File name:

kill me.jar

Full analysis: https://app.any.run/tasks/50df50de-8239-49bd-8a76-87c0ff677e91
Verdict: Malicious activity
Analysis date: January 14, 2022, 23:11:30
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/java-archive
File info: Java archive data (JAR)
MD5:

98D3CEBBCE492AD48C6D443076EB9A0C

SHA1:

D7CDA9268026FA92566499A68FFC22C9F407FC8B

SHA256:

6E8AC0D98F89B91237EC16C982AD35E2E2E64F0E767FA688353B4D93976E2755

SSDEEP:

1536:jOyga1gvvRQEX15RRJum7jaNd5HgMAL22R6RJxarE8Bk8IU3Tdbemt:JnendX/UVddLALDRy7arHBnbUC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Uses Task Scheduler to run other applications

      • javaw.exe (PID: 1252)
    • Changes the autorun value in the registry

      • javaw.exe (PID: 1252)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 3780)
  • SUSPICIOUS

    • Reads the computer name

      • javaw.exe (PID: 1252)
      • javaw.exe (PID: 392)
      • javaw.exe (PID: 1168)
      • javaw.exe (PID: 4048)
      • javaw.exe (PID: 2232)
    • Creates files in the program directory

      • javaw.exe (PID: 1252)
    • Checks supported languages

      • javaw.exe (PID: 1252)
      • javaw.exe (PID: 4048)
      • javaw.exe (PID: 392)
      • cmd.exe (PID: 1384)
      • javaw.exe (PID: 1168)
      • javaw.exe (PID: 2232)
    • Uses ICACLS.EXE to modify access control list

      • javaw.exe (PID: 1252)
    • Uses ATTRIB.EXE to modify file attributes

      • javaw.exe (PID: 1252)
    • Creates files in the user directory

      • javaw.exe (PID: 1252)
    • Writes to a desktop.ini file (may be used to cloak folders)

      • javaw.exe (PID: 1252)
    • Application launched itself

      • javaw.exe (PID: 1252)
    • Executes JAVA applets

      • javaw.exe (PID: 1252)
    • Executed via Task Scheduler

      • javaw.exe (PID: 392)
      • javaw.exe (PID: 1168)
      • javaw.exe (PID: 2232)
    • Check for Java to be installed

      • javaw.exe (PID: 392)
      • javaw.exe (PID: 1168)
      • javaw.exe (PID: 2232)
    • Starts CMD.EXE for commands execution

      • javaw.exe (PID: 4048)
    • Uses REG.EXE to modify Windows registry

      • javaw.exe (PID: 4048)
  • INFO

    • Reads the computer name

      • icacls.exe (PID: 2884)
      • schtasks.exe (PID: 3780)
    • Checks supported languages

