Summary | ZeroBOX

s.jar

Generic Malware Malicious Library Admin Tool (Sysinternals etc ...) UPX PE File DLL OS Processor Check PE32 ZIP Format
Category Machine Started Completed
FILE s1_win7_x6403_us Oct. 6, 2024, 6:15 p.m. Oct. 6, 2024, 6:19 p.m.
Size 23.4MB
Type Zip archive data, at least v2.0 to extract
MD5 f476422a60511cd61f6754728580ce34
SHA256 7a11f106c159e995601f6acf7cb5bf9a78f9e766a97eb63502cb9666febc7a6e
CRC32 DFDE0A9F
ssdeep 393216:Uj2fnuMWx2Y+fTS66Na4CUid5EYa9fL8kE/Yiuyw6iPhRD/IBRsme1eZrWl+9p:CquP2Y/fDCdfElCV/tw6i5qBioKUP
Yara
  • zip_file_format - ZIP file format
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
161.97.108.54 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: 8b 06 8d b5 f8 00 00 00 c5 fe 7f 06 c5 fe 7f 7e
exception.instruction: mov eax, dword ptr [esi]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x2420202
registers.esp: 10090792
registers.edi: 1
registers.eax: 6
registers.ebp: 1950340288
registers.edx: 0
registers.ebx: 16910336
registers.esi: 0
registers.ecx: 3405691582
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: 8b 06 8d b5 f8 00 00 00 c5 fe 7f 06 c5 fe 7f 7e
exception.instruction: mov eax, dword ptr [esi]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x25c0202
registers.esp: 14350064
registers.edi: 1
registers.eax: 6
registers.ebp: 1950340288
registers.edx: 0
registers.ebx: 133120
registers.esi: 0
registers.ecx: 3405691582
1 0 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 163840
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02420000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02448000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02450000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02458000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02460000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02468000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02470000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02478000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02480000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02488000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02490000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02498000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024a0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024a8000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024b0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024b8000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024c0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024c8000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024d0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024d8000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024e0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024e8000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024f0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024f8000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02500000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02508000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02510000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02518000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02520000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02528000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02530000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02538000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02540000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02548000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2136
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 163840
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x025c0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2136
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x025e8000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2136
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x025f0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2136
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x025f8000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2136
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02600000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2136
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02608000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2136
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02610000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2136
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02618000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2136
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02620000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2136
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02628000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2136
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02630000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2136
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02638000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2136
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02640000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2136
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02648000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2136
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02650000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2136
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02658000
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\JNativeHook-2545430567938135033.x86.dll
file C:\Users\test22\AppData\Local\Temp\JNativeHook-4180845401832850675.x86.dll
file C:\Users\test22\AppData\Local\Temp\jna--877171118\jna5717180362363948917.dll
file C:\Users\test22\AppData\Local\Temp\jna--877171118\jna5717180362363948917.dll
file C:\Users\test22\AppData\Local\Temp\JNativeHook-2545430567938135033.x86.dll
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2000
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 65536
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x16200000
process_handle: 0xffffffff
1 0 0
Time & API Arguments Status Return Repeated

GetAdaptersAddresses

flags: 28
family: 0
1 0 0
cmdline netsh wlan show networks mode=bssid
host 161.97.108.54
Time & API Arguments Status Return Repeated

SetWindowsHookExA

thread_identifier: 0
callback_function: 0x73d01069
hook_identifier: 14 (WH_MOUSE_LL)
module_address: 0x73d00000
1 65849 0
Time & API Arguments Status Return Repeated

SetWindowsHookExA

thread_identifier: 0
callback_function: 0x73d01230
hook_identifier: 13 (WH_KEYBOARD_LL)
module_address: 0x73d00000
1 196915 0
CTX jar.trojan.genericgba
ALYac Java.Trojan.GenericGBA.31964
Alibaba TrojanPSW:JAVA/Disco.510fe66b
Arcabit Java.Trojan.GenericGBA.D7CDC
Elastic Windows.VulnDriver.WinDivert
ESET-NOD32 a variant of Java/Agent.BG
Kaspersky HEUR:Trojan-PSW.Multi.Disco.gen
BitDefender Java.Trojan.GenericGBA.31964
Emsisoft Java.Trojan.GenericGBA.31964 (B)
VIPRE Java.Trojan.GenericGBA.31964
FireEye Java.Trojan.GenericGBA.31964
Kingsoft Win32.Troj.Undef.a
Gridinsoft Malware.U.Gen.tr
ZoneAlarm HEUR:Trojan-PSW.Multi.Disco.gen
GData Java.Trojan.Agent.BMK
Ikarus Win32.Outbreak
Tencent Win32.Trojan-QQPass.QQRob.Xtjl
alibabacloud Trojan[stealer]:Java/Disco.gyf
file C:\Users\test22\AppData\Local\Temp\JNativeHook-4180845401832850675.x86.dll
file C:\Users\test22\AppData\Local\Temp\JNativeHook-2545430567938135033.x86.dll
file C:\Users\test22\AppData\Local\Temp\jna--877171118\jna5717180362363948917.dll
dead_host 192.168.56.103:49188
dead_host 192.168.56.103:49170
dead_host 192.168.56.103:49192
dead_host 192.168.56.103:49190
dead_host 192.168.56.103:49180
dead_host 192.168.56.103:49194
dead_host 192.168.56.103:49184
dead_host 192.168.56.103:49182
dead_host 192.168.56.103:49172
dead_host 161.97.108.54:24464
dead_host 192.168.56.103:49186
dead_host 192.168.56.103:49176
dead_host 192.168.56.103:49174
dead_host 192.168.56.103:49196
dead_host 192.168.56.103:49178
dead_host 192.168.56.103:49167