->18         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Fattura.jar30%ReversingLabsByteCode-JAVA.Trojan.Ratty
Fattura.jar100%AviraJAVA/Ratty.qybug
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://java.oracle.com/0%URL Reputationsafe
http://null.oracle.com/0%URL Reputationsafe
http://bugreport.sun.com/bugreport/0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
8.tcp.eu.ngrok.io
3.124.154.255
truefalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://java.oracle.com/java.exe, 00000002.00000002.1420950532.0000000009F50000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://null.oracle.com/java.exe, 00000002.00000002.1420950532.000000000A0FD000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.1441498590.0000000015270000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000002.1441715537.000000001582A000.00000004.00000020.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://bugreport.sun.com/bugreport/java.exe, 00000002.00000002.1420950532.0000000009FEA000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    3.124.154.255
    8.tcp.eu.ngrok.ioUnited States
    16509AMAZON-02USfalse
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1546104
    Start date and time:2024-10-31 14:08:23 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 3m 2s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:defaultwindowsfilecookbook.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:5
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • GSI enabled (Java)
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:Fattura.jar
    Detection:MAL
    Classification:mal60.winJAR@7/3@1/1
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 74%
    • Number of executed functions: 14
    • Number of non-executed functions: 4
    Cookbook Comments:
    • Found application associated with file extension: .jar
    • Stop behavior analysis, all processes terminated
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtSetInformationFile calls found.
    • VT rate limit hit for: Fattura.jar
    No simulations
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    8.tcp.eu.ngrok.iojPWRwWFD.exeGet hashmaliciousDarkCometBrowse
    • 52.59.102.101
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    AMAZON-02USfile.exeGet hashmaliciousCredential FlusherBrowse
    • 18.238.243.129
    file.exeGet hashmaliciousStealc, VidarBrowse
    • 18.244.18.27
    https://www.chambersschool.org/programs/early-childhoodGet hashmaliciousCAPTCHA Scam ClickFixBrowse
    • 18.239.18.109
    https://pub.lucidpress.com/50f1c535-8058-4eec-b469-2bd69fae4557/Get hashmaliciousUnknownBrowse
    • 18.238.243.8
    8FebOORbmE.vbsGet hashmaliciousUnknownBrowse
    • 185.166.143.50
    http://3d1.gmobb.jp/dcm299ccyag4e/gov/Get hashmaliciousPhisherBrowse
    • 3.161.82.89
    https://alaskan.s3.eu-north-1.amazonaws.com/muna.html?login=abc@everbridge.com&pcnt=3&no_redrct=no_redrct&request_type=cancel_requestGet hashmaliciousUnknownBrowse
    • 3.5.216.85
    tyo2831qq.arm7.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 54.171.230.55
    tyo2831qq.m68k.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 54.171.230.55
    HT9324-25 1x40HC LDHFCLDEHAM29656 MRSU5087674.exeGet hashmaliciousFormBookBrowse
    • 76.223.67.189
    No context
    No context
    Process:C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
    File Type:ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):52
    Entropy (8bit):4.820162073702298
    Encrypted:false
    SSDEEP:3:oFj4I5vpm4USQRWdov:oJ5bQRWqv
    MD5:F914FD4568F1A80CC074AB6850345933
    SHA1:2991626B4A4F4EF9DDEC0B3C5346A3D288D4B961
    SHA-256:B5572A68F471BE6C6CBB6FF66B6186E2CAFE9A52794D932360F5022A23F9F7B6
    SHA-512:310B80B1F3D990954197948C1B89EE225FC3B435044685A9FC54D8093750E302D54CF4D0FCDD3C670C6B5DC9A5880AA0A4FFE25FE9133809F3DEE71C081E4FF0
    Malicious:false
    Reputation:low
    Preview:C:\Program Files (x86)\Java\jre-1.8..1730380164438..