      • icacls.exe (PID: 2884)
      • schtasks.exe (PID: 3780)
      • NOTEPAD.EXE (PID: 3428)
      • attrib.exe (PID: 3784)
      • attrib.exe (PID: 2316)
      • reg.exe (PID: 1372)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: META-INF/MANIFEST.MF
ZipUncompressedSize: 570
ZipCompressedSize: 396
ZipCRC: 0x8d6c774e
ZipModifyDate: 2022:01:14 23:11:09
ZipCompression: Deflated
ZipBitFlag: 0x0808
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
52
Monitored processes
12
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start javaw.exe icacls.exe no specs schtasks.exe no specs attrib.exe no specs attrib.exe no specs javaw.exe javaw.exe no specs cmd.exe no specs javaw.exe no specs notepad.exe no specs reg.exe no specs javaw.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
392javaw.exe -jar "C:\Users\admin\AppData\Roaming\servidorcito\servidorcito.jar"C:\Program Files\Common Files\Oracle\Java\javapath\javaw.exetaskeng.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.2710.9
Modules
Images
c:\program files\common files\oracle\java\javapath_target_52116515\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1168javaw.exe -jar "C:\Users\admin\AppData\Roaming\servidorcito\servidorcito.jar"C:\Program Files\Common Files\Oracle\Java\javapath\javaw.exetaskeng.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.2710.9
Modules
Images
c:\program files\common files\oracle\java\javapath_target_52116515\javaw.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1252"C:\Program Files\Java\jre1.8.0_271\bin\javaw.exe" -jar "C:\Users\admin\Desktop\kill me.jar.zip"C:\Program Files\Java\jre1.8.0_271\bin\javaw.exe
Explorer.EXE
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.2710.9
Modules
Images
c:\program files\java\jre1.8.0_271\bin\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1372reg query HKCU\Software\DownloadManager\PasswordsC:\Windows\system32\reg.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1384cmd.exe /c dirC:\Windows\system32\cmd.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2232javaw.exe -jar "C:\Users\admin\AppData\Roaming\servidorcito\servidorcito.jar"C:\Program Files\Common Files\Oracle\Java\javapath\javaw.exetaskeng.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.2710.9
Modules
Images
c:\program files\common files\oracle\java\javapath_target_52116515\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2316attrib +s +h +r "C:\Users\admin\AppData\Roaming\servidorcito"C:\Windows\system32\attrib.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Attribute Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\attrib.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\ulib.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2884C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MC:\Windows\system32\icacls.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\icacls.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
3428"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\temporalito5693553201825881713e.txtC:\Windows\system32\NOTEPAD.EXEjavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3780schtasks /create /tn Firewall /tr "javaw.exe -jar 'C:\Users\admin\AppData\Roaming\servidorcito\servidorcito.jar'" /sc minute /mo 1C:\Windows\system32\schtasks.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
Total events
3 117
Read events
3 115
Write events
2
Delete events
0

Modification events

(PID) Process:(1252) javaw.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Firewall
Value:
"C:\Program Files\Java\jre1.8.0_271/bin/javaw.exe" -jar "C:\Users\admin\AppData\Roaming\servidorcito\servidorcito.jar"
(PID) Process:(4048) javaw.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Direct3D\MostRecentApplication
Operation:writeName:Name
Value:
javaw.exe
Executable files
1
Suspicious files
0
Text files
55
Unknown types
0

Dropped files

PID
Process
Filename
Type
4048javaw.exeC:\Users\admin\AppData\Local\Temp\imageio1133348356708905949.tmpimage
MD5:
SHA256:
4048javaw.exeC:\Users\admin\AppData\Local\Temp\imageio513179831430294926.tmpimage
MD5:
SHA256:
1252javaw.exeC:\Users\admin\AppData\Roaming\servidorcito\servidorcito.jarjava
MD5:
SHA256:
4048javaw.exeC:\Users\admin\AppData\Local\Temp\imageio460538308995786951.tmpimage
MD5:
SHA256:
4048javaw.exeC:\Users\admin\AppData\Local\Temp\imageio979007195677504457.tmpimage
MD5:
SHA256:
4048javaw.exeC:\Users\admin\AppData\Local\Temp\imageio283029634205061168.tmpimage
MD5:
SHA256:
4048javaw.exeC:\Users\admin\AppData\Local\Temp\imageio8274786529896187655.tmpimage
MD5:
SHA256:
1252javaw.exeC:\Users\admin\AppData\Roaming\servidorcito\Desktop.iniini
MD5:
SHA256:
4048javaw.exeC:\Users\admin\AppData\Local\Temp\imageio6367349336626882806.tmpimage
MD5:
SHA256:
4048javaw.exeC:\Users\admin\AppData\Local\Temp\imageio2181745539500588891.tmpimage
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
14
DNS requests
2
Threats
2

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4048
javaw.exe
79.66.71.109:5000
nipodipo.duckdns.org
Tiscali UK Limited
GB
malicious
4048
javaw.exe
79.66.71.109:5321
nipodipo.duckdns.org
Tiscali UK Limited
GB
malicious

DNS requests

Domain
IP
Reputation
nipodipo.duckdns.org
  • 79.66.71.109
malicious

Threats

PID
Process
Class
Message
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
No debug info