File name:

UziClicker.zip

Full analysis: https://app.any.run/tasks/7c347191-52cd-4c9d-a4f3-32903ebdd0bc
Verdict: Malicious activity
Analysis date: November 06, 2023, 18:52:44
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

3D81B041743D352A513DCE0530DB3F16

SHA1:

9B8116E2211C76AFCE9F4A6BC31057897EADB874

SHA256:

030469BA7CF25957784E2E1D66DE2BF39961704BA8B6B6B60E5E7B8F96905C6B

SSDEEP:

98304:JZrLYoh3O6ubNfdDSESmTUSOT5T7H+enXLRacGtYzKv0L/+G8valMqRO/b3zTtYQ:iJ2xNPJ9AuX4L5MCDreqlD9mw

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • javaw.exe (PID: 3860)
      • javaw.exe (PID: 3988)
  • SUSPICIOUS

    • Drops a system driver (possible attempt to evade defenses)

      • javaw.exe (PID: 3860)
  • INFO

    • Checks supported languages

      • java.exe (PID: 3400)
      • javaw.exe (PID: 3124)
      • javaw.exe (PID: 3988)
      • javaw.exe (PID: 3860)
    • Reads the computer name

      • java.exe (PID: 3400)
      • javaw.exe (PID: 3124)
      • javaw.exe (PID: 3860)
      • javaw.exe (PID: 3988)
    • Manual execution by a user

      • javaw.exe (PID: 3124)
      • javaw.exe (PID: 3860)
      • javaw.exe (PID: 3988)
    • Creates files or folders in the user directory

      • java.exe (PID: 3400)
      • javaw.exe (PID: 3860)
      • javaw.exe (PID: 3124)
    • Create files in a temporary directory

      • javaw.exe (PID: 3124)
      • java.exe (PID: 3400)
      • javaw.exe (PID: 3860)
      • javaw.exe (PID: 3988)
    • Creates files in the program directory

      • javaw.exe (PID: 3124)
    • Reads the machine GUID from the registry

      • javaw.exe (PID: 3860)
      • javaw.exe (PID: 3988)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2022:11:23 01:06:10
ZipCRC: 0x31aebde4
ZipCompressedSize: 11535980
ZipUncompressedSize: 12670491
ZipFileName: UziClicker.jar
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
43
Monitored processes
6
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs javaw.exe no specs icacls.exe no specs java.exe no specs javaw.exe no specs javaw.exe

Process information

PID
CMD
Path
Indicators
Parent process
3124"C:\Program Files\Java\jre1.8.0_271\bin\javaw.exe" -jar "C:\Users\admin\Desktop\UziClicker.jar" C:\Program Files\Java\jre1.8.0_271\bin\javaw.exeexplorer.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.2710.9
Modules
Images
c:\program files\java\jre1.8.0_271\bin\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3400java -jar C:\Users\admin\AppData\Roaming\uziclicker\UziClicker.jar -create C:\Users\admin\Desktop\UziClicker.jarC:\Program Files\Java\jre1.8.0_271\bin\java.exejavaw.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.2710.9
Modules
Images
c:\program files\java\jre1.8.0_271\bin\java.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3460"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\UziClicker.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3512C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MC:\Windows\System32\icacls.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\icacls.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
3860"C:\Program Files\Java\jre1.8.0_271\bin\javaw.exe" -jar "C:\Users\admin\AppData\Roaming\uziclicker\UziClicker.jar" C:\Program Files\Java\jre1.8.0_271\bin\javaw.exeexplorer.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.2710.9
Modules
Images
c:\program files\java\jre1.8.0_271\bin\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3988"C:\Program Files\Java\jre1.8.0_271\bin\javaw.exe" -jar "C:\Users\admin\AppData\Roaming\uziclicker\UziClicker.jar" C:\Program Files\Java\jre1.8.0_271\bin\javaw.exe
explorer.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.2710.9
Modules
Images
c:\program files\java\jre1.8.0_271\bin\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
2 739
Read events
2 729
Write events
10
Delete events
0

