ScreenShot
Created | 2023.11.12 14:40 | Machine | s1_win7_x6403 |
Filename | 11.11.2023_SIPARISLER.DOCX.jar | ||
Type | Java archive data (JAR) | ||
AI Score | Not founds | Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | |||
md5 | 5ae53798de1427f31fa77a3bc776af1f | ||
sha256 | 7d52c0420d0ba9f99e074904060bde974b7a057b862a128b530d5b2f438fccce | ||
ssdeep | 6144:04ORE8WuFy5+bN+LEMADaWbb+xQaNgqcRxEQE:04ORfWgtbNmEMAmaY/0OQE | ||
imphash | |||
impfuzzy |
Network IP location
Signature (11cnts)
Level | Description |
---|---|
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time) |
notice | Creates a suspicious process |
notice | Executes one or more WMI queries |
notice | Executes one or more WMI queries which can be used to identify virtual machines |
notice | Uses Windows utilities for basic Windows functionality |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | Command line console output was observed |
info | One or more processes crashed |
info | Queries for the computername |
Rules (1cnts)
Level | Name | Description | Collection |
---|---|---|---|
info | zip_file_format | ZIP file format | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|