Malware Uses JAR | VTI by Score
Try VMRay Analyzer
VTI Information
VTI Score
94 / 100
VTI Database Version2.3
VTI Rule Match Count32
VTI Rule TypeDefault (PE, ...)
Detected Threats
ArrowBrowserChange security related browser settings
Disable signature check for executables downloaded by Microsoft Internet Explorer.
ArrowOSModfiy system security configuration
Disable UAC notification.
Disable Windows Security Center antivirus notification.
Disable Windows Security Center warning about disabled system updates.
ArrowOSDisable crucial system service
Disable "Windows Defender Service" by ChangeServiceConfigW.
ArrowInjectionWrite into memory of an other process
"c:\windows\system32\regsvr32.exe" modifies memory of "c:\windows\explorer.exe"
ArrowInjectionModify control flow of an other process
"c:\windows\system32\regsvr32.exe" creates thread in "c:\windows\explorer.exe"
ArrowNetworkPerform DNS request
Resolve "N3EErvtwsM".
Resolve "adom2.com.br".
Resolve "carvas32ltda.com".
Resolve "carva32ssa.com".
Resolve "bandeivacomercial.com".
Resolve "bandeivacomercio.com".
ArrowProcessCreate process with hidden window
The process "regsvr32.exe \s \"C:\Users\Public\N3Eg\N3Eg2.51N3E\" #96" starts with hidden window.
The process "cmd /k "C:\Users\Public\N3Eg\N3E.vbs"" starts with hidden window.
The process "sc" starts with hidden window.
The process "net" starts with hidden window.
The process "cmd" starts with hidden window.
ArrowAnti AnalysisDynamic API usage
Resolve more than 50 APIs.
ArrowProcessAllocate a page with write and execute permissions
Allocate a page with "PAGE_EXECUTE_READWRITE" permissions, often used to dynamically unpack code.
ArrowAnti AnalysisDelay execution
One thread sleeps more than 5 minutes.
ArrowPersistenceInstall system startup script or application
Add "regsvr32.exe /s "C:\Users\Public\N3Eg\N3Eg2.51N3E" #96" to windows startup via registry.
ArrowNetworkConnect to remote host
Outgoing TCP connection to host "None:80".
Outgoing TCP connection to host "187.191.100.112:80".
ArrowNetworkDownload data
Url "http://None/nosoanfhtympkl50tre/ljk32g1.txt".
Url "http://None/nosoanfhtympkl50tre/ljk32g2.txt".
Url "http://None/nosoanfhtympkl50tre/ljk32g4.txt".
Url "http://127.0.0.1/nosoanfhtympkl50tre/infx/s1/conta.php?chave=s3n4&url=N3EERVTWSM%20*%20%2032%20bits%20*%202626.5%20kb%20*%20%20*%20English%20(United%20States)".
ArrowNetworkConnect to HTTP server
Remote address "None".
Remote address "127.0.0.1".
ArrowPEDrop PE file
Drop file "c:\users\public\n3eg\ljkg4".
Drop file "c:\users\public\n3eg\ljkg2".
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefox with deactivated setting "security.fileuri.strict_origin_policy".


Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image