Loading ...

Play interactive tourEdit tour

Analysis Report UAE Contract Supply.jar

Overview

General Information

Sample Name:UAE Contract Supply.jar
Analysis ID:358324
MD5:d23d186daf02db3cecee462c5b1fe15c
SHA1:1b2054ff2c9a3ff13920f07905b7e313a75b77dc
SHA256:459787308dd55a6822b80ee2fd9d4add4e44602f783e8c984697a8918839ff22
Tags:jar
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Drops PE files to the user root directory
Exploit detected, runtime environment dropped PE file
Exploit detected, runtime environment starts unknown processes
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Yara detected VB6 Downloader Generic
Abnormal high CPU Usage
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops PE files to the user directory
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Sample execution stops while process was sleeping (likely an evasion)
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • cmd.exe (PID: 4864 cmdline: C:\Windows\system32\cmd.exe /c ''C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe' -javaagent:'C:\Users\user\AppData\Local\Temp\jartracer.jar' -jar 'C:\Users\user\Desktop\UAE Contract Supply.jar'' >> C:\cmdlinestart.log 2>&1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • conhost.exe (PID: 4012 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • java.exe (PID: 6084 cmdline: 'C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe' -javaagent:'C:\Users\user\AppData\Local\Temp\jartracer.jar' -jar 'C:\Users\user\Desktop\UAE Contract Supply.jar' MD5: 28733BA8C383E865338638DF5196E6FE)
      • icacls.exe (PID: 6196 cmdline: C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant 'everyone':(OI)(CI)M MD5: FF0D1D4317A44C951240FAE75075D501)
        • conhost.exe (PID: 6208 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • mx8043.exe (PID: 6240 cmdline: C:\Users\user\mx8043.exe MD5: 335AA2DB46F51A80F6BE08948B564026)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000002.247780398.0000000004D60000.00000004.00000001.sdmpLokiBot_Dropper_Packed_R11_Feb18Auto-generated rule - file scan copy.pdf.r11Florian Roth
  • 0x4fd8:$s1: C:\Program Files (x86)\Microsoft Visual Studio\VB98\VB6.OLB
Process Memory Space: mx8043.exe PID: 6240JoeSecurity_VB6DownloaderGenericYara detected VB6 Downloader GenericJoe Security
    Process Memory Space: mx8043.exe PID: 6240JoeSecurity_GuLoaderYara detected GuLoaderJoe Security

      Sigma Overview

      No Sigma rule has matched

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Multi AV Scanner detection for dropped fileShow sources
      Source: C:\Users\user\mx8043.exeReversingLabs: Detection: 17%
      Multi AV Scanner detection for submitted fileShow sources
      Source: UAE Contract Supply.jarVirustotal: Detection: 19%Perma Link
      Source: UAE Contract Supply.jarReversingLabs: Detection: 32%
      Source: 2.2.java.exe.4d604e4.0.unpackAvira: Label: TR/Dropper.Gen

      Compliance:

      barindex
      Uses new MSVCR DllsShow sources
      Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll

      Software Vulnerabilities:

