Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    90s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/10/2023, 14:29 UTC

General

  • Target

    8834a03fd4a8004f9bf0c40ee1344af5249ad72ef4a43803903301c8e25ad208.exe

  • Size

    7.9MB

  • MD5

    da7f06fb1ae86c897c87de1b08f53436

  • SHA1

    cc95f134e3b191f5f20650618aafef430f89fe01

  • SHA256

    8834a03fd4a8004f9bf0c40ee1344af5249ad72ef4a43803903301c8e25ad208

  • SHA512

    4e758a5124ce528daf984d7d1338d03d8166e14b70b7c2130ee27bc8da12e48a6c4db72182321cb0a1cdd1f704bcc99ad4ca533d690a4d0828a2c796c70729e0

  • SSDEEP

    196608:UDNr518bhV8dkwDsHyBqXJmfhhvizcjcrsRowfRbmR2KVO/:UDNF2bhV8d9qlJmZOUcrao8mRHVu

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8834a03fd4a8004f9bf0c40ee1344af5249ad72ef4a43803903301c8e25ad208.exe
    "C:\Users\Admin\AppData\Local\Temp\8834a03fd4a8004f9bf0c40ee1344af5249ad72ef4a43803903301c8e25ad208.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Program Files\Java\jre-1.8\bin\javaw.exe
      "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\8834a03fd4a8004f9bf0c40ee1344af5249ad72ef4a43803903301c8e25ad208.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3204
      • C:\Windows\system32\icacls.exe
        C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
        3⤵
        • Modifies file permissions
        PID:2804

Network

  • flag-us
    DNS
    240.221.184.93.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    240.221.184.93.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    69.31.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    69.31.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    157.123.68.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    157.123.68.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    198.187.3.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    198.187.3.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    160.50.123.104.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    160.50.123.104.in-addr.arpa
    IN PTR
    Response
    160.50.123.104.in-addr.arpa
    IN PTR
    a104-123-50-160deploystaticakamaitechnologiescom
No results found
  • 8.8.8.8:53
    240.221.184.93.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    240.221.184.93.in-addr.arpa

  • 8.8.8.8:53
    69.31.126.40.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    69.31.126.40.in-addr.arpa

  • 8.8.8.8:53
    157.123.68.40.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    157.123.68.40.in-addr.arpa

  • 8.8.8.8:53
    198.187.3.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    198.187.3.20.in-addr.arpa

  • 8.8.8.8:53
    160.50.123.104.in-addr.arpa
    dns
    73 B
    139 B
    1
    1

    DNS Request

    160.50.123.104.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    60c3caf1d9aa797e7a254daf7b43d537

    SHA1

    f0829d87587677d844970e8635bbe2358e731618

    SHA256

    e627f4cbbbd5fae66d43db88b463371c3ca3eb75d7251dcbacfb9e17f1c9a65e

    SHA512

    a1ad66d6c9cdbae25e4dd24e34529b24be2939994e3e5a96975fc9bee43cdf087157cf271a2f5fda5a5d9835a322a052faccb25aad616d39a86f672b0fdc9345

  • memory/2148-0-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/3204-5-0x000001E99AE30000-0x000001E99BE30000-memory.dmp

    Filesize

    16.0MB

  • memory/3204-13-0x000001E999420000-0x000001E999421000-memory.dmp

    Filesize

    4KB

  • memory/3204-14-0x000001E99AE30000-0x000001E99BE30000-memory.dmp

    Filesize

    16.0MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.