Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Telexcopy.pdf.jar

Overview

General Information

Sample name:Telexcopy.pdf.jar
Analysis ID:1416890
MD5:81e621517a407ae36da0a767b960c88c
SHA1:421f3489d10b803e2dd64d0b47ce619da2da448a
SHA256:ca438598c383fab834c5e52369032e30c657f8f70cbb095f181ea7779d34bba1
Tags:jar
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected JARBomb
Exploit detected, runtime environment starts unknown processes
Uses an obfuscated file name to hide its real file extension (double extension)
Abnormal high CPU Usage
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Tries to load missing DLLs
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 7za.exe (PID: 6668 cmdline: 7za.exe x -y -oC:\jar "C:\Users\user\Desktop\Telexcopy.pdf.jar" MD5: 77E556CDFDC5C592F5C46DB4127C6F4C)
    • conhost.exe (PID: 5352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • java.exe (PID: 5904 cmdline: java.exe -jar "C:\Users\user\Desktop\Telexcopy.pdf.jar" services MD5: 9DAA53BAB2ECB33DC0D9CA51552701FA)
    • conhost.exe (PID: 7960 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Telexcopy.pdf.jarJoeSecurity_JARBombYara detected JARBombJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: Telexcopy.pdf.jarVirustotal: Detection: 15%Perma Link

    Software Vulnerabilities

    barindex
    Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeProcess created: C:\Windows\System32\conhost.exe
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownDNS traffic detected: queries for: mbycket45344.s3.eu-north-1.amazonaws.com
    Source: Telexcopy.pdf.jarString found in binary or memory: https://branchlock.net
    Source: 7za.exe, 00000000.00000002.6577553454.0000000003195000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://branchlock.net::
    Source: 7za.exe, 00000000.00000002.6577276111.00000000014C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://branchlock.netL
    Source: C:\Windows\System32\7za.exeProcess Stats: CPU usage > 49%
    Source: C:\Windows\System32\7za.exeSection loaded: 7z.dllJump to behavior
    Source: classification engineClassification label: mal64.expl.evad.winJAR@4/1@1/0
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5352:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: Local\SM0:7960:120:WilError_03
    Source: C:\Windows\System32\7za.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: Telexcopy.pdf.jarVirustotal: Detection: 15%
    Source: unknownProcess created: C:\Windows\System32\7za.exe 7za.exe x -y -oC:\jar "C:\Users\user\Desktop\Telexcopy.pdf.jar"
    Source: C:\Windows\System32\7za.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exe java.exe -jar "C:\Users\user\Desktop\Telexcopy.pdf.jar" services
    Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeCode function: 23_2_0167126A push ebp; ret 23_2_0167126B
    Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeCode function: 23_2_0167666A push ebp; ret 23_2_0167667B
    Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeCode function: 23_2_01671032 push ebp; ret 23_2_01671043

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: Possible double extension: pdf.jarStatic PE information: Telexcopy.pdf.jar

