d01aa424...7874 | VTI
Try VMRay Analyzer
VTI SCORE: 93/100
Target: win7_32_sp1 | java
Classification: Trojan

d01aa424c91a43c1f87e45da12437d7b4f52b0fa756799ec273bc1f942677874 (SHA256)

d01aa424c91a43c1f87e45da12437d7b4f52b0fa756799ec273bc1f942677874.jar

Java Archive

Created at 2018-02-24 20:28:00

Severity Category Operation Classification
4/5
File System Associated with malicious files Trojan
3/5
Anti Analysis Tries to detect the presence of antivirus software -
  • Tries to detect antivirus software via WMI query: "select * from antivirusproduct".
3/5
Anti Analysis Tries to detect firewall -
  • Tries to detect firewall via WMI query: "select * from firewallproduct".
2/5
Network Attempts to connect to unavailable TCP servers -
1/5
Network Performs DNS request -
1/5
Process Creates process with hidden window -
  • The process ""C:\Program Files\Java\jre7\bin\java.exe" -jar C:\Users\EEBsYm5\AppData\Local\Temp\_0.86996859035608224741331762670039370.class" starts with hidden window.
  • The process "cmd.exe /C cscript.exe C:\Users\EEBsYm5\AppData\Local\Temp\Retrive6349682593628295348.vbs" starts with hidden window.
  • The process "cmd.exe /C cscript.exe C:\Users\EEBsYm5\AppData\Local\Temp\Retrive2551337130529148691.vbs" starts with hidden window.
  • The process "cmd.exe /C cscript.exe C:\Users\EEBsYm5\AppData\Local\Temp\Retrive5365638019239783154.vbs" starts with hidden window.
  • The process "cmd.exe /C cscript.exe C:\Users\EEBsYm5\AppData\Local\Temp\Retrive2742094931696724792.vbs" starts with hidden window.
  • The process "xcopy "C:\Program Files\Java\jre7" "C:\Users\EEBsYm5\AppData\Roaming\Oracle\" /e" starts with hidden window.
  • The process "reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v eUOfVMeBSPH /t REG_EXPAND_SZ /d "\"C:\Users\EEBsYm5\AppData\Roaming\Oracle\bin\javaw.exe\" -jar \"C:\Users\EEBsYm5\PKcVbKSqerl\ZpEbztPLUfw.BnNKgj\"" /f" starts with hidden window.
  • The process "attrib +h "C:\Users\EEBsYm5\PKcVbKSqerl\*.*"" starts with hidden window.
  • The process "attrib +h "C:\Users\EEBsYm5\PKcVbKSqerl"" starts with hidden window.
  • The process "C:\Users\EEBsYm5\AppData\Roaming\Oracle\bin\javaw.exe -jar C:\Users\EEBsYm5\PKcVbKSqerl\ZpEbztPLUfw.BnNKgj" starts with hidden window.
1/5
Anti Analysis Resolves APIs dynamically to possibly evade static detection -
1/5
File System Modifies operating system directory -
1/5
Persistence Installs system startup script or application -
  • Adds ""C:\Users\EEBsYm5\AppData\Roaming\Oracle\bin\javaw.exe" -jar "C:\Users\EEBsYm5\PKcVbKSqerl\ZpEbztPLUfw.BnNKgj"" to Windows startup via registry.
1/5
Process Creates system object -
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image