    Process:C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
    File Type:data
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):1.3018501731598986
    Encrypted:false
    SSDEEP:96:n/NrsYC8GeKyrM+3DGvNwZn1fXNoSJYJ2HrP1eVox3E:n/xC8GeKyrM+3D3ftJ42HrPAVk
    MD5:3A45084CA12B8AA1DB106150012D3024
    SHA1:C5894CE8FA1ECF38A5113E409F6A0E709E711367
    SHA-256:657BD37B0D5D383805191442908CD6B6F193FC5CE20FE4115A5911A156F53484
    SHA-512:446089AD59EC8E6964CC683B9C917B59F7E69F263A4F388916BB4BABAA1DEA483EB3B1CFDCA10C5C0FB01A39D84CC4A15139610BE858EA821256050247E5CBEC
    Malicious:false
    Reputation:low
    Preview:........x9............. .......8...........J...0...sun.rt._sync_Inflations.............8...........J...0...sun.rt._sync_Deflations.............@...........J...8...sun.rt._sync_ContendedLockAttempts..........8...........J...0...sun.rt._sync_FutileWakeups..........0...........J...(...sun.rt._sync_Parks..+.......@...........J...8...sun.rt._sync_EmptyNotifications.............8...........J...0...sun.rt._sync_Notifications..'.......8...........J...0...sun.rt._sync_SlowEnter..............8...........J...0...sun.rt._sync_SlowExit...............8...........J...0...sun.rt._sync_SlowNotify.............8...........J...0...sun.rt._sync_SlowNotifyAll..........8...........J...0...sun.rt._sync_FailedSpins............@...........J...8...sun.rt._sync_SuccessfulSpins................8...........J...0...sun.rt._sync_PrivateA...............8...........J...0...sun.rt._sync_PrivateB...............@...........J...8...sun.rt._sync_MonInCirculation...............8...........J...0...sun.rt._sync_MonScavenged...
    Process:C:\Windows\SysWOW64\cmd.exe
    File Type:ASCII text, with CRLF line terminators, with escape sequences
    Category:dropped
    Size (bytes):290
    Entropy (8bit):5.098322815435791
    Encrypted:false
    SSDEEP:6:qcSDzh3wy/6NaDzhTIGwo0twvmL0pFnI6cWO9mNEavmL0Ey:n+Ay/6kT7NK086cWO9maa0Ly
    MD5:EAE34E342D2543125B992BFF09C9F5B2
    SHA1:9C7D8D887D3ED132659CEF0BF593CBB4F62BE337
    SHA-256:7B3A9EBE690E6810BC90B1A7CBAD61AB36CF66C0D1E813A124DEE1683E8DA5DA
    SHA-512:D20ACB8C90842D46AFFCBE5FABB6EFF93A52FECE637CB4C3678E1517FEE2898DD748C46113BFEABB2A604DEF481968799240AB484F1D20A4960A28670C707769
    Malicious:false
    Reputation:low
    Preview:[09:09:25] [INFO] > .[32m46 packets registered.[0m..[09:09:25] [INFO] > .[32mConnected.[0m..Exception in thread "Main" java.lang.OutOfMemoryError: Java heap space...at IIllIlI.lIlIIlIlIl.IIlIlIlIIl.lIllIlIIlI.IlIIllIlIlIIllIIl.run(Unknown Source)...at java.lang.Thread.run(Unknown Source)..
    File type:Zip archive data, at least v2.0 to extract, compression method=deflate
    Entropy (8bit):7.94285870501923
    TrID:
    • Java Archive (13504/1) 62.80%
    • ZIP compressed archive (8000/1) 37.20%
    File name:Fattura.jar
    File size:727'399 bytes
    MD5:990b962cd76803618551ae3f9106c259
    SHA1:5d0cdb63d854c2c21ff022dedf684a7265d15250
    SHA256:11c6b880f061119b388eb5a94e3d25fec328baf95cf9822c0ee5f3ed723ab624
    SHA512:611b41ba7f6bf54ebf864d8396d4ed5e388febda63068e052f2b38cb275900f46330a1cc851c0e1b96f963acf170a785d4e58c07ce3771ad33b34f53ad9640a9
    SSDEEP:12288:/EKkNGLtanqurvx+qAEN+p5YUdl1Y6FpAox678M3WbUj6ft/6D7Evgqe:/yytgxSy+9l1JFpAyc8FlVC/Cgqe
    TLSH:BDF401E2BD90967CFB03B7740E026C17BA4C19B79DD7D92A09BB1502C935D0D1BCEA86
    File Content Preview:PK..........GY............C...IIllIlI/lIlIIlIlIl/IIlIlIlIIl/lIllIlIIlI/lIlIlllIIlIIlllIIllI.class.Xy|UE..>.....I........ `D.... {.........I@6.D........)q@.K@P.s..G.G.u.qtt.FG...y_.{o..3..?..r..>.]]]U]]]}.....D.[.....0.)....G.~Dr.%......"..=^F.].....,t....