      barindex
      Exploit detected, runtime environment starts unknown processesShow sources
      Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeProcess created: C:\Users\user\mx8043.exe
      Source: java.exe, 00000002.00000002.249049473.000000000A1C6000.00000004.00000001.sdmpString found in binary or memory: http://bugreport.sun.com/bugreport/
      Source: java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html
      Source: java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html0
      Source: java.exe, 00000002.00000002.248954130.0000000005113000.00000004.00000001.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.htmlK#O
      Source: java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl
      Source: java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl0
      Source: java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmp, java.exe, 00000002.00000002.248736888.000000000504D000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl
      Source: java.exe, 00000002.00000002.252951545.0000000015810000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
      Source: java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl
      Source: java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
      Source: java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl
      Source: java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl0
      Source: java.exe, 00000002.00000002.248954130.0000000005113000.00000004.00000001.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl3
      Source: java.exe, 00000002.00000002.248954130.0000000005113000.00000004.00000001.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crlC/O
      Source: java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl
      Source: java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl0
      Source: java.exe, 00000002.00000002.249073461.000000000A1D6000.00000004.00000001.sdmpString found in binary or memory: http://java.oracle.com/
      Source: java.exe, 00000002.00000003.239994256.0000000015109000.00000004.00000001.sdmp, java.exe, 00000002.00000002.252839548.0000000015712000.00000004.00000001.sdmp, java.exe, 00000002.00000002.249357252.000000000A3B4000.00000004.00000001.sdmpString found in binary or memory: http://null.oracle.com/
      Source: java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpString found in binary or memory: http://policy.camerfirma.com
      Source: java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpString found in binary or memory: http://policy.camerfirma.com0
      Source: java.exe, 00000002.00000002.248954130.0000000005113000.00000004.00000001.sdmpString found in binary or memory: http://policy.camerfirma.com3
      Source: java.exe, 00000002.00000002.248736888.000000000504D000.00000004.00000001.sdmpString found in binary or memory: http://policy.camerfirma.com3LT
      Source: java.exe, 00000002.00000002.248736888.000000000504D000.00000004.00000001.sdmpString found in binary or memory: http://policy.camerfirma.comk
      Source: java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpString found in binary or memory: http://repository.swisssign.com/
      Source: java.exe, 00000002.00000002.248736888.000000000504D000.00000004.00000001.sdmpString found in binary or memory: http://repository.swisssign.com/#
      Source: java.exe, 00000002.00000002.252951545.0000000015810000.00000004.00000001.sdmpString found in binary or memory: http://repository.swisssign.com/0
      Source: java.exe, 00000002.00000002.248736888.000000000504D000.00000004.00000001.sdmpString found in binary or memory: http://repository.swisssign.com/CJT
      Source: java.exe, 00000002.00000002.248736888.000000000504D000.00000004.00000001.sdmpString found in binary or memory: http://repository.swisssign.com/S$Q
      Source: java.exe, 00000002.00000002.248736888.000000000504D000.00000004.00000001.sdmpString found in binary or memory: http://repository.swisssign.com/kKT
      Source: java.exe, 00000002.00000002.248954130.0000000005113000.00000004.00000001.sdmpString found in binary or memory: http://repository.swisssign.com/s
      Source: java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpString found in binary or memory: http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl
      Source: java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpString found in binary or memory: http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0
      Source: java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpString found in binary or memory: http://www.certplus.com/CRL/class2.crl
      Source: java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpString found in binary or memory: http://www.certplus.com/CRL/class2.crl0
      Source: java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmp, java.exe, 00000002.00000002.248736888.000000000504D000.00000004.00000001.sdmpString found in binary or memory: http://www.certplus.com/CRL/class3P.crl
      Source: java.exe, 00000002.00000002.252951545.0000000015810000.00000004.00000001.sdmpString found in binary or memory: http://www.certplus.com/CRL/class3P.crl0
      Source: java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpString found in binary or memory: http://www.chambersign.org
      Source: java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpString found in binary or memory: http://www.chambersign.org1
      Source: java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmp, java.exe, 00000002.00000002.248736888.000000000504D000.00000004.00000001.sdmpString found in binary or memory: http://www.quovadis.bm
      Source: java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpString found in binary or memory: http://www.quovadis.bm0
      Source: java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps
      Source: java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps0
      Source: java.exe, 00000002.00000002.248736888.000000000504D000.00000004.00000001.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps3
      Source: java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com
      Source: java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 00000002.00000002.247780398.0000000004D60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Auto-generated rule - file scan copy.pdf.r11 Author: Florian Roth
      Source: C:\Users\user\mx8043.exeProcess Stats: CPU usage > 98%
      Source: C:\Users\user\mx8043.exeCode function: 5_2_00401348
      Source: C:\Users\user\mx8043.exeCode function: 5_2_0040D3A3
      Source: C:\Users\user\mx8043.exeCode function: 5_2_00401384
      Source: mx8043.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: 00000002.00000002.247780398.0000000004D60000.00000004.00000001.sdmp, type: MEMORYMatched rule: LokiBot_Dropper_Packed_R11_Feb18 date = 2018-02-14, hash1 = 3b248d40fd7acb839cc592def1ed7652734e0e5ef93368be3c36c042883a3029, author = Florian Roth, description = Auto-generated rule - file scan copy.pdf.r11, reference = https://app.any.run/tasks/401df4d9-098b-4fd0-86e0-7a52ce6ddbf5, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: classification engineClassification label: mal100.troj.expl.evad.winJAR@9/3@0/0
      Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeFile created: C:\Users\user\mx8043.exeJump to behavior
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6208:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4012:120:WilError_01
      Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeFile created: C:\Users\user\AppData\Local\Temp\hsperfdata_userJump to behavior
      Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeSection loaded: C:\Program Files (x86)\Java\jre1.8.0_211\bin\client\jvm.dll
      Source: C:\Users\user\mx8043.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
      Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: UAE Contract Supply.jarVirustotal: Detection: 19%
      Source: UAE Contract Supply.jarReversingLabs: Detection: 32%
      Source: java.exeString found in binary or memory: %z.in-addr.arpa
      Source: java.exeString found in binary or memory: sun/launcher/
      Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ''C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe' -javaagent:'C:\Users\user\AppData\Local\Temp\jartracer.jar' -jar 'C:\Users\user\Desktop\UAE Contract Supply.jar'' >> C:\cmdlinestart.log 2>&1
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe 'C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe' -javaagent:'C:\Users\user\AppData\Local\Temp\jartracer.jar' -jar 'C:\Users\user\Desktop\UAE Contract Supply.jar'
      Source: unknownProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant 'everyone':(OI)(CI)M
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Users\user\mx8043.exe C:\Users\user\mx8043.exe
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe 'C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe' -javaagent:'C:\Users\user\AppData\Local\Temp\jartracer.jar' -jar 'C:\Users\user\Desktop\UAE Contract Supply.jar'
      Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant 'everyone':(OI)(CI)M
      Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeProcess created: C:\Users\user\mx8043.exe C:\Users\user\mx8043.exe
      Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll

