analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Purchase Order.jar.jar

Full analysis: https://app.any.run/tasks/f923ef53-7059-4278-931d-86f7e07b9cce
Verdict: Malicious activity
Threats:

Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.

Analysis date: March 22, 2019, 05:36:10
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
adwind
trojan
Indicators:
MIME: application/java-archive
File info: Java archive data (JAR)
MD5:

B254095C2BC55D3B5B45DAE9BDE8A4DD

SHA1:

566880A67EDE298575AAA28D6907B2EFDD61E89A

SHA256:

869CC2A32F631F2FB9F448FCF89986901C5A2540534E17356DEDAE5EB8646807

SSDEEP:

3072:LQYV6szDXUT1e7KlCqM/4ggi9jZFEUTEtsSrpyUB6iph:LG6XG1euoJ9ZFEWSrRB6iph

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • AdWind was detected

      • java.exe (PID: 1436)
    • Loads dropped or rewritten executable

      • explorer.exe (PID: 1696)
      • java.exe (PID: 1436)
      • javaw.exe (PID: 1476)
    • Application was dropped or rewritten from another process

      • java.exe (PID: 1436)
      • javaw.exe (PID: 1476)
  • SUSPICIOUS

    • Creates files in the user directory

      • javaw.exe (PID: 1476)
      • xcopy.exe (PID: 1908)
    • Starts CMD.EXE for commands execution

      • java.exe (PID: 1436)
    • Executes JAVA applets

      • explorer.exe (PID: 1696)
      • javaw.exe (PID: 1476)
    • Executes scripts

      • cmd.exe (PID: 516)
      • cmd.exe (PID: 2264)
    • Executable content was dropped or overwritten

      • xcopy.exe (PID: 1908)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.jar | Java Archive (78.3)
.zip | ZIP compressed archive (21.6)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0008
ZipCompression: Deflated
ZipModifyDate: 2019:03:21 20:13:19
ZipCRC: 0x00000000
ZipCompressedSize: 2
ZipUncompressedSize: -
ZipFileName: META-INF/
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
8
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start javaw.exe java.exe cmd.exe no specs cscript.exe no specs cmd.exe no specs cscript.exe no specs xcopy.exe explorer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1476"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe" -jar "C:\Users\admin\AppData\Local\Temp\Purchase Order.jar.jar"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe
explorer.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.920.14
1436"C:\Program Files\Java\jre1.8.0_92\bin\java.exe" -jar C:\Users\admin\AppData\Local\Temp\_0.164643820855177048980941928117480858.classC:\Program Files\Java\jre1.8.0_92\bin\java.exe
javaw.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Version:
8.0.920.14
2264cmd.exe /C cscript.exe C:\Users\admin\AppData\Local\Temp\Retrive1359164093026559412.vbsC:\Windows\system32\cmd.exejava.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
948cscript.exe C:\Users\admin\AppData\Local\Temp\Retrive1359164093026559412.vbsC:\Windows\system32\cscript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Console Based Script Host
Exit code:
0
Version:
5.8.7600.16385
516cmd.exe /C cscript.exe C:\Users\admin\AppData\Local\Temp\Retrive4339733817534507036.vbsC:\Windows\system32\cmd.exejava.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2572cscript.exe C:\Users\admin\AppData\Local\Temp\Retrive4339733817534507036.vbsC:\Windows\system32\cscript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Console Based Script Host
Exit code:
0
Version:
5.8.7600.16385
1908xcopy "C:\Program Files\Java\jre1.8.0_92" "C:\Users\admin\AppData\Roaming\Oracle\" /eC:\Windows\system32\xcopy.exe
java.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Extended Copy Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1696C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
109
Read events
92
Write events
17
Delete events
0