    Icon Hash:d08c8e8ea2868a54
    TimestampSource PortDest PortSource IPDest IP
    Oct 31, 2024 14:09:26.977613926 CET4970727788192.168.2.93.124.154.255
    Oct 31, 2024 14:09:26.982418060 CET27788497073.124.154.255192.168.2.9
    Oct 31, 2024 14:09:26.982490063 CET4970727788192.168.2.93.124.154.255
    Oct 31, 2024 14:09:27.699049950 CET27788497073.124.154.255192.168.2.9
    Oct 31, 2024 14:09:27.748500109 CET4970727788192.168.2.93.124.154.255
    Oct 31, 2024 14:09:27.819449902 CET27788497073.124.154.255192.168.2.9
    Oct 31, 2024 14:09:27.819511890 CET4970727788192.168.2.93.124.154.255
    Oct 31, 2024 14:09:30.118074894 CET4970727788192.168.2.93.124.154.255
    TimestampSource PortDest PortSource IPDest IP
    Oct 31, 2024 14:09:26.950459957 CET5455653192.168.2.91.1.1.1
    Oct 31, 2024 14:09:26.958437920 CET53545561.1.1.1192.168.2.9
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Oct 31, 2024 14:09:26.950459957 CET192.168.2.91.1.1.10x7d63Standard query (0)8.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Oct 31, 2024 14:09:26.958437920 CET1.1.1.1192.168.2.90x7d63No error (0)8.tcp.eu.ngrok.io3.124.154.255A (IP address)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:09:09:23
    Start date:31/10/2024
    Path:C:\Windows\SysWOW64\cmd.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Fattura.jar"" >> C:\cmdlinestart.log 2>&1
    Imagebase:0xc50000
    File size:236'544 bytes
    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:1
    Start time:09:09:23
    Start date:31/10/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff70f010000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:2
    Start time:09:09:23
    Start date:31/10/2024
    Path:C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
    Wow64 process (32bit):true
    Commandline:"C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Fattura.jar"
    Imagebase:0x8a0000
    File size:257'664 bytes
    MD5 hash:9DAA53BAB2ECB33DC0D9CA51552701FA
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:true

    Target ID:3
    Start time:09:09:24
    Start date:31/10/2024
    Path:C:\Windows\SysWOW64\icacls.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
    Imagebase:0x550000
    File size:29'696 bytes
    MD5 hash:2E49585E4E08565F52090B144062F97E
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:4
    Start time:09:09:24
    Start date:31/10/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff70f010000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:1.8%
      Dynamic/Decrypted Code Coverage:100%
      Signature Coverage:23.1%
      Total number of Nodes:13
      Total number of Limit Nodes:2
      execution_graph 6986 2820672 6989 28206a5 LdrInitializeThunk 6986->6989 6988 28206d7 6989->6988 6990 28cafdf 6991 28cafe4 6990->6991 6993 2916f90 6991->6993 6994 2917117 6993->6994 6997 2916fa8 6993->6997 6994->6991 6998 2913410 6997->6998 6999 29134f9 6998->6999 7001 2913426 6998->7001 7000 29134a2 7000->6991 7001->7000 7002 291348a LdrInitializeThunk 7001->7002 7002->7000

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 26 2820672-282069f 27 28206a5 26->27 28 28206ac-28206b7 26->28 27->28 29 28206cd-28206d5 LdrInitializeThunk 28->29 30 28206bd-28206c0 28->30 31 28206d7-28206e0 29->31 32 28206c2-28206cb 30->32 33 28206e6-28206e9 31->33 34 282070f-2820714 31->34 32->29 37 2820716-282071a 33->37 38 28206ef-28206f2 33->38 36 28206fa-282070e 34->36 37->36 39 28206f8 38->39 40 282071c-2820720 38->40 39->36 40->36