      Data Obfuscation:

      barindex
      Yara detected GuLoaderShow sources
      Source: Yara matchFile source: Process Memory Space: mx8043.exe PID: 6240, type: MEMORY
      Yara detected VB6 Downloader GenericShow sources
      Source: Yara matchFile source: Process Memory Space: mx8043.exe PID: 6240, type: MEMORY
      Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeCode function: 2_3_1520B68C push eax; ret
      Source: C:\Users\user\mx8043.exeCode function: 5_2_004075CB push esi; ret
      Source: C:\Users\user\mx8043.exeCode function: 5_2_0040A9A9 push 3846BF64h; retf
      Source: C:\Users\user\mx8043.exeCode function: 5_2_02196C5A push esp; retf

      Persistence and Installation Behavior:

      barindex
      Exploit detected, runtime environment dropped PE fileShow sources
      Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeFile created: mx8043.exe.2.drJump to dropped file
      Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeFile created: C:\Users\user\mx8043.exeJump to dropped file
      Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeFile created: C:\Users\user\mx8043.exeJump to dropped file

      Boot Survival:

      barindex
      Drops PE files to the user root directoryShow sources
      Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeFile created: C:\Users\user\mx8043.exeJump to dropped file
      Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
      Source: unknownProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant 'everyone':(OI)(CI)M
      Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\mx8043.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\mx8043.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\mx8043.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\mx8043.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\mx8043.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion:

