IOC Report
Fattura.jar

loading gif

Files

File Path
Type
Category
Malicious
Fattura.jar
Zip archive data, at least v2.0 to extract, compression method=deflate
initial sample
malicious
C:\ProgramData\Oracle\Java\.oracle_jre_usage\b5820291038aa69c.timestamp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\hsperfdata_user\7456
data
dropped
C:\cmdlinestart.log
ASCII text, with CRLF line terminators, with escape sequences
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Fattura.jar"" >> C:\cmdlinestart.log 2>&1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
"C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Fattura.jar"
C:\Windows\SysWOW64\icacls.exe
C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://java.oracle.com/
unknown
http://null.oracle.com/
unknown
http://bugreport.sun.com/bugreport/
unknown

Domains

Name
IP
Malicious
8.tcp.eu.ngrok.io
3.124.154.255

IPs

IP
Domain
Country
Malicious
3.124.154.255
8.tcp.eu.ngrok.io
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
4DD9000
trusted library allocation
page read and write
4B80000
trusted library allocation
page read and write
A0E8000
trusted library allocation
page read and write
4A64000
trusted library allocation
page read and write
16640000
heap
page read and write
4AD8000
trusted library allocation
page read and write
4A67000
trusted library allocation
page read and write
15DE0000
heap
page read and write
4B17000
trusted library allocation
page read and write
9FE000
stack
page read and write
4A60000
trusted library allocation
page read and write
4CC5000
trusted library allocation
page read and write
162CE000
unkown
page read and write
14E62000
heap
page read and write
4DA0000
trusted library allocation
page read and write
1623E000
unkown
page read and write
EA0000
trusted library allocation
page read and write
4A29000
trusted library allocation
page read and write
4D9B000
trusted library allocation
page read and write
150E4000
heap
page read and write
4A53000
trusted library allocation
page read and write
15B10000
trusted library allocation
page read and write
87C000
stack
page read and write
9FFF000
trusted library allocation
page read and write
F80000
heap
page read and write
4DE6000
trusted library allocation
page read and write
157E5000
heap
page read and write
4AA7000
trusted library allocation
page read and write
15E2D000
stack
page read and write
15E30000
heap
page read and write
286B000
trusted library allocation
page execute and read and write
4DAB000
trusted library allocation
page read and write
D70000
heap
page read and write
4AC9000
trusted library allocation
page read and write
4ACF000
trusted library allocation
page read and write
4A70000
trusted library allocation
page read and write
4A59000
trusted library allocation
page read and write
4DDE000
trusted library allocation
page read and write
DF5000
heap
page read and write
4AE7000
trusted library allocation
page read and write
1524B000
heap
page read and write
155D0000
heap
page read and write
15E40000
heap
page read and write
4B36000
trusted library allocation
page read and write
E70000
heap
page read and write
2D18000
heap
page read and write
2820000
trusted library allocation
page execute and read and write
4A0F000
trusted library allocation
page read and write
4DA9000
trusted library allocation
page read and write
A33E000
trusted library allocation
page read and write
15392000
heap
page read and write
4DD7000
trusted library allocation
page read and write
150F2000
heap
page read and write
F8B000
heap
page read and write
1593C000
heap
page read and write
4B6B000
trusted library allocation
page read and write
4ADD000
trusted library allocation
page read and write
2C7D000
stack
page read and write
9BE000
stack
page read and write
1671A000
heap
page read and write
16600000
trusted library allocation
page read and write
14A00000
trusted library allocation
page read and write
4A22000
trusted library allocation
page read and write
4F28000
trusted library allocation
page read and write
160CD000
stack
page read and write
4CE1000
trusted library allocation
page read and write
4B26000
trusted library allocation
page read and write
2E80000
heap
page read and write
E90000
unkown
page read and write
4CDE000
trusted library allocation
page read and write
4AE5000
trusted library allocation
page read and write
4B73000
trusted library allocation
page read and write
4A69000
trusted library allocation
page read and write
4A4F000
trusted library allocation
page read and write
153F3000
heap
page read and write
4B84000
trusted library allocation
page read and write
4ABA000
trusted library allocation
page read and write
4D99000
trusted library allocation
page read and write
4B12000
trusted library allocation
page read and write
4A55000
trusted library allocation
page read and write
153D2000
heap
page read and write
154AD000
unkown
page read and write
4A24000
trusted library allocation
page read and write
301F000
stack
page read and write
14EEE000
unkown
page read and write
1521E000
unkown
page read and write
15104000
heap
page read and write
4DE4000
trusted library allocation
page read and write
4AB3000
trusted library allocation
page read and write
155D1000
heap
page read and write
4A34000
trusted library allocation
page read and write
92C000
stack
page read and write
4A2B000
trusted library allocation
page read and write
4A1C000
trusted library allocation
page read and write
2CE0000
heap
page read and write
A0FD000
trusted library allocation
page read and write
156D7000
heap
page read and write
4B7E000
trusted library allocation
page read and write
4AF6000
trusted library allocation
page read and write
285A000
trusted library allocation
page execute and read and write
1553E000
unkown
page read and write
A03C000
trusted library allocation
page read and write
4F35000
trusted library allocation
page read and write
4CC7000
trusted library allocation
page read and write
4A6C000
trusted library allocation
page read and write
1560F000
heap
page read and write
4B15000
trusted library allocation
page read and write
4ACB000
trusted library allocation
page read and write
4AB5000
trusted library allocation
page read and write
2E4E000
stack
page read and write
4A31000
trusted library allocation
page read and write
2D10000
heap
page read and write
4B47000
trusted library allocation
page read and write
4A09000
trusted library allocation
page read and write
1611E000
