Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2023, 08:19
Static task
static1
Behavioral task
behavioral1
Sample
PO7623jarjarjarjarjarjarj.jar
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
PO7623jarjarjarjarjarjarj.jar
Resource
win10v2004-20230703-en
General
-
Target
PO7623jarjarjarjarjarjarj.jar
-
Size
70KB
-
MD5
0e3fdb5b619f6a39b6a6ea16cd930c97
-
SHA1
43a992927b4019290c7ce11fa0d8f4ac0913c063
-
SHA256
3bc3579f84354fe3b51fd60254362bb523a76beb34adb1fa1cedd2b34dfbb61a
-
SHA512
811dd76df42c9f8f290ffe0ae4c16963c62ff285fe68500c23292f36516e2beb90a152b567593e32e2f30b7c678fac89aab1b274e6c8376c96f7ee8c463b1ff7
-
SSDEEP
1536:2pFnNUl/6kMKiPIh9mnzxZxCJbyWxQX05oAhL7BN46ju5XFzvke:EFNw/6kMKuI9o47xQX0WAhL7I
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PO7623jarjarjarjarjarjarj.jar java.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PO7623jarjarjarjarjarjarj = "\"C:\\Program Files\\Java\\jre1.8.0_66\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\PO7623jarjarjarjarjarjarj.jar\"" java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PO7623jarjarjarjarjarjarj = "\"C:\\Program Files\\Java\\jre1.8.0_66\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\PO7623jarjarjarjarjarjarj.jar\"" java.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1680 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3012 wrote to memory of 560 3012 java.exe 86 PID 3012 wrote to memory of 560 3012 java.exe 86 PID 3012 wrote to memory of 4256 3012 java.exe 87 PID 3012 wrote to memory of 4256 3012 java.exe 87 PID 560 wrote to memory of 1680 560 cmd.exe 90 PID 560 wrote to memory of 1680 560 cmd.exe 90 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\PO7623jarjarjarjarjarjarj.jar1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SYSTEM32\cmd.execmd /c schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\PO7623jarjarjarjarjarjarj.jar"2⤵
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\PO7623jarjarjarjarjarjarj.jar"3⤵
- Creates scheduled task(s)
PID:1680
-
-
-
C:\Program Files\Java\jre1.8.0_66\bin\java.exe"C:\Program Files\Java\jre1.8.0_66\bin\java.exe" -jar "C:\Users\Admin\AppData\Roaming\PO7623jarjarjarjarjarjarj.jar"2⤵PID:4256
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD50e3fdb5b619f6a39b6a6ea16cd930c97
SHA143a992927b4019290c7ce11fa0d8f4ac0913c063
SHA2563bc3579f84354fe3b51fd60254362bb523a76beb34adb1fa1cedd2b34dfbb61a
SHA512811dd76df42c9f8f290ffe0ae4c16963c62ff285fe68500c23292f36516e2beb90a152b567593e32e2f30b7c678fac89aab1b274e6c8376c96f7ee8c463b1ff7
-
Filesize
50B
MD5bd23a0c9c41dbfe87855f6f5032c7771
SHA1ad3d96dec10c5791f7874f8315c2382e56bb0fea
SHA256d5e47eb34eaee3262cf1a9e1340f4f1634bd72a7f9a91a64dee6cd08caa632a5
SHA512e54f1f79bd986e6a223cbdfdead504800031da065e179ba28c88ec3564be48113fa248ef889deb13ec2a77c81d75343d8b006fbfcf72d5c25150b3c8744a1356
-
Filesize
70KB
MD50e3fdb5b619f6a39b6a6ea16cd930c97
SHA143a992927b4019290c7ce11fa0d8f4ac0913c063
SHA2563bc3579f84354fe3b51fd60254362bb523a76beb34adb1fa1cedd2b34dfbb61a
SHA512811dd76df42c9f8f290ffe0ae4c16963c62ff285fe68500c23292f36516e2beb90a152b567593e32e2f30b7c678fac89aab1b274e6c8376c96f7ee8c463b1ff7