      barindex
      Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
      Source: C:\Users\user\mx8043.exeCode function: 5_2_0219186D
      Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
      Source: C:\Users\user\mx8043.exeRDTSC instruction interceptor: First address: 00000000021956EB second address: 00000000021956EB instructions:
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: mx8043.exe, 00000005.00000002.490396907.0000000002190000.00000040.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE8
      Source: mx8043.exeBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
      Tries to detect virtualization through RDTSC time measurementsShow sources
      Source: C:\Users\user\mx8043.exeRDTSC instruction interceptor: First address: 00000000021956EB second address: 00000000021956EB instructions:
      Source: C:\Users\user\mx8043.exeRDTSC instruction interceptor: First address: 00000000021953F5 second address: 00000000021953F5 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007FE2F4D10D8Ch 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d cmp ax, cx 0x00000020 cmp ch, ah 0x00000022 add edi, edx 0x00000024 dec dword ptr [ebp+000000F8h] 0x0000002a cmp dword ptr [ebp+000000F8h], 00000000h 0x00000031 jne 00007FE2F4D10D41h 0x00000033 cmp edi, 62D4476Ah 0x00000039 call 00007FE2F4D10DAEh 0x0000003e call 00007FE2F4D10D9Ch 0x00000043 lfence 0x00000046 mov edx, dword ptr [7FFE0014h] 0x0000004c lfence 0x0000004f ret 0x00000050 mov esi, edx 0x00000052 pushad 0x00000053 rdtsc
      Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: C:\Users\user\mx8043.exeCode function: 5_2_02191E08 rdtsc
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: mx8043.exe, 00000005.00000002.490396907.0000000002190000.00000040.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe8
      Source: java.exe, 00000002.00000002.251220154.0000000015340000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
      Source: java.exe, 00000002.00000002.246340230.0000000002970000.00000004.00000001.sdmpBinary or memory string: ,java/lang/VirtualMachineError
      Source: java.exe, 00000002.00000002.246340230.0000000002970000.00000004.00000001.sdmpBinary or memory string: |[Ljava/lang/VirtualMachineError;
      Source: java.exe, 00000002.00000002.251220154.0000000015340000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
      Source: java.exe, 00000002.00000002.251220154.0000000015340000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
      Source: mx8043.exeBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
      Source: java.exe, 00000002.00000002.251220154.0000000015340000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
      Source: C:\Users\user\mx8043.exeCode function: 5_2_02191E08 rdtsc
      Source: C:\Users\user\mx8043.exeCode function: 5_2_02195A2E mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\mx8043.exeCode function: 5_2_02195A4C mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\mx8043.exeCode function: 5_2_02191FF6 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\mx8043.exeCode function: 5_2_02192054 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\mx8043.exeCode function: 5_2_0219186D mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\mx8043.exeCode function: 5_2_02194CD7 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\mx8043.exeCode function: 5_2_02195106 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\mx8043.exeCode function: 5_2_02192D66 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\mx8043.exeCode function: 5_2_02191DB8 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\mx8043.exeCode function: 5_2_02191DB6 mov eax, dword ptr fs:[00000030h]
      Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeMemory protected: page read and write | page guard
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe 'C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe' -javaagent:'C:\Users\user\AppData\Local\Temp\jartracer.jar' -jar 'C:\Users\user\Desktop\UAE Contract Supply.jar'
      Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant 'everyone':(OI)(CI)M
      Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeProcess created: C:\Users\user\mx8043.exe C:\Users\user\mx8043.exe
      Source: mx8043.exe, 00000005.00000002.489393009.0000000000C70000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: mx8043.exe, 00000005.00000002.489393009.0000000000C70000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: mx8043.exe, 00000005.00000002.489393009.0000000000C70000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
      Source: mx8043.exe, 00000005.00000002.489393009.0000000000C70000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
      Source: mx8043.exe, 00000005.00000002.489393009.0000000000C70000.00000002.00000001.sdmpBinary or memory string: Progmanlock

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsCommand and Scripting Interpreter2Services File Permissions Weakness1Process Injection12Masquerading111OS Credential DumpingQuery Registry1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsExploitation for Client Execution2Boot or Logon Initialization ScriptsServices File Permissions Weakness1Virtualization/Sandbox Evasion1LSASS MemorySecurity Software Discovery521Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection12NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonServices File Permissions Weakness1Cached Domain CredentialsSystem Information Discovery31VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing1DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      UAE Contract Supply.jar20%VirustotalBrowse
      UAE Contract Supply.jar33%ReversingLabsByteCode-JAVA.Trojan.AdWind

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Users\user\mx8043.exe17%ReversingLabsWin32.Trojan.Vebzenpak

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      2.2.java.exe.4d604e4.0.unpack100%AviraTR/Dropper.GenDownload File

