Summary | ZeroBOX

yaml-payload.jar

ZIP Format
Category Machine Started Completed
FILE s1_win7_x6401 Nov. 11, 2024, 9:30 a.m. Nov. 11, 2024, 9:34 a.m.
Size 2.2KB
Type Java archive data (JAR)
MD5 a37d31a4fd0e88f3e441d6c1c91e9189
SHA256 24591cbb17968099f1ba24b46d426b448e57e08a8ef11dc19ad3b1af9a220b3c
CRC32 3185E888
ssdeep 48:9dtYLBXtfumkDRK23VhoLR+gERElz4QFwWOYTd+DKWbxQyYIO3y:3E9mmk9FhAR+ZElwWfTOKWbxQCx
Yara
  • zip_file_format - ZIP file format

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 2555904
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000002430000
process_handle: 0xffffffffffffffff
1 0 0
VIPRE Trojan.GenericKD.74726113
BitDefender Trojan.GenericKD.74726113
Arcabit Trojan.Generic.D4743AE1
MicroWorld-eScan Trojan.GenericKD.74726113
Emsisoft Trojan.GenericKD.74726113 (B)
FireEye Trojan.GenericKD.74726113
GData Trojan.GenericKD.74726113
count 3220 name heapspray process java.exe total_mb 805 length 262144 protection PAGE_READWRITE