Summary | ZeroBOX

INV202054pdf.jar

Category Machine Started Completed
FILE s1_win7_x6401 June 9, 2021, 9:48 a.m. June 9, 2021, 10 a.m.
Size 100.8KB
Type Zip archive data, at least v2.0 to extract
MD5 fc43547ad34a9e4c3790e60a49fbc215
SHA256 259fc2a6d3fdc25024b9b5d5257207d5e750b49f79e8b2914b89e8a9846a602b
CRC32 AF09F6DF
ssdeep 1536:g2d34yLEzcPWTauSAtpxgF6NikUQIXY7wK8UmXp7JxlrXoaE1Hfisph/Mx5khW1g:gPOWTrR7PMkUfYkUa7jFXohiclMZg
Yara None matched

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 2555904
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000025b0000
process_handle: 0xffffffffffffffff
1 0 0
Cyren Java/Kryptik.L.gen!Eldorado
ESET-NOD32 multiple detections
DrWeb Java.Siggen.491
McAfee-GW-Edition Artemis
Microsoft Trojan:Java/StrRat.B!MTB
Ikarus Trojan.Java.Spy
count 3604 name heapspray process java.exe total_mb 901 length 262144 protection PAGE_READWRITE