      APIs
      Memory Dump Source
      • Source File: 00000002.00000002.1420567292.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_2820000_java.jbxd
      Similarity
      • API ID: InitializeThunk
      • String ID:
      • API String ID: 2994545307-0
      • Opcode ID: 54da4658b3ad3c01adbfd9853d5168531acb341509a8e39819385af7cfeb2a2c
      • Instruction ID: 9fb94c57a0975e67002976ca1ac53b788245eeeeac37e0f647e0aca03780c738
      • Opcode Fuzzy Hash: 54da4658b3ad3c01adbfd9853d5168531acb341509a8e39819385af7cfeb2a2c
      • Instruction Fuzzy Hash: 6B113ABA80023A9FCB24CF48C9855ADF7B1FBA9314F154525DC69E3342D33569A4CB91

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 0 2913410-2913420 1 2913426-2913432 0->1 2 29134f9 0->2 4 29134d5 1->4 5 2913438-291343a 1->5 3 2913500-291358c 2->3 9 29134d8-291356c 4->9 7 2913440-291344e 5->7 8 29134ad 5->8 10 2913454-2913456 7->10 11 2913526-2913538 7->11 12 29134b0-291354c 8->12 10->11 14 291345c-291345e 10->14 20 29134a2-29134ac 11->20 14->11 18 2913464-291346a 14->18 18->11 21 2913470-2913476 18->21 21->11 23 291347c-291347e 21->23 23->11 24 2913484 23->24 24->20 25 291348a-291349d LdrInitializeThunk 24->25 25->20
      APIs
      • LdrInitializeThunk.NTDLL(?,?,?,?,?,?,?,?,?,?,?,?,?,029170FC), ref: 0291349D
      Memory Dump Source
      • Source File: 00000002.00000002.1420567292.00000000028C4000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C4000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_28c4000_java.jbxd
      Similarity
      • API ID: InitializeThunk
      • String ID:
      • API String ID: 2994545307-0
      • Opcode ID: 60fc81130652bc0ba25a1e14cac4480c7796aee0ea8b8db017e2e189c3142368
      • Instruction ID: 0c276b4f3a8b39b5ef22883a483c2c69f63bff72d6969cf849be4f0aed72ecc1
      • Opcode Fuzzy Hash: 60fc81130652bc0ba25a1e14cac4480c7796aee0ea8b8db017e2e189c3142368
      • Instruction Fuzzy Hash: 8C11B675908219CFC3019F5BC480229B7B6BB84B18F5589DDDC9C67214DB31EC83CB5A

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 41 282066f-2820671 42 2820673-282069f 41->42 43 28206c8-28206cb 41->43 46 28206a5 42->46 47 28206ac-28206b7 42->47 44 28206c2-28206c6 43->44 45 28206cd-28206d5 LdrInitializeThunk 43->45 44->43 48 28206d7-28206e0 45->48 46->47 47->45 49 28206bd-28206c0 47->49 50 28206e6-28206e9 48->50 51 282070f-2820714 48->51 49->44 53 2820716-282071a 50->53 54 28206ef-28206f2 50->54 52 28206fa-282070e 51->52 53->52 55 28206f8 54->55 56 282071c-2820720 54->56 55->52 56->52
      APIs
      Memory Dump Source
      • Source File: 00000002.00000002.1420567292.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_2820000_java.jbxd
      Similarity
      • API ID: InitializeThunk
      • String ID:
      • API String ID: 2994545307-0
      • Opcode ID: f57c3e208173a36fc5f3b4e5481c3d8e251e36d3187e2ec1d63a7aa98cbd1836
      • Instruction ID: e32e28a0c04dbcd4e24e2a7e31e346a98a376bd2896bcb6753b4d5aaea42bdec
      • Opcode Fuzzy Hash: f57c3e208173a36fc5f3b4e5481c3d8e251e36d3187e2ec1d63a7aa98cbd1836
      • Instruction Fuzzy Hash: 47113A7A90023A9FCF24CF88C9855AEB7B1FB59214F054555DC68A3342D334A9A4CB81