    Malware Analysis System Evasion

    barindex
    Source: Yara matchFile source: Telexcopy.pdf.jar, type: SAMPLE
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exeQueries volume information: unknown VolumeInformationJump to behavior
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Exploitation for Client Execution
    1
    DLL Side-Loading
    1
    Process Injection
    1
    Masquerading
    OS Credential Dumping11
    System Information Discovery
    Remote ServicesData from Local System1
    Non-Application Layer Protocol
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Process Injection
    LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
    Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    DLL Side-Loading
    Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
    Obfuscated Files or Information
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    Telexcopy.pdf.jar8%ReversingLabsBinary.Trojan.Generic
    Telexcopy.pdf.jar16%VirustotalBrowse
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://branchlock.net0%Avira URL Cloudsafe
    https://branchlock.net::0%Avira URL Cloudsafe
    https://branchlock.netL0%Avira URL Cloudsafe
    https://branchlock.net0%VirustotalBrowse
    NameIPActiveMaliciousAntivirus DetectionReputation
    s3-r-w.eu-north-1.amazonaws.com
    3.5.218.56
    truefalse
      high
      mbycket45344.s3.eu-north-1.amazonaws.com
      unknown
      unknownfalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        https://branchlock.netTelexcopy.pdf.jarfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://branchlock.netL7za.exe, 00000000.00000002.6577276111.00000000014C0000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://branchlock.net::7za.exe, 00000000.00000002.6577553454.0000000003195000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        low
        No contacted IP infos
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1416890
        Start date and time:2024-03-28 08:39:55 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 12m 2s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:defaultwindowsfilecookbook.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Run name:Without Tracing
        Number of analysed new started processes analysed:25
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:Telexcopy.pdf.jar
        Detection:MAL
        Classification:mal64.expl.evad.winJAR@4/1@1/0
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .jar
        • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, backgroundTaskHost.exe, VSSVC.exe, svchost.exe, UsoClient.exe
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, self.events.data.microsoft.com, ctldl.windowsupdate.com, settings-win.data.microsoft.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
        • Execution Graph export aborted for target java.exe, PID 5904 because there are no executed function
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtCreateFile calls found.
        No simulations
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        s3-r-w.eu-north-1.amazonaws.comhttps://s3.ap-southeast-2.amazonaws.com/cdn.fxdms.com/Telexcopy.pdf.jarGet hashmaliciousUnknownBrowse
        • 16.12.10.14
        https://addfgnghs.s3.eu-north-1.amazonaws.com/sdgfhgfngf.html#5RgJgg6963nnzQ481icokmdzagi1694ZQXPOYVNTHSMYKI84555/734049z12Get hashmaliciousPhisherBrowse
        • 52.95.170.40
        https://zuluwarriors.s3.eu-north-1.amazonaws.com/control_kpi.html?login=facture@chirec.be&pcnt=3&request_type=preload&no_redrct=no_redrctGet hashmaliciousHTMLPhisherBrowse
        • 16.12.9.22
        http://www.ne16.com/t/45507011/1604841578/98644976/1/1004740/?308eb2e4=dmlqYXkucGFuYXRpQHByb2JhdGlvbi5sYWNvdW50eS5nb3Y&f5d63f87=YXNob3c&x=935af066Get hashmaliciousUnknownBrowse
        • 52.95.171.52
        http://www.ne16.com/t/45508538/1604923381/98644976/2/1004740/?308eb2e4=amF5ZV9raXNzbGVyQHR4d2QudXNjb3VydHMuZ292&f5d63f87=YXNob3ctY29weQ&x=69db96f8Get hashmaliciousHTMLPhisherBrowse
        • 52.95.171.40
        http://delta-gamma-alpha.s3.eu-north-1.amazonaws.comGet hashmaliciousUnknownBrowse
        • 52.95.169.76
        https://link.edgepilot.com/s/fdf3ea04/5A6qljZdl0OcsBMrMgVR1g?u=https://www.youtube.com/attribution_link?c=coachblog-ytm-acq-int-blog-txt-coach%26u=https%253A%252F%252Fmiansudiasdasdasduu.s3.eu-north-1.amazonaws.com%252Fxl.html%253Fid%253Dcom.google.android.apps.youtube.musicGet hashmaliciousUnknownBrowse
