Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

29/06/2023, 14:46

230629-r5stjsdf66 5

29/06/2023, 14:43

230629-r3tm3aed4y 5

Analysis

  • max time kernel
    96s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/06/2023, 14:43

General

  • Target

    cmdline-tools/bin/apkanalyzer.bat

  • Size

    2KB

  • MD5

    1b979a9b367b120ff95e25e730b6d42f

  • SHA1

    b239a194f8497b14b4ed04f1d7dd1b86e4d6e518

  • SHA256

    0991b38104a177e33bdc67b33a685d2d59d047fc46a567ddc33e9787a3ce090e

  • SHA512

    807da5dd43e1b8b29598bf863ba206ea58a3d28a098da787ebbb4e62529b8b1044ea68105fadd37e8d86b26c0ff455de2b4eb59a4c753d2b540c63850284d8b6

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cmdline-tools\bin\apkanalyzer.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\ProgramData\Oracle\Java\javapath\java.exe
      java.exe -version
      2⤵
        PID:4616
      • C:\ProgramData\Oracle\Java\javapath\java.exe
        "java.exe" -Dcom.android.sdklib.toolsdir=C:\Users\Admin\AppData\Local\Temp\cmdline-tools\bin\\.. -classpath "C:\Users\Admin\AppData\Local\Temp\cmdline-tools\bin\..\lib\apkanalyzer-classpath.jar" com.android.tools.apk.analyzer.ApkAnalyzerCli
        2⤵
          PID:4788

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\.oracle_jre_usage\90737d32e3aba4b.timestamp

        Filesize

        50B

        MD5

        06806b6b78adb120800966307cab2785

        SHA1

        49c83ce14b4d7e5645eff131384cc865e1c1b2d4

        SHA256

        0e6df3d6b214b30ddd1050b21f489155e6f2ecc74b2b5cfb54394b0bd897e69f

        SHA512

        f2f601af19c4d12f6b4dba94216c450008cca71cf5f90f1949daf6abccb2dc8ef5a5014e37131fef493d770214a5c56228913ce92d04853d2404c632f628b197

      • memory/4616-143-0x00000000005D0000-0x00000000005D1000-memory.dmp

        Filesize

        4KB

      • memory/4788-156-0x00000000013C0000-0x00000000013C1000-memory.dmp

        Filesize

        4KB

      • memory/4788-157-0x00000000013C0000-0x00000000013C1000-memory.dmp

        Filesize

        4KB