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 123 282d8f7-282d93b 124 282d9b0-282d9c7 123->124 125 282d941-282d9aa call 282d94b 123->125 127 282de5f-282de64 call 282de6e 124->127 128 282d9cd-282d9ed 124->128 125->124 125->128 136 282de69-282dec8 127->136 131 282d9f3-282da08 128->131 132 282da0b-282da25 128->132 131->132 133 282da95-282daa6 132->133 134 282da2b call 282da35 132->134 143 282dac2-282dacb 133->143 144 282daac-282dabe 133->144 140 282da30-282da92 134->140 140->133 145 282dad1-282db38 call 282dadb 143->145 146 282db3b-282db65 143->146 144->143 145->146 148 282db71-282db73 146->148 150 282daf6-282db34 148->150 151 282db75 148->151 153 282db83-282db8d 151->153 154 282db77-282db82 151->154 156 282db90-282dbc7 153->156 154->156 157 282db84-282dbc7 154->157 158 282dbda-282dbeb 156->158 159 282dbcd-282dbd4 156->159 157->158 157->159 160 282dbee-282dc2a 158->160 159->158 159->160 162 282dc30-282dc3b 160->162 163 282dc5b-282dc65 160->163 164 282dc41-282dc46 162->164 165 282dc56-282dc5a 162->165 166 282dc72-282dc82 163->166 167 282dc6b-282dc71 163->167 170 282dc54 164->170 171 282dc4c-282dc4f 164->171 165->163 168 282dc88-282dcf0 call 282dc92 call 282dcf5 166->168 169 282dcfc-282dd05 166->169 167->166 168->169 174 282dd0b-282dd13 169->174 175 282de28-282de2f 169->175 170->165 171->165 179 282dd19-282dd81 call 282dd23 call 282dd86 174->179 180 282dd8d-282dda4 174->180 177 282de35-282de4a 175->177 178 282de4d-282de5b 175->178 177->178 178->127 179->180 183 282de25 180->183 184 282ddaa-282ddae 180->184 183->175 184->183 189 282ddb4-282ddb8 184->189 189->183 192 282ddbe-282ddc6 call 282ddcb 189->192 192->183
      Memory Dump Source
      • Source File: 00000002.00000002.1420567292.0000000002822000.00000040.00000800.00020000.00000000.sdmp, Offset: 02822000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_2822000_java.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 847df526df375062a16eb512f7ead06828eff71ec1aa9feba30dbf749384b283
      • Instruction ID: 18c7e25d83b984ef21968936b792e4daf85e2f32f55970c7c303349aeef77758
      • Opcode Fuzzy Hash: 847df526df375062a16eb512f7ead06828eff71ec1aa9feba30dbf749384b283
      • Instruction Fuzzy Hash: 5EA1AF7DA04615DFEB18CF24C494BA9FBB1FF49314F04819DD91A9B381C774A889CB91

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 197 282d8e0-282d93b 199 282d9b0-282d9c7 197->199 200 282d941-282d9aa call 282d94b 197->200 202 282de5f-282dec8 call 282de6e 199->202 203 282d9cd-282d9ed 199->203 200->199 200->203 206 282d9f3-282da08 203->206 207 282da0b-282da25 203->207 206->207 208 282da95-282daa6 207->208 209 282da2b-282da92 call 282da35 207->209 218 282dac2-282dacb 208->218 219 282daac-282dabe 208->219 209->208 220 282dad1-282db38 call 282dadb 218->220 221 282db3b-282db65 218->221 219->218 220->221 223 282db71-282db73 221->223 225 282daf6-282db34 223->225 226 282db75 223->226 228 282db83-282db8d 226->228 229 282db77-282db82 226->229 231 282db90-282dbc7 228->231 229->231 232 282db84-282dbc7 229->232 233 282dbda-282dbeb 231->233 234 282dbcd-282dbd4 231->234 232->233 232->234 235 282dbee-282dc2a 233->235 234->233 234->235 237 282dc30-282dc3b 235->237 238 282dc5b-282dc65 235->238 239 282dc41-282dc46 237->239 240 282dc56-282dc5a 237->240 241 282dc72-282dc82 238->241 242 282dc6b-282dc71 238->242 245 