analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

01082019_docx.jar

Full analysis: https://app.any.run/tasks/4d25658f-24e5-435f-b12e-82fe3ff0dcdf
Verdict: Malicious activity
Analysis date: April 23, 2019, 17:46:25
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

B6AD7F4DDF09905C2987E185FE16F006

SHA1:

C1CEE4EA9249B2B7EED28436B26B9EFCD91D5931

SHA256:

BDE3BC2AA352B561653E822BD63FCDE7E9F4E5DE86B45D1D75210A70F861EA14

SSDEEP:

6144:RXE+CaKVPjVnB6jrCnx+mT55hjtsbN0aUxDBwRuS1y1m152XD:1EDVPj1Aj2nw+5hjMN03wCO54

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • java.exe (PID: 3356)
  • SUSPICIOUS

    • Executes JAVA applets

      • javaw.exe (PID: 2668)
    • Creates files in the user directory

      • javaw.exe (PID: 2668)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0808
ZipCompression: Deflated
ZipModifyDate: 2019:01:07 21:56:02
ZipCRC: 0x00000000
ZipCompressedSize: 2
ZipUncompressedSize: -
ZipFileName: com/
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start javaw.exe no specs java.exe

Process information

PID
CMD
Path
Indicators
Parent process
2668"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe" -jar "C:\Users\admin\AppData\Local\Temp\01082019_docx.jar"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exeexplorer.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.920.14
3356"C:\Program Files\Java\jre1.8.0_92\bin\java" -jar C:\Users\admin\AppData\Roaming\File.jarC:\Program Files\Java\jre1.8.0_92\bin\java.exe
javaw.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Version:
8.0.920.14
Total events
26
Read events
14
Write events
7
Delete events
5

Modification events

(PID) Process:(3356) java.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:File
Value:
"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe" -jar "C:\Users\admin\AppData\Roaming\File.jar"
(PID) Process:(3356) java.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:delete valueName:File
Value:
"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe" -jar "C:\Users\admin\AppData\Roaming\File.jar"
(PID) Process:(3356) java.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Direct3D\MostRecentApplication
Operation:writeName:Name
Value:
java.exe
Executable files
0
Suspicious files
1
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
2668javaw.exeC:\Users\admin\AppData\Roaming\File.jarcompressed
MD5:C73FC37B4EC45B31DED2CED69D3EFE2E
SHA256:C04B2FDCE281E6D80412F4992BF4D3B59BBBA2C35EF7F34D4EFCE660E4887CAB
3356java.exeC:\Users\admin\.oracle_jre_usage\90737d32e3abaa4.timestamptext
MD5:FCA1F0AACCCC97DA387FB564639286CF
SHA256:F7393364CFB73B1FF01748300BD5FBBA68155A1D99027C1D02A78E6588BFDF57
2668javaw.exeC:\Users\admin\.oracle_jre_usage\90737d32e3abaa4.timestamptext
MD5:313BBA49EDF157486E69B1724ACA86F9
SHA256:8B1892264417DAF7FA0A3F451C320B242AD204290D20C6C5EBAD1C339E8AD53F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
2
DNS requests
2
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3356
java.exe
134.19.176.26:5050
Global Layer B.V.
NL
malicious
134.19.176.26:5050
Global Layer B.V.
NL
malicious

DNS requests

Domain
IP
Reputation
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

No threats detected
No debug info