Modification events

(PID) Process:(3460) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17A\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3460) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(3460) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3460) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3460) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3460) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3460) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3460) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3860) javaw.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Direct3D\MostRecentApplication
Operation:writeName:Name
Value:
Explorer.EXE
(PID) Process:(3988) javaw.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Direct3D\MostRecentApplication
Operation:writeName:Name
Value:
javaw.exe
Executable files
10
Suspicious files
8
Text files
18
Unknown types
0

Dropped files

PID
Process
Filename
Type
3124javaw.exeC:\ProgramData\Oracle\Java\.oracle_jre_usage\17dfc292991c8061.timestamptext
MD5:C2A018322C4FA20BF62A482E5747972E
SHA256:A8FA8AE972755C3BF82F6A7658B38D49EEE0779AE6E2265A2DEBF7B10D1FC2BC
3860javaw.exeC:\Users\admin\AppData\Roaming\uziclicker\uzi6lib\WinDivert64.dllexecutable
MD5:89A54F14B738DB27752AC4D99BD55CB6
SHA256:9B834E8F9D117BF2C564A37434973DC0717270EBFAC8D8251711905D18DA3858
3860javaw.exeC:\Users\admin\AppData\Roaming\uziclicker\uzi6lib\WinDivert32.dllexecutable
MD5:52A30CFDFCDE4CD02B3369D182469F46
SHA256:33C657FA27B92CFCCED66B331CFEA7A880460A98CF037E4277FAA1420FE59D1C
3860javaw.exeC:\Users\admin\AppData\Roaming\uziclicker\uzi6lib\WinDivert32.sysexecutable
MD5:A957E7B3E15C952396F1E4738B8C6A6E
SHA256:5EF707EA68A9BD3A3E568793A0F7D66D166694801ADA067D9EBAC1D13E53153E
3988javaw.exeC:\Users\admin\AppData\Local\Temp\imageio5835484771149693800.tmpimage
MD5:048D79A74397B902F13AC77FF1BC90BC
SHA256:E6698CA7B43645215B88E2BEB3DACC008F53359EF71A0B15543092EEBE4C735E
3988javaw.exeC:\Users\admin\AppData\Local\Temp\+~JF8904006376333117569.tmpbinary
MD5:8B6AF8E5E8324EDFD77AF8B3B35D7F9C
SHA256:78F127277756AE464F4EB665CE214CB6315746F6F4193E95B31F18F4B3E97527
3860javaw.exeC:\Users\admin\AppData\Roaming\uziclicker\uzi6lib\jna-platform-5.10.0.jarjava
MD5:C1AB841070C388EC32B77CDC05F084FB
SHA256:1F71AFD977051BF0109EF5E3767D4E2AFD777BE894D89788CC0F38AD68F6A16F
3124javaw.exeC:\Users\admin\AppData\Roaming\uziclicker\UziClicker.jarcompressed
MD5:03B9133BB7AB3E465B8DE753BF5FEFB4
SHA256:EA6A8907D64B735E2848CE2CD5BCF8CE5D73FA681CBD8486CA7E7D2A2E15FB5A
3400java.exeC:\Users\admin\Desktop\UziClicker.lnkbinary
MD5:76A85AE5EFB30CEE18978D08CCF35C50
SHA256:6FFEF19A052C64F5819DE53E504A4D23DB2648241DFA559DA233D99DAC830CFD
3460WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3460.26616\UziClicker.jarcompressed
MD5:03B9133BB7AB3E465B8DE753BF5FEFB4
SHA256:EA6A8907D64B735E2848CE2CD5BCF8CE5D73FA681CBD8486CA7E7D2A2E15FB5A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
5
DNS requests
3
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
868
svchost.exe
95.101.148.135:80
Akamai International B.V.
NL
unknown
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
868
svchost.exe
88.221.124.138:80
armmf.adobe.com
AKAMAI-AS
DE
unknown
3988
javaw.exe
188.114.97.3:443
uziclicker.pl
CLOUDFLARENET
NL
unknown

DNS requests

Domain
IP
Reputation
armmf.adobe.com
  • 88.221.124.138
whitelisted
uziclicker.pl
  • 188.114.97.3
  • 188.114.96.3
whitelisted

Threats

No threats detected
No debug info