282dc54 239->245 246 282dc4c-282dc4f 239->246 240->238 243 282dc88-282dcf0 call 282dc92 call 282dcf5 241->243 244 282dcfc-282dd05 241->244 242->241 243->244 249 282dd0b-282dd13 244->249 250 282de28-282de2f 244->250 245->240 246->240 254 282dd19-282dd81 call 282dd23 call 282dd86 249->254 255 282dd8d-282dda4 249->255 252 282de35-282de4a 250->252 253 282de4d-282de5b 250->253 252->253 253->202 254->255 258 282de25 255->258 259 282ddaa-282ddae 255->259 258->250 259->258 264 282ddb4-282ddb8 259->264 264->258 267 282ddbe-282ddc6 call 282ddcb 264->267 267->258
      Memory Dump Source
      • Source File: 00000002.00000002.1420567292.0000000002822000.00000040.00000800.00020000.00000000.sdmp, Offset: 02822000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_2822000_java.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 10d4f258096d96115911cdc999de9268c73b2f17daa433bc50c516e456549a10
      • Instruction ID: e886f31b9cc8f27e914492f6b0bc7593259375bbf12a66aeeaeeb7b3e93be9f8
      • Opcode Fuzzy Hash: 10d4f258096d96115911cdc999de9268c73b2f17daa433bc50c516e456549a10
      • Instruction Fuzzy Hash: 2B61DC7D604611EFEB18CF24C494BA6FBB1FB49714F04819DD81A9B381C774A889CB91

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 306 2834ccd-2834ce9 307 2834cf4-2834d38 306->307
      Memory Dump Source
      • Source File: 00000002.00000002.1420567292.0000000002822000.00000040.00000800.00020000.00000000.sdmp, Offset: 02822000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_2822000_java.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 555be403ce0212c008b51a343c06a32da0d88ecea4d4fdff030a3baa2bd863b2
      • Instruction ID: 91b66eb0cdeb6f352754a91f2ab4a0ece1fc9f4d75be8b035d527728f2f95e1d
      • Opcode Fuzzy Hash: 555be403ce0212c008b51a343c06a32da0d88ecea4d4fdff030a3baa2bd863b2
      • Instruction Fuzzy Hash: 0BF0BCB9900A16EBEB258F20C0047EAF7B4BB88704F05420AD42C57210C7787469CBD0

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 308 2834b78-2834b93 309 2834b9e-2834be2 308->309
      Memory Dump Source
      • Source File: 00000002.00000002.1420567292.0000000002822000.00000040.00000800.00020000.00000000.sdmp, Offset: 02822000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_2822000_java.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 578874aabe50f44f71424bff61c34278cf38181a4747bfbaf5876af1ad71ac59
      • Instruction ID: 7352522c79d01d665b0fba07d562e58b513013a6e59a7e886601db928c102e0d
      • Opcode Fuzzy Hash: 578874aabe50f44f71424bff61c34278cf38181a4747bfbaf5876af1ad71ac59
      • Instruction Fuzzy Hash: 34F07FB6A04B16EBDB258F61C0047DAFBB4BB88714F15421AD52C97350D77874658BC0

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 310 282ec1c-282ec36 311 282ec41-282ec85 310->311
      Memory Dump Source
      • Source File: 00000002.00000002.1420567292.0000000002822000.00000040.00000800.00020000.00000000.sdmp, Offset: 02822000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_2822000_java.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 1e80358f9d59603e3fd5d4bc14e73b9d5344d76eb4943ee44cdb409662374232
      • Instruction ID: 9f117583be1bccaaa09009f9d0ced30211b53dde35ff594a702c3b8e82842bdc
      • Opcode Fuzzy Hash: 1e80358f9d59603e3fd5d4bc14e73b9d5344d76eb4943ee44cdb409662374232