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      http://crl.xrampsecurity.com/XGCA.crl0%URL Reputationsafe
      http://crl.xrampsecurity.com/XGCA.crl0%URL Reputationsafe
      http://crl.xrampsecurity.com/XGCA.crl0%URL Reputationsafe
      http://crl.xrampsecurity.com/XGCA.crl0%URL Reputationsafe
      http://crl.chambersign.org/chambersroot.crl00%URL Reputationsafe
      http://crl.chambersign.org/chambersroot.crl00%URL Reputationsafe
      http://crl.chambersign.org/chambersroot.crl00%URL Reputationsafe
      http://crl.chambersign.org/chambersroot.crl00%URL Reputationsafe
      http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl00%URL Reputationsafe
      http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl00%URL Reputationsafe
      http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl00%URL Reputationsafe
      http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl00%URL Reputationsafe
      http://www.certplus.com/CRL/class2.crl0%URL Reputationsafe
      http://www.certplus.com/CRL/class2.crl0%URL Reputationsafe
      http://www.certplus.com/CRL/class2.crl0%URL Reputationsafe
      http://www.certplus.com/CRL/class2.crl0%URL Reputationsafe
      http://policy.camerfirma.com3LT0%Avira URL Cloudsafe
      http://bugreport.sun.com/bugreport/0%Avira URL Cloudsafe
      http://cps.chambersign.org/cps/chambersroot.html00%URL Reputationsafe
      http://cps.chambersign.org/cps/chambersroot.html00%URL Reputationsafe
      http://cps.chambersign.org/cps/chambersroot.html00%URL Reputationsafe
      http://www.chambersign.org10%URL Reputationsafe
      http://www.chambersign.org10%URL Reputationsafe
      http://www.chambersign.org10%URL Reputationsafe
      https://ocsp.quovadisoffshore.com0%URL Reputationsafe
      https://ocsp.quovadisoffshore.com0%URL Reputationsafe
      https://ocsp.quovadisoffshore.com0%URL Reputationsafe
      http://crl.securetrust.com/STCA.crl00%URL Reputationsafe
      http://crl.securetrust.com/STCA.crl00%URL Reputationsafe
      http://crl.securetrust.com/STCA.crl00%URL Reputationsafe
      http://cps.chambersign.org/cps/chambersroot.html0%URL Reputationsafe
      http://cps.chambersign.org/cps/chambersroot.html0%URL Reputationsafe
      http://cps.chambersign.org/cps/chambersroot.html0%URL Reputationsafe
      http://www.certplus.com/CRL/class3P.crl0%URL Reputationsafe
      http://www.certplus.com/CRL/class3P.crl0%URL Reputationsafe
      http://www.certplus.com/CRL/class3P.crl0%URL Reputationsafe
      http://crl.securetrust.com/STCA.crl30%Avira URL Cloudsafe
      http://www.certplus.com/CRL/class3P.crl00%URL Reputationsafe
      http://www.certplus.com/CRL/class3P.crl00%URL Reputationsafe
      http://www.certplus.com/CRL/class3P.crl00%URL Reputationsafe
      http://crl.securetrust.com/STCA.crl0%URL Reputationsafe
      http://crl.securetrust.com/STCA.crl0%URL Reputationsafe
      http://crl.securetrust.com/STCA.crl0%URL Reputationsafe
      http://www.certplus.com/CRL/class2.crl00%URL Reputationsafe
      http://www.certplus.com/CRL/class2.crl00%URL Reputationsafe
      http://www.certplus.com/CRL/class2.crl00%URL Reputationsafe
      http://crl.xrampsecurity.com/XGCA.crl00%URL Reputationsafe
      http://crl.xrampsecurity.com/XGCA.crl00%URL Reputationsafe
      http://crl.xrampsecurity.com/XGCA.crl00%URL Reputationsafe
      http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0%URL Reputationsafe
      http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0%URL Reputationsafe
      http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0%URL Reputationsafe
      http://cps.chambersign.org/cps/chambersroot.htmlK#O0%Avira URL Cloudsafe
      http://www.quovadis.bm0%URL Reputationsafe
      http://www.quovadis.bm0%URL Reputationsafe
      http://www.quovadis.bm0%URL Reputationsafe
      http://www.quovadis.bm00%URL Reputationsafe
      http://www.quovadis.bm00%URL Reputationsafe
      http://www.quovadis.bm00%URL Reputationsafe
      http://policy.camerfirma.comk0%Avira URL Cloudsafe
      https://ocsp.quovadisoffshore.com00%URL Reputationsafe
      https://ocsp.quovadisoffshore.com00%URL Reputationsafe
      https://ocsp.quovadisoffshore.com00%URL Reputationsafe
      http://crl.securetrust.com/STCA.crlC/O0%Avira URL Cloudsafe
      http://crl.chambersign.org/chambersroot.crl0%URL Reputationsafe
      http://crl.chambersign.org/chambersroot.crl0%URL Reputationsafe
      http://crl.chambersign.org/chambersroot.crl0%URL Reputationsafe
      http://policy.camerfirma.com30%Avira URL Cloudsafe
      http://www.chambersign.org0%URL Reputationsafe
      http://www.chambersign.org0%URL Reputationsafe
      http://www.chambersign.org0%URL Reputationsafe
      http://policy.camerfirma.com00%URL Reputationsafe
      http://policy.camerfirma.com00%URL Reputationsafe
      http://policy.camerfirma.com00%URL Reputationsafe