Modification events

(PID) Process:(1696) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1696) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:@C:\Windows\System32\display.dll,-4
Value:
S&creen resolution
(PID) Process:(1696) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:@C:\Program Files\Common Files\System\wab32res.dll,-4602
Value:
Contact file
(PID) Process:(1696) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:@C:\Program Files\Windows Sidebar\sidebar.exe,-11100
Value:
&Gadgets
(PID) Process:(1696) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:@C:\Windows\system32\themecpl.dll,-10
Value:
Pe&rsonalize
(PID) Process:(1696) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:@"C:\Program Files\Windows Journal\Journal.exe",-3072
Value:
Journal Document
(PID) Process:(1696) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:@C:\Windows\system32\notepad.exe,-469
Value:
Text Document
(PID) Process:(1696) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Operation:writeName:Classes
Value:
.accdb
(PID) Process:(1696) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Operation:writeName:~reserved~
Value:
0800000000000600
Executable files
107
Suspicious files
10
Text files
66
Unknown types
15

Dropped files

PID
Process
Filename
Type
1476javaw.exeC:\Users\admin\AppData\Local\Temp\jar_cache4287783124880308790.tmp
MD5:
SHA256:
1436java.exeC:\Users\admin\AppData\Local\Temp\Retrive1359164093026559412.vbs
MD5:
SHA256:
1476javaw.exeC:\Users\admin\AppData\Local\Temp\jar_cache7487003665657828918.tmp
MD5:
SHA256:
1436java.exeC:\Users\admin\.oracle_jre_usage\90737d32e3abaa4.timestamptext
MD5:E5F2A9123664A3AF81F911BD2FAFC0CD
SHA256:C2045D8C020492988EA3829FB7F9D4ACE611018AD795492924729B45D47D5ACC
1476javaw.exeC:\Users\admin\.oracle_jre_usage\90737d32e3abaa4.timestamptext
MD5:74E668E463D5E0BF900279F2B21CE563
SHA256:3A692C58D33DE3A8EFE65D0CC5759E669458097D36378BFA7F6D9D5F851DC00B
1908xcopy.exeC:\Users\admin\AppData\Roaming\Oracle\releasetext
MD5:1BCCC3A965156E53BE3136B3D583B7B6
SHA256:03A4DB27DEA69374EFBAF121C332D0AF05840D16D0C1FBF127D00E65054B118A
1908xcopy.exeC:\Users\admin\AppData\Roaming\Oracle\bin\dt_socket.dllexecutable
MD5:138F156057245747692A68EBE50D52C2
SHA256:F0FD0268D6E410C05E7EE71AD9C96744CD5E4A97329F608041D7078FAEE24ED0
1908xcopy.exeC:\Users\admin\AppData\Roaming\Oracle\LICENSEtext
MD5:98F46AB6481D87C4D77E0E91A6DBC15F
SHA256:23F9A5C12FA839650595A32872B7360B9E030C7213580FB27DD9185538A5828C
1476javaw.exeC:\Users\admin\AppData\Local\Temp\_0.164643820855177048980941928117480858.classjava
MD5:781FB531354D6F291F1CCAB48DA6D39F
SHA256:97D585B6AFF62FB4E43E7E6A5F816DCD7A14BE11A88B109A9BA9E8CD4C456EB9
1908xcopy.exeC:\Users\admin\AppData\Roaming\Oracle\COPYRIGHTtext
MD5:89F660D2B7D58DA3EFD2FECD9832DA9C
SHA256:F6A08C9CC04D7C6A86576C1EF50DD0A690AE5CB503EFD205EDB2E408BD8D557B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1476
javaw.exe
GET
200
199.188.200.56:80
http://unknowncrypter.co/unknown/locat/1553126400onvspxcwra.upload
US
java
473 Kb
malicious
1476
javaw.exe
GET
200
199.188.200.56:80
http://unknowncrypter.co/unknown/locat/1553126400onvspxcwra.upload
US
java
473 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1476
javaw.exe
199.188.200.56:80
unknowncrypter.co
Namecheap, Inc.
US
malicious

DNS requests

Domain
IP
Reputation
unknowncrypter.co
  • 199.188.200.56
malicious

Threats

No threats detected
No debug info