Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2023, 06:50
Static task
static1
Behavioral task
behavioral1
Sample
jre.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
jre.exe
Resource
win10v2004-20230220-en
General
-
Target
jre.exe
-
Size
71.2MB
-
MD5
b8774375de02c58381f9d5215731a7ea
-
SHA1
10e428c0b52e89feb71c485bc4098768ff39c390
-
SHA256
8875f7104cd2c1c5d5eef7f06b841e239254c62792ffb601a2f46e96c2f67cc3
-
SHA512
7175bad0c3c6b3409d9effea8d76ecc8bdf608f7b91017c8c8fac2902960c8d00a6e297b02c203ac29f4af956a01be29aea266a65bea861a16826f0b0becf1d3
-
SSDEEP
1572864:EXARH5MRWYsnIUQru78RIS7UiOnVLhSiKfF8JPUVDaFeHjoM:+q5MRW37WISQfLYnfyUD9H
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4772 jre.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4772 jre.exe 4772 jre.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2152 wrote to memory of 4772 2152 jre.exe 84 PID 2152 wrote to memory of 4772 2152 jre.exe 84 PID 2152 wrote to memory of 4772 2152 jre.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\jre.exe"C:\Users\Admin\AppData\Local\Temp\jre.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\jds240547593.tmp\jre.exe"C:\Users\Admin\AppData\Local\Temp\jds240547593.tmp\jre.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4772
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70.9MB
MD54b8e09f7e127b5a688f5948a0c9ffa17
SHA16a74ced94605fc41e066ae62a4b553ae2c4fd8c3
SHA256a371762f524f63b00fb6acaff3883b15c614ff9743355b087e62ba5319d46a6b
SHA512dd8285345b6726bf5130c649d898b6911faa1c60c9d1f94d202221473d9e94d4c449e581a82b03ec43254a8e3b8ea1bf5b6a6f23135bc9f3cd8d6646c46fe8a0
-
Filesize
70.9MB
MD54b8e09f7e127b5a688f5948a0c9ffa17
SHA16a74ced94605fc41e066ae62a4b553ae2c4fd8c3
SHA256a371762f524f63b00fb6acaff3883b15c614ff9743355b087e62ba5319d46a6b
SHA512dd8285345b6726bf5130c649d898b6911faa1c60c9d1f94d202221473d9e94d4c449e581a82b03ec43254a8e3b8ea1bf5b6a6f23135bc9f3cd8d6646c46fe8a0
-
Filesize
267KB
MD5d50d6876331fb9dd206b98ae16554523
SHA1a199c7babc36bb36c7066928d463f5a84486593a
SHA256d04d65584e9886261bd16614bd4471020cbbb9361a0267472448503d5b8daec6
SHA512ef0a1c7e18b79e1e26d48879e0be8ead314ab6733641c91feea7dd7475215eae012418910c51d9758357c91a567dfae1b0290f0da95d9a65bcc11db8abf44567
-
Filesize
267KB
MD5d50d6876331fb9dd206b98ae16554523
SHA1a199c7babc36bb36c7066928d463f5a84486593a
SHA256d04d65584e9886261bd16614bd4471020cbbb9361a0267472448503d5b8daec6
SHA512ef0a1c7e18b79e1e26d48879e0be8ead314ab6733641c91feea7dd7475215eae012418910c51d9758357c91a567dfae1b0290f0da95d9a65bcc11db8abf44567