      Domains and IPs

      Contacted Domains

      No contacted domains info

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://crl.xrampsecurity.com/XGCA.crljava.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://crl.chambersign.org/chambersroot.crl0java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://www.certplus.com/CRL/class2.crljava.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://policy.camerfirma.com3LTjava.exe, 00000002.00000002.248736888.000000000504D000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://bugreport.sun.com/bugreport/java.exe, 00000002.00000002.249049473.000000000A1C6000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://cps.chambersign.org/cps/chambersroot.html0java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://repository.swisssign.com/CJTjava.exe, 00000002.00000002.248736888.000000000504D000.00000004.00000001.sdmpfalse
        high
        http://java.oracle.com/java.exe, 00000002.00000002.249073461.000000000A1D6000.00000004.00000001.sdmpfalse
          high
          http://null.oracle.com/java.exe, 00000002.00000003.239994256.0000000015109000.00000004.00000001.sdmp, java.exe, 00000002.00000002.252839548.0000000015712000.00000004.00000001.sdmp, java.exe, 00000002.00000002.249357252.000000000A3B4000.00000004.00000001.sdmpfalse
            high
            http://www.chambersign.org1java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://repository.swisssign.com/0java.exe, 00000002.00000002.252951545.0000000015810000.00000004.00000001.sdmpfalse
              high
              http://policy.camerfirma.comjava.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpfalse
                high
                http://repository.swisssign.com/sjava.exe, 00000002.00000002.248954130.0000000005113000.00000004.00000001.sdmpfalse
                  high
                  http://repository.swisssign.com/kKTjava.exe, 00000002.00000002.248736888.000000000504D000.00000004.00000001.sdmpfalse
                    high
                    https://ocsp.quovadisoffshore.comjava.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://crl.securetrust.com/STCA.crl0java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.quovadisglobal.com/cpsjava.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpfalse
                      high
                      http://cps.chambersign.org/cps/chambersroot.htmljava.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.certplus.com/CRL/class3P.crljava.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmp, java.exe, 00000002.00000002.248736888.000000000504D000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://crl.securetrust.com/STCA.crl3java.exe, 00000002.00000002.248954130.0000000005113000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.certplus.com/CRL/class3P.crl0java.exe, 00000002.00000002.252951545.0000000015810000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://crl.securetrust.com/STCA.crljava.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://repository.swisssign.com/#java.exe, 00000002.00000002.248736888.000000000504D000.00000004.00000001.sdmpfalse
                        high
                        http://www.certplus.com/CRL/class2.crl0java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.quovadisglobal.com/cps0java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpfalse
                          high
                          http://crl.xrampsecurity.com/XGCA.crl0java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crljava.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.quovadisglobal.com/cps3java.exe, 00000002.00000002.248736888.000000000504D000.00000004.00000001.sdmpfalse
                            high
                            http://cps.chambersign.org/cps/chambersroot.htmlK#Ojava.exe, 00000002.00000002.248954130.0000000005113000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.quovadis.bmjava.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmp, java.exe, 00000002.00000002.248736888.000000000504D000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.quovadis.bm0java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://policy.camerfirma.comkjava.exe, 00000002.00000002.248736888.000000000504D000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://ocsp.quovadisoffshore.com0java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://crl.securetrust.com/STCA.crlC/Ojava.exe, 00000002.00000002.248954130.0000000005113000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://repository.swisssign.com/S$Qjava.exe, 00000002.00000002.248736888.000000000504D000.00000004.00000001.sdmpfalse
                              high
                              http://crl.chambersign.org/chambersroot.crljava.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://policy.camerfirma.com3java.exe, 00000002.00000002.248954130.0000000005113000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://repository.swisssign.com/java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpfalse
                                high
                                http://www.chambersign.orgjava.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://policy.camerfirma.com0java.exe, 00000002.00000002.249513940.000000000A46E000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown

                                Contacted IPs

                                No contacted IP infos

                                General Information

                                Joe Sandbox Version:31.0.0 Emerald
                                Analysis ID:358324
                                Start date:25.02.2021
                                Start time:12:13:35
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 7m 31s
                                Hypervisor based Inspection enabled:false
                                Report type:light
                                Sample file name:UAE Contract Supply.jar
                                Cookbook file name:defaultwindowsfilecookbook.jbs
                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                Number of analysed new started processes analysed:26
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • GSI enabled (Java)
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal100.troj.expl.evad.winJAR@9/3@0/0
                                EGA Information:Failed
                                HDC Information:
                                • Successful, ratio: 32.2% (good quality ratio 24.4%)
                                • Quality average: 47.6%
                                • Quality standard deviation: 31.4%
                                HCA Information:Failed
                                Cookbook Comments:
                                • Adjust boot time
                                • Enable AMSI
                                • Found application associated with file extension: .jar
                                Warnings:
                                Show All
                                • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, Microsoft.Photos.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, ApplicationFrameHost.exe, svchost.exe
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • Report size getting too big, too many NtSetInformationFile calls found.

