Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

02/11/2023, 15:01

231102-sdwxkafe89 7

02/11/2023, 14:58

231102-scexnade9x 7

Analysis

  • max time kernel
    140s
  • max time network
    273s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/11/2023, 15:01

General

  • Target

    EzExploit/modules/cmd_list.jar

  • Size

    4KB

  • MD5

    355849a62628d973a7bbc8c2505e805a

  • SHA1

    e7bab7fb96f13c3f007c5d89129d804b5ebe50b8

  • SHA256

    f4e62e6285ea6812a02495f31b9c2f7d3ebe753973b8a9f9ccab2f7b3016ab1d

  • SHA512

    e58000192f0c19157b4d3a3683ba07ffdb391a45467c94388953589bbad3fe447403edb147fc0ac1ef3b97779142cda0f578e33e6543392fb8161f942815ff06

  • SSDEEP

    48:v6H3giVY5igTuykeTZygXXzw/RY8j8fWb9M99Cfrn0o9SEuCVETGUVWf5P7BZf2r:v6HvVU7zJT0y8S9960zqUW5P77fj6f

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\EzExploit\modules\cmd_list.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3692
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:4536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    7146235d695dcf1e0dcbf0ff992ea42d

    SHA1

    462d5a88dc8561dcd54c6b9299eeeb2cb41b79af

    SHA256

    3f1b3e38151bb6d8925a6ed744222e9908c7b4b12c40b4d57014df8da6665f6e

    SHA512

    e6f263a2504da68f5d428259c96f583976d00b050095b1f93d9776bd315c2ba01c0c51ce7fb811e00a7bdb9347b97d9ff286c2f644ce8745d4ac6d491e7de1e3

  • memory/3692-2-0x00000204E0150000-0x00000204E1150000-memory.dmp

    Filesize

    16.0MB

  • memory/3692-12-0x00000204DE910000-0x00000204DE911000-memory.dmp

    Filesize

    4KB