unkown
page read and write
4A0C000
trusted library allocation
page read and write
2C3D000
stack
page read and write
157DC000
heap
page read and write
4A48000
trusted library allocation
page read and write
4A5C000
trusted library allocation
page read and write
2822000
trusted library allocation
page execute and read and write
A0AE000
trusted library allocation
page read and write
4A37000
trusted library allocation
page read and write
4B66000
trusted library allocation
page read and write
15C9E000
unkown
page read and write
4A02000
trusted library allocation
page read and write
4ECF000
trusted library allocation
page read and write
4A3A000
trusted library allocation
page read and write
4A00000
trusted library allocation
page read and write
4EC4000
trusted library allocation
page read and write
499D000
stack
page read and write
4CC0000
trusted library allocation
page read and write
153D7000
heap
page read and write
4B3A000
trusted library allocation
page read and write
2FDE000
stack
page read and write
9FEA000
trusted library allocation
page read and write
28B7000
trusted library allocation
page execute and read and write
151CD000
stack
page read and write
4B9D000
trusted library allocation
page read and write
9F50000
trusted library allocation
page read and write
970000
heap
page read and write
153CD000
heap
page read and write
4CD7000
trusted library allocation
page read and write
4AB7000
trusted library allocation
page read and write
4A3F000
trusted library allocation
page read and write
4ABF000
trusted library allocation
page read and write
4CCD000
trusted library allocation
page read and write
103A000
heap
page read and write
4B23000
trusted library allocation
page read and write
4CCA000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
161ED000
stack
page read and write
4A17000
trusted library allocation
page read and write
4F4C000
trusted library allocation
page read and write
15270000
heap
page read and write
4AD5000
trusted library allocation
page read and write
166BF000
heap
page read and write
9FD8000
trusted library allocation
page read and write
150FC000
heap
page read and write
1627D000
stack
page read and write
4ADF000
trusted library allocation
page read and write
2CF0000
heap
page read and write
4B3D000
trusted library allocation
page read and write
2F9E000
stack
page read and write
4A5E000
trusted library allocation
page read and write
4A43000
trusted library allocation
page read and write
4DB3000
trusted library allocation
page read and write
2862000
trusted library allocation
page execute and read and write
4DA3000
trusted library allocation
page read and write
9FE6000
trusted library allocation
page read and write
1582A000
heap
page read and write
4A04000
trusted library allocation
page read and write
4B70000
trusted library allocation
page read and write
1615D000
stack
page read and write
4C22000
trusted library allocation
page read and write
15040000
heap
page read and write
F9A000
heap
page read and write
4A1E000
trusted library allocation
page read and write
4B42000
trusted library allocation
page read and write
DF0000
heap
page read and write
4A46000
trusted library allocation
page read and write
A001000
trusted library allocation
page read and write
15309000
heap
page read and write
14E9D000
stack
page read and write
D1E000
stack
page read and write
2D29000
heap
page read and write
F30000
heap
page read and write
4A2E000
trusted library allocation
page read and write
4A6E000
trusted library allocation
page read and write
28C4000
trusted library allocation
page execute and read and write
49EE000
unkown
page read and write
4B68000
trusted library allocation
page read and write
4B33000
trusted library allocation
page read and write
15E44000
heap
page read and write
4B40000
trusted library allocation
page read and write
F37000
heap
page read and write
4DAD000
trusted library allocation
page read and write
4A27000
trusted library allocation
page read and write
4B77000
trusted library allocation
page read and write
4F21000
trusted library allocation
page read and write
4AD1000
trusted library allocation
page read and write
4DEC000
trusted library allocation
page read and write
4B6E000
trusted library allocation
page read and write
15C4D000
stack
page read and write
15F40000
trusted library allocation
page read and write
4B64000
trusted library allocation
page read and write
2873000
trusted library allocation
page execute and read and write
A338000
trusted library allocation
page read and write
28BD000
trusted library allocation
page execute and read and write
4BD9000
trusted library allocation
page read and write
4CC3000
trusted library allocation
page read and write
4A14000
trusted library allocation
page read and write
4AF4000
trusted library allocation
page read and write
16089000
unkown
page read and write
16440000
trusted library allocation
page read and write
4A07000
trusted library allocation
page read and write
4ABD000
trusted library allocation
page read and write
4F2D000
trusted library allocation
page read and write
4D9E000
trusted library allocation
page read and write
4A3D000
trusted library allocation
page read and write
4B7A000
trusted library allocation
page read and write
4A4D000
trusted library allocation
page read and write
4EBB000
trusted library allocation
page read and write
4CD9000
trusted library allocation
page read and write
4B08000
trusted library allocation
page read and write
15220000
heap
page read and write
161AE000
unkown
page read and write
1545D000
stack
page read and write
4A19000
trusted library allocation
page read and write
4B38000
trusted library allocation
page read and write
4A4B000
trusted library allocation
page read and write
4DDC000
trusted library allocation
page read and write
165F0000
trusted library allocation
page read and write
154ED000
stack
page read and write
4A74000
trusted library allocation
page read and write
D6E000
stack
page read and write
30D0000
heap
page read and write
4B7C000
trusted library allocation
page read and write
4B4A000
trusted library allocation
page read and write
4DA6000
trusted library allocation
page read and write
4CDB000
trusted library allocation
page read and write
4AC5000
trusted library allocation
page read and write
48B0000
trusted library allocation
page read and write
16540000
trusted library allocation
page read and write
There are 234 hidden memdumps, click here to show them.