Summary | ZeroBOX

1099-MISC.jar

ZIP Format
Category Machine Started Completed
FILE s1_win7_x6402 June 22, 2023, 5:37 p.m. June 22, 2023, 5:39 p.m.
Size 1.7MB
Type Java archive data (JAR)
MD5 c1a10e84f73f716c09b346ff4208b39e
SHA256 0713bc4ac1a4fb5c3b4c163debb629415c3700330d602397ce15128a8e0c6d92
CRC32 A1562850
ssdeep 49152:/xPhqRqr91AJS90XN4t5SFAi2kwbk8kzwDVYkJpNruNrhdF:/xoQnAU04jSGiIQkDVfruRF
Yara
  • zip_file_format - ZIP file format

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch
193.142.146.220 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: 8b 06 8d b5 f8 00 00 00 c5 fe 7f 06 c5 fe 7f 7e
exception.instruction: mov eax, dword ptr [esi]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x2670202
registers.esp: 5371712
registers.edi: 1
registers.eax: 6
registers.ebp: 1948636352
registers.edx: 0
registers.ebx: 16910336
registers.esi: 0
registers.ecx: 3405691582
1 0 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 163840
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02670000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02698000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026a0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026a8000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026b0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026b8000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026c0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026c8000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026d0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026d8000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026e0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026e8000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026f0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026f8000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02700000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02708000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02710000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02718000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02720000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02728000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73b32000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02730000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02738000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02740000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02748000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02750000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02758000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02760000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02768000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02770000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02778000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02780000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02788000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02790000
process_handle: 0xffffffff
1 0 0
cmdline cmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files (x86)\Java\jre1.8.0_131\bin\javaw.exe -jar C:\Users\test22\AppData\Roaming\Microsoft\.tmp\1687429056661.tmp" /f"
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 3056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 65536
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x16200000
process_handle: 0xffffffff
1 0 0
Time & API Arguments Status Return Repeated

GetAdaptersAddresses

flags: 28
family: 0
1 0 0
cmdline REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files (x86)\Java\jre1.8.0_131\bin\javaw.exe -jar C:\Users\test22\AppData\Roaming\Microsoft\.tmp\1687429056661.tmp" /f
cmdline cmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files (x86)\Java\jre1.8.0_131\bin\javaw.exe -jar C:\Users\test22\AppData\Roaming\Microsoft\.tmp\1687429056661.tmp" /f"
host 193.142.146.220
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Home reg_value C:\Program Files (x86)\Java\jre1.8.0_131\bin\javaw.exe -jar C:\Users\test22\AppData\Roaming\Microsoft\.tmp\1687429056661.tmp
ALYac Backdoor.JAVA.Agent.gen
Alibaba Backdoor:JAVA/Adwind.844bb574
Cyren Java/Ratty.A.gen!Eldorado
Symantec Trojan.Gen.NPE
ESET-NOD32 a variant of Java/Agent.PY
Avast Java:Malware-gen [Trj]
Cynet Malicious (score: 99)
Kaspersky HEUR:Backdoor.Java.Adwind.gen
F-Secure Exploit.EXP/JAVA.Banload.VPEF.Gen
McAfee-GW-Edition Artemis!Trojan
Ikarus Trojan-Spy.Java.Agent
Avira EXP/JAVA.Banload.VPEF.Gen
ZoneAlarm HEUR:Backdoor.Java.Adwind.gen
GData Java.Trojan.Agent.VYYSO7
Google Detected
Tencent Java.Backdoor.Adwind.Rzfl
AVG Java:Malware-gen [Trj]
DeepInstinct MALICIOUS