        • 52.95.169.16
        No context
        No context
        No context
        Process:C:\Windows\System32\7za.exe
        File Type:ASCII text
        Category:dropped
        Size (bytes):58
        Entropy (8bit):4.295408745419112
        Encrypted:false
        SSDEEP:3:ZLCAWIzBEnbjMGDmJEu14:1KItUbjH6Je
        MD5:157DBA0F5431A21AC2EF8C2C915B137A
        SHA1:6F58240EE2B2750A8BAD8BD98F791A90F536D82A
        SHA-256:EAD1F504881AF4188ED86C0AE26DE22FD3AB202ECC9A1642DE1DC970D0C1857E
        SHA-512:A11BE40C902A6BE9D5D0E46C31EDA26BAAB50C2E701BAC993DF115A5377CE09340F60C3EA3865E2914A878231773576F3A19E769F002A0ED7C664687007EE14A
        Malicious:false
        Reputation:low
        Preview:Manifest-Version: 1.0.Main-Class: services.Class-Path: ...
        File type:Zip archive data, at least v2.0 to extract, compression method=deflate
        Entropy (8bit):4.1162050781100925
        TrID:
        • Java Archive (13504/1) 62.80%
        • ZIP compressed archive (8000/1) 37.20%
        File name:Telexcopy.pdf.jar
        File size:405'300 bytes
        MD5:81e621517a407ae36da0a767b960c88c
        SHA1:421f3489d10b803e2dd64d0b47ce619da2da448a
        SHA256:ca438598c383fab834c5e52369032e30c657f8f70cbb095f181ea7779d34bba1
        SHA512:cd0510723447c5ace63f4ec9eb1aa0aa7d9d56b70f08b16c92c71b9825351122e59c1b5173e1e7288f59a8d732be122e90be397521f80e71328d743ad172788c
        SSDEEP:192:WtZ3hAJtjmbwOqaI55LEOkOYiDiMkCjvDhvLlSIz3v4M3LwsUE+1MB7hikCOrPiH:cZ3hOOJvsEOWGWCjvSmwM7wsTvQMC
        TLSH:85843372E576E4C8FD49DCD2730CEE75698A5EAC47ABE02251201B7458418F9EEE0C8E
        File Content Preview:PK.........xzX................META-INF/MANIFEST.MFUT...h..f.....M..LK-...K-*....R0.3..M...u.I,..R(N-*.LN-...u..K2......PK..!...8...:...PK........I.zX................META-INF/e/V/D/u/n/a/M/r/Y/p/Q/U/N/A/I/T/f/E/i/K/P/m/w/q/J/z/v/b/s/k/t/d/H/C/h/Z/F/l/S/g/o
        Icon Hash:d08c8e8ea2868a54
        TimestampSource PortDest PortSource IPDest IP
        Mar 28, 2024 08:49:43.651784897 CET6542353192.168.2.71.1.1.1
        Mar 28, 2024 08:49:43.749649048 CET53654231.1.1.1192.168.2.7
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Mar 28, 2024 08:49:43.651784897 CET192.168.2.71.1.1.10xfbe2Standard query (0)mbycket45344.s3.eu-north-1.amazonaws.comA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Mar 28, 2024 08:49:43.749649048 CET1.1.1.1192.168.2.70xfbe2No error (0)mbycket45344.s3.eu-north-1.amazonaws.coms3-r-w.eu-north-1.amazonaws.comCNAME (Canonical name)IN (0x0001)false
        Mar 28, 2024 08:49:43.749649048 CET1.1.1.1192.168.2.70xfbe2No error (0)s3-r-w.eu-north-1.amazonaws.com3.5.218.56A (IP address)IN (0x0001)false
        Mar 28, 2024 08:49:43.749649048 CET1.1.1.1192.168.2.70xfbe2No error (0)s3-r-w.eu-north-1.amazonaws.com3.5.216.50A (IP address)IN (0x0001)false

        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:08:40:43
        Start date:28/03/2024
        Path:C:\Windows\System32\7za.exe
        Wow64 process (32bit):true
        Commandline:7za.exe x -y -oC:\jar "C:\Users\user\Desktop\Telexcopy.pdf.jar"
        Imagebase:0x5d0000
        File size:289'792 bytes
        MD5 hash:77E556CDFDC5C592F5C46DB4127C6F4C
        Has elevated privileges:false
        Has administrator privileges:false
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:1
        Start time:08:40:43
        Start date:28/03/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff75da10000
        File size:862'208 bytes
        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
        Has elevated privileges:false
        Has administrator privileges:false
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:23
        Start time:10:34:21
        Start date:28/03/2024
        Path:C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exe
        Wow64 process (32bit):true
        Commandline:java.exe -jar "C:\Users\user\Desktop\Telexcopy.pdf.jar" services
        Imagebase:0x5d0000
        File size:257'664 bytes
        MD5 hash:9DAA53BAB2ECB33DC0D9CA51552701FA
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:moderate
        Has exited:false

        Target ID:24
        Start time:10:34:21
        Start date:28/03/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff75da10000
        File size:862'208 bytes
        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:false

        No disassembly