Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

02/07/2023, 10:37

230702-mnsd8scd2z 1

Analysis

  • max time kernel
    292s
  • max time network
    279s
  • platform
    windows7_x64
  • resource
    win7-20230621-es
  • resource tags

    arch:x64arch:x86image:win7-20230621-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    02/07/2023, 10:37

General

  • Target

    LauncherFenix-Minecraft-v7.jar

  • Size

    65KB

  • MD5

    fea39379db50e2a8feee8bac75ab769d

  • SHA1

    1b1df2b43088ddff1394d50d515901570ab18f40

  • SHA256

    e7b3db67c5b22fb6175be7299d1ad622d6183210d212ca3ce464292b627400f1

  • SHA512

    25487310a04b60b561d013b01e7d595e545e1da3b352e046774b95a54f2877ffad2b64d961dc8ed99532dc8c83719f0e281cf0540cf25e4b0708d2c5d64c7c79

  • SSDEEP

    1536:paoqO4pFE7IxmtlSBszOg+0HUad8vr7lK:p56K7ItBjgXHUYCnlK

Score
1/10

Malware Config

Signatures

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Windows\system32\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\LauncherFenix-Minecraft-v7.jar
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1404

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\.minecraft\launcherfenix.jar

    Filesize

    500KB

    MD5

    84591cf8bbe4b94d5a83b2cdd605d4b5

    SHA1

    85f1dbf03d2b4c52e067849b93c3f4c7ec284886

    SHA256

    b8c2bf47cb70a77582c302284554ecd4a29f9ee55c09fc2193b3ba942d5884ae

    SHA512

    31ff3523bedc87efd5040c46fdaff325c29fa109a912b729c81660c0737505e9dbd2f9bc0a443bfce12ede2569d023cc1f56f6bea0943a669f4f85e0f420830d

  • memory/1404-125-0x0000000005620000-0x000000000562A000-memory.dmp

    Filesize

    40KB

  • memory/1404-114-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/1404-72-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/1404-81-0x0000000000190000-0x000000000019A000-memory.dmp

    Filesize

    40KB

  • memory/1404-87-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/1404-107-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/1404-67-0x0000000000190000-0x000000000019A000-memory.dmp

    Filesize

    40KB

  • memory/1404-118-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/1404-120-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/1404-122-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/1404-69-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/1404-124-0x0000000005620000-0x000000000562A000-memory.dmp

    Filesize

    40KB

  • memory/1404-150-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/1404-128-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/1404-133-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/1404-68-0x0000000000190000-0x000000000019A000-memory.dmp

    Filesize

    40KB

  • memory/1404-127-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/1404-155-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/1404-157-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/1404-158-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/1404-162-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/1404-166-0x0000000005620000-0x000000000562A000-memory.dmp

    Filesize

    40KB

  • memory/1404-167-0x0000000005620000-0x000000000562A000-memory.dmp

    Filesize

    40KB

  • memory/1404-168-0x0000000005620000-0x000000000562A000-memory.dmp

    Filesize

    40KB