                                Simulations

                                Behavior and APIs

                                No simulations

                                Joe Sandbox View / Context

                                IPs

                                No context

                                Domains

                                No context

                                ASN

                                No context

                                JA3 Fingerprints

                                No context

                                Dropped Files

                                No context

                                Created / dropped Files

                                C:\ProgramData\Oracle\Java\.oracle_jre_usage\cce3fe3b0d8d83e2.timestamp
                                Process:C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):57
                                Entropy (8bit):4.847995882806536
                                Encrypted:false
                                SSDEEP:3:oFj4I5vpN6yUYUXOvn:oJ5X6y8XAn
                                MD5:9B416AAFCA54628313A96E06881D3711
                                SHA1:238B699D6C8B2FBB15B558A28EBAE1B83B192A0C
                                SHA-256:ACE4B289380CAB58D2A29A98EE8032AD628F1004C493E269FCDA38AF115CC62C
                                SHA-512:711FA7481C975EA0A7049AE1C4E45D9B052F09447878580B0DFC6AF638494B41B5FE7B2576B6EBA2F32782F59A50866E0885040498586D7D9B15ABD4152E4FF2
                                Malicious:false
                                Reputation:low
                                Preview: C:\Program Files (x86)\Java\jre1.8.0_211..1614284065233..
                                C:\Users\user\LT2pdIK.png
                                Process:C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe
                                File Type:PNG image data, 190 x 216, 8-bit/color RGBA, non-interlaced
                                Category:dropped
                                Size (bytes):68600
                                Entropy (8bit):7.9810935688737725
                                Encrypted:false
                                SSDEEP:1536:VxaDM0hvN4cro9ToaHymKnenubWp71Az/AJ0:CD914cr+o9qBjAz/AC
                                MD5:79E0DAD14E7C20A777E72FC023B59252
                                SHA1:50F959BAB2FF58E44DBA17EF85375EC7EBD66924
                                SHA-256:A089D9AD3875FFA321D2DFD38661992721EFF5E0ACF36D76A7A5C8FE054B7992
                                SHA-512:39F4EF3E670C40314F0364CEC370EAF9B19BC44A693BB47C669517059D220A2D41F8622850D7F969CE4FAB1CF6A7D39ADCF9F41637AF1335702A14750D7EBC24
                                Malicious:false
                                Reputation:low
                                Preview: .PNG........IHDR.............U.Y.....sRGB.........gAMA......a.....pHYs..........+......IDATx^|.i.&K...=.Y.Y.v....=.....A..I..)...@.....C.f'@.?C}.....@.$..d F.H.ER.+Rf ...1.}..oY.U......{{F.gDx..?..............=y.{..dwrz...'_.|.l........G.7..w...........RNw.v.r.....9;{.{.....a.....}...\:h.@.e...%.Ey.r......i..Kk.6.T.R..{..r5..s|)....b..\k.....i.Hd.t)..x.Sn.U.uK..M.)Wxi.m9P..<x..i;|QFqE../..l..`....{..r|.{..ux../_=..}.{........Y./.....;.|P..ys..r.(...^.|.......{}z...gl.....R....Rn...ge...<.&.`w..C9P.g.y.f.../_.......li..NOOJ...~.v..i..+W.......a.........k.C......`s.........x......rxew|t.;........a....K)$..8...X..A.R...l...4u.d..)d..D./..qA4e......A ....BQb.........L..e.f.....F..~...W..C...(.R..-?{t...H.0.y...ul..0$...>ma.(>*...s.(.[.F.ay....a..+G...8...I....B..H[.i.P.....S..u.'0..).r.........A...y...F.i.....RD.)....K:|....=........ .....d.....<I.>.y.fw..4J}Vc}.'y..wQ.wo.4O.Oj;..0.\.s=..^..E.........C.u......".....4<...W.w.GWw.W.
                                C:\Users\user\mx8043.exe
                                Process:C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):299008
                                Entropy (8bit):5.515398750036674
                                Encrypted:false
                                SSDEEP:6144:PPfEI/UKHsSDjuHl9IfNpmhb5mFCQcGN:Xf5sSuMfNQJ5mFvcy
                                MD5:335AA2DB46F51A80F6BE08948B564026
                                SHA1:848D5909A84BACA2255C932C61EF58A34072AFDA
                                SHA-256:92B87477B4589030A4D6E94B07CDEFA4712426FCCEC7FDFEEBE0EC4BDC358048
                                SHA-512:C7F7168B7F4DAA87B874E2EC6B45C7196BF24710C961FF5B33C37205DC074D6F5653A455D437C9B1A16CDD7ED83D0A16D8684E080591DF8F7F778EF969961CDC
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 17%
                                Reputation:low
                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......7b..s...s...s.......r...<!..v...E%..r...Richs...........................PE..L...[.S.................0...`......H........@....@.........................................................................T9..<....`...7..................................................................8...0....................................text...d-.......0.................. ..`.data........@.......@..............@....rsrc....7...`...@...P..............@..@8|.\.......I#...........USER32.DLL.MSVBVM60.DLL.................................................................................................................................................................................................................................................................................................................................................................................................