      • Instruction Fuzzy Hash: 31F092B5904B16EBDB25CF61C0047DAFBB4BB88714F15421AC52C67350D778B469CBC0

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 312 282da35-282da4f 313 282da5a-282da8e 312->313
      Memory Dump Source
      • Source File: 00000002.00000002.1420567292.0000000002822000.00000040.00000800.00020000.00000000.sdmp, Offset: 02822000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_2822000_java.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 5c7aac147467b5b32bab1d686464e3d6c033d1b675a4c4f5ee41af03d24f344f
      • Instruction ID: 3fa7a7d844efd2814d8186d4e4b996674e2d4c76ca2064edde30191e13f0690a
      • Opcode Fuzzy Hash: 5c7aac147467b5b32bab1d686464e3d6c033d1b675a4c4f5ee41af03d24f344f
      • Instruction Fuzzy Hash: C2F0C2B6D00A16ABDB248F61C0047DAFBB4BB44714F15461AC52C67310D3787465CBC0
      Memory Dump Source
      • Source File: 00000002.00000002.1420567292.0000000002822000.00000040.00000800.00020000.00000000.sdmp, Offset: 02822000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_2822000_java.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 9f1af2a2541a6fd1b1a778c46fbd819568ad922bd5a4e2b653c9dfcf62dbaedd
      • Instruction ID: 2e0eb9be1f023f2479e565cc4bbce6f89a4bed9a27e05cb5bcd9f73f67250744
      • Opcode Fuzzy Hash: 9f1af2a2541a6fd1b1a778c46fbd819568ad922bd5a4e2b653c9dfcf62dbaedd
      • Instruction Fuzzy Hash: 76F0C2B6D00A16ABDB248F61C0047CAFBB4BB48714F15421AC52CA7310D3787465CBC0

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 314 282de6e-282de88 315 282de93-282dec7 314->315
      Memory Dump Source
      • Source File: 00000002.00000002.1420567292.0000000002822000.00000040.00000800.00020000.00000000.sdmp, Offset: 02822000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_2822000_java.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 284ea3f7c51093ef0e4547274edf306e130dda4693a9c840020c4c59c7d1e88d
      • Instruction ID: 479acf1a7abea49f5ad979a683c0107d81fb3912c58f2b06a174a711be6359bb
      • Opcode Fuzzy Hash: 284ea3f7c51093ef0e4547274edf306e130dda4693a9c840020c4c59c7d1e88d
      • Instruction Fuzzy Hash: 56F0C2B6D00A16ABDB248F61C0047CAFBB4BB44714F15421AC52C67310C7787465CBC0

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 316 2833c76-2833c90 317 2833c9b-2833ccf 316->317
      Memory Dump Source
      • Source File: 00000002.00000002.1420567292.0000000002822000.00000040.00000800.00020000.00000000.sdmp, Offset: 02822000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_2822000_java.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 539b9b834de3a6d41593baf63b63917cb2ce2a6ea14e297ac7388e45af7f6477
      • Instruction ID: 1d939b9454f70009f7d7ec3ad8c39db201d75c1ab682ace6626220a238300a98
      • Opcode Fuzzy Hash: 539b9b834de3a6d41593baf63b63917cb2ce2a6ea14e297ac7388e45af7f6477
      • Instruction Fuzzy Hash: FAF0C2B6D00A16ABDB248F61C0047CAFBB4BB44714F15421AC52CA7310D3787465CBC0

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 318 28345e9-2834603 319 283460e-2834642 318->319
      Memory Dump Source
      • Source File: 00000002.00000002.1420567292.0000000002822000.00000040.00000800.00020000.00000000.sdmp, Offset: 02822000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_2822000_java.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 946bd9bac30d90f819ad7969824e9f26d1b84b4fc23cb49af5d13814b3fae0c4
