analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

PVKTJVFK.jar

Full analysis: https://app.any.run/tasks/34246c94-fc3b-4b0b-8dd0-9e7af779cc77
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: November 14, 2018, 12:17:44
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

B8A3697926198D1F2E6EAD9FBEAA5DED

SHA1:

767B8920674824E81160D95F11ACEA2DBF5E6E58

SHA256:

561086DBAF99FAE0C4229DD3874B1F6DD458EFF82AFBEA185C19336DC0C79B77

SSDEEP:

1536:c/FKZC/LcAfoZR9fRpwdcUqNE7c5p9ZFO6CrBd6Lzmju5+HOqhVU7l2nHE:c/FKZCTcAwZR9bdVE7iPZbCNusHhU7ll

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • reg.exe (PID: 3104)
      • reg.exe (PID: 3336)
    • Connects to CnC server

      • javaw.exe (PID: 2296)
  • SUSPICIOUS

    • Uses ATTRIB.EXE to modify file attributes

      • javaw.exe (PID: 912)
    • Uses REG.EXE to modify Windows registry

      • javaw.exe (PID: 912)
      • javaw.exe (PID: 2296)
    • Writes to a desktop.ini file (may be used to cloak folders)

      • javaw.exe (PID: 912)
    • Application launched itself

      • javaw.exe (PID: 912)
    • Creates files in the user directory

      • javaw.exe (PID: 912)
    • Executes JAVA applets

      • javaw.exe (PID: 912)
    • Connects to unusual port

      • javaw.exe (PID: 2296)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.jar | Java Archive (78.3)
.zip | ZIP compressed archive (21.6)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0808
ZipCompression: Deflated
ZipModifyDate: 2018:11:09 12:45:04
ZipCRC: 0xc4844289
ZipCompressedSize: 3933
ZipUncompressedSize: 9805
ZipFileName: C$A.class
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
8
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start javaw.exe no specs reg.exe attrib.exe no specs attrib.exe no specs javaw.exe reg.exe mspaint.exe no specs mspaint.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
912"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe" -jar "C:\Users\admin\AppData\Local\Temp\PVKTJVFK.jar"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exeexplorer.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.920.14
3336reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Shockwave_Content_8223_16741 /t REG_SZ /d "\"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe\" -jar \"C:\Users\admin\AppData\Roaming\Architecture\Geographic.nQW\"" /fC:\Windows\system32\reg.exe
javaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3688attrib +s +h +r "C:\Users\admin\AppData\Roaming\Architecture\*.*"C:\Windows\system32\attrib.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Attribute Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3380attrib +s +h +r "C:\Users\admin\AppData\Roaming\Architecture"C:\Windows\system32\attrib.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Attribute Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2296"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe" -jar "C:\Users\admin\AppData\Roaming\Architecture\Geographic.nQW"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe
javaw.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Version:
8.0.920.14
3104reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Shockwave_Content_8223_16741 /t REG_SZ /d "\"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe\" -jar \"C:\Users\admin\AppData\Roaming\Architecture\Geographic.nQW\"" /fC:\Windows\system32\reg.exe
javaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
648"C:\Windows\system32\mspaint.exe" "C:\Users\admin\Desktop\hisreally.jpg"C:\Windows\system32\mspaint.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Paint
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1184"C:\Windows\system32\mspaint.exe" "C:\Users\admin\Desktop\shecategory.png"C:\Windows\system32\mspaint.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Paint
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
189
Read events
127
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
1
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
912javaw.exeC:\Users\admin\AppData\Roaming\Architecture\Geographic.nQWcompressed
MD5:B8A3697926198D1F2E6EAD9FBEAA5DED
SHA256:561086DBAF99FAE0C4229DD3874B1F6DD458EFF82AFBEA185C19336DC0C79B77
912javaw.exeC:\Users\admin\.oracle_jre_usage\90737d32e3abaa4.timestamptext
MD5:2F7B526123A1032C4091A96A04C57D70
SHA256:7AC7AF13AB03FBACFE45D4CDC29994872E75CB92C5D9C69B0B29A3C0C7473169
2296javaw.exeC:\Users\admin\.oracle_jre_usage\90737d32e3abaa4.timestamptext
MD5:139BFC70AF88FFEBB19BD704B49C5A9D
SHA256:8F42946379E10C6E26638309DB7066553ED75A9E0E1C5F8B35BF36EC0731C801
912javaw.exeC:\Users\admin\AppData\Roaming\Architecture\Desktop.iniini
MD5:E783BDD20A976EAEAAE1FF4624487420
SHA256:2F65FA9C7ED712F493782ABF91467F869419A2F8B5ADF23B44019C08190FA3F3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2296
javaw.exe
54.36.212.133:1505
yolecafeha.club
OVH SAS
FR
suspicious

DNS requests

Domain
IP
Reputation
yolecafeha.club
  • 54.36.212.133
malicious

Threats

PID
Process
Class
Message
2296
javaw.exe
A Network Trojan was detected
MALWARE [PTsecurity] Possible JavaRAT(Qarallax/QRat) 4byte TCP serialization java stream
2296
javaw.exe
A Network Trojan was detected
MALWARE [PTsecurity] Backdoor.Java.QRat.gen
1 ETPRO signatures available at the full report
No debug info