                                Static File Info

                                General

                                File type:Zip archive data, at least v2.0 to extract
                                Entropy (8bit):7.998905736237949
                                TrID:
                                • Java Archive (13504/1) 62.80%
                                • ZIP compressed archive (8000/1) 37.20%
                                File name:UAE Contract Supply.jar
                                File size:312777
                                MD5:d23d186daf02db3cecee462c5b1fe15c
                                SHA1:1b2054ff2c9a3ff13920f07905b7e313a75b77dc
                                SHA256:459787308dd55a6822b80ee2fd9d4add4e44602f783e8c984697a8918839ff22
                                SHA512:ad01ec9e3a41b5258d80fe8cd5b513cf379ac4dce5f57274379dc1ef893379c83062da7f24780b1844dd2d8c07f370025eaed47eec20264ce4ded822aca089e2
                                SSDEEP:6144:qZifZoLlSASY5iE0XtGlX47i+Co7TmbB6PP+alppne5VTzSo:akZoxSI0E0wCe63+alppneT2o
                                File Content Preview:PK........D0XR................META-INF/..PK..............PK........D0XR................META-INF/MANIFEST.MFM.1..0...@....!..R...Rj.PJ..4..H.....7vi..........^.......(.,7.I>`...,.ct..t...(...F.s.OD...i.v...n..}8....q.W.}..=D..uu.eP.2.KaVZCK.R....}.y.Z/..MJ

                                File Icon

                                Icon Hash:d28c8e8ea2868ad6

                                Network Behavior

                                No network behavior found

                                Code Manipulations

                                Statistics

                                Behavior

                                Click to jump to process

                                System Behavior

                                General

                                Start time:12:14:22
                                Start date:25/02/2021
                                Path:C:\Windows\SysWOW64\cmd.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\system32\cmd.exe /c ''C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe' -javaagent:'C:\Users\user\AppData\Local\Temp\jartracer.jar' -jar 'C:\Users\user\Desktop\UAE Contract Supply.jar'' >> C:\cmdlinestart.log 2>&1
                                Imagebase:0x150000
                                File size:232960 bytes
                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:12:14:22
                                Start date:25/02/2021
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7ecfc0000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:12:14:23
                                Start date:25/02/2021
                                Path:C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe' -javaagent:'C:\Users\user\AppData\Local\Temp\jartracer.jar' -jar 'C:\Users\user\Desktop\UAE Contract Supply.jar'
                                Imagebase:0x9c0000
                                File size:192376 bytes
                                MD5 hash:28733BA8C383E865338638DF5196E6FE
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:Java
                                Yara matches:
                                • Rule: LokiBot_Dropper_Packed_R11_Feb18, Description: Auto-generated rule - file scan copy.pdf.r11, Source: 00000002.00000002.247780398.0000000004D60000.00000004.00000001.sdmp, Author: Florian Roth
                                Reputation:moderate

                                General

                                Start time:12:14:25
                                Start date:25/02/2021
                                Path:C:\Windows\SysWOW64\icacls.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant 'everyone':(OI)(CI)M
                                Imagebase:0xb70000
                                File size:29696 bytes
                                MD5 hash:FF0D1D4317A44C951240FAE75075D501
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:12:14:25
                                Start date:25/02/2021
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7ecfc0000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:12:14:27
                                Start date:25/02/2021
                                Path:C:\Users\user\mx8043.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\mx8043.exe
                                Imagebase:0x400000
                                File size:299008 bytes
                                MD5 hash:335AA2DB46F51A80F6BE08948B564026
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:Visual Basic
                                Antivirus matches:
                                • Detection: 17%, ReversingLabs
                                Reputation:low

                                Disassembly

                                Code Analysis

                                Reset < >