      • Instruction ID: 84c8fe3b94530220b0ed1f8cd9c76250910d0d97c903d28aba89b7f354a9844c
      • Opcode Fuzzy Hash: 946bd9bac30d90f819ad7969824e9f26d1b84b4fc23cb49af5d13814b3fae0c4
      • Instruction Fuzzy Hash: 7FF0C2B6D00A16ABDB248F65C0047CAFBB4BB44714F15421AC52C67310D3787465CBC0
      Memory Dump Source
      • Source File: 00000002.00000002.1420567292.0000000002822000.00000040.00000800.00020000.00000000.sdmp, Offset: 02822000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_2822000_java.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 673e7fc119f13154c20db2981eb02c21471f16a2389549fcf84bec81844bd2b9
      • Instruction ID: 73ad24906694d51638fcf5b236a7c35932af429177647834b92a81e4d6d50c93
      • Opcode Fuzzy Hash: 673e7fc119f13154c20db2981eb02c21471f16a2389549fcf84bec81844bd2b9
      • Instruction Fuzzy Hash: A5F052B5D00A16ABDB24CF61C10479AFBB4BB44B18F15421AC52C67350D778B465CBC1
      Memory Dump Source
      • Source File: 00000002.00000002.1420567292.00000000028C4000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C4000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_28c4000_java.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 2689869daa602d5ad0718389ef85bb3df6e9d96faa8ebf9980ad70747edbee59
      • Instruction ID: ed7b520b3298e5d97937496447896bace483ff38a775220b00f79ef85a57f9ef
      • Opcode Fuzzy Hash: 2689869daa602d5ad0718389ef85bb3df6e9d96faa8ebf9980ad70747edbee59
      • Instruction Fuzzy Hash: 29B1607DA042048FD715CF28C09876AB7E2BF84314F598A6DE88DDB395D774E885CB82
      Memory Dump Source
      • Source File: 00000002.00000002.1420567292.00000000028C4000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C4000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_28c4000_java.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: a4812d1a548df2e914c3bcb2353192ebd55e9b7bd56612144348c8630a85de3f
      • Instruction ID: f0600e1e7a4dacbda345b0fbde33e9ad956a46e9e731406f131a243f94d25a48
      • Opcode Fuzzy Hash: a4812d1a548df2e914c3bcb2353192ebd55e9b7bd56612144348c8630a85de3f
      • Instruction Fuzzy Hash: A251097D9446048FC7269B24C45077EB7A3AF81324FA9DA6DE48AE7781D334D881CB42
      Memory Dump Source
      • Source File: 00000002.00000002.1420567292.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_2820000_java.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: a012a9fb5cf5d9e1554885d89a3030425dd9bcc3e3bcfa4e280c99466c7885fc
      • Instruction ID: 3bc73eeca08429a7a13aa04db3a61725345579204224626f1fb9d78506f9f80a
      • Opcode Fuzzy Hash: a012a9fb5cf5d9e1554885d89a3030425dd9bcc3e3bcfa4e280c99466c7885fc
      • Instruction Fuzzy Hash: 3921F9BA5042668FDB358F198C403D9B7E5FB58314F21882EDECDE7710D3306A898B51
      Memory Dump Source
      • Source File: 00000002.00000002.1420567292.00000000028C4000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C4000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_28c4000_java.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 9648e87a7b50ac75c21ce1a2cf0c962df324a7c6b7e70e3b7563904a9a40dc16
      • Instruction ID: 073c46037bddec306370ea4d4dbbf960db10cfa7452a5062bc9c50ded017b6e0
      • Opcode Fuzzy Hash: 9648e87a7b50ac75c21ce1a2cf0c962df324a7c6b7e70e3b7563904a9a40dc16
      • Instruction Fuzzy Hash: 82F098A640D7D08FE707872498A66917F70DF1372475A85CBC484CE1A7D669454FC722