Report - Inv_INV410599.jar

Gen2 Gen1 NPKI Formbook Generic Malware Malicious Library Malicious Packer UPX Admin Tool (Sysinternals etc ...) ASPack PE File OS Processor Check DLL PE32
ScreenShot
Created 2021.09.13 18:02 Machine s1_win7_x6403
Filename Inv_INV410599.jar
Type Zip archive data, at least v2.0 to extract
AI Score Not founds Behavior Score
8.4
ZERO API file : malware
VT API (file) 21 detected (Java, Adwind, multiple detections, GenericKD, csrvpr, ai score=88, Probably Heur, JARAgent)
md5 2a3426e77f270bf7d46e1f3599541271
sha256 277af42a715037a16c0455c792cca68491c2888d9acb6ecb1ebd8f56a76c6100
ssdeep 6144:LOoQtE9ASAWpCi4gBn8WVIogpVfqZoFU/meUgnc3:CoQtE/AWj408WVIvLqCFU/md2Q
imphash
impfuzzy
  Network IP location

Signature (19cnts)

Level Description
warning File has been identified by 21 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Deletes executed files from disk
watch Executes one or more WMI queries
watch Installs itself for autorun at Windows startup
watch The process javaw.exe wrote an executable file to disk
watch Uses suspicious command line tools or Windows utilities
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice Terminates another process
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info One or more processes crashed
info Queries for the computername

Rules (14cnts)

Level Name Description Collection
danger NPKI_Zero File included NPKI binaries (download)
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (download)
danger Win_Trojan_Formbook_Zero Used Formbook binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Admin_Tool_IN_Zero Admin Tool Sysinternals binaries (download)
watch ASPack_Zero ASPack packed file binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch UPX_Zero UPX packed file binaries (download)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info PE_Header_Zero PE File Signature binaries (download)
info Win32_Trojan_Gen_2_0904B0_Zero Win32 Trojan Gen binaries (download)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
143.244.165.128 Unknown 143.244.165.128 clean

Suricata ids



Similarity measure (PE file only) - Checking for service failure