Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
64s -
max time network
69s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2023, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
BurpLoaderKeygen117.jar
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
BurpLoaderKeygen117.jar
Resource
win10v2004-20231023-en
General
-
Target
BurpLoaderKeygen117.jar
-
Size
36KB
-
MD5
a3b1b3be59e6d3d374a2d3344213e6c7
-
SHA1
3d0e27962c83c8db2955fa79c27256442c0bcb55
-
SHA256
dcdf28acf360554a5a98d78f403c96ccea500be24b27d02b020e142820637c0a
-
SHA512
6cb93d2af6aa1c62bd8f94c0a7e192cc08ad092724753999c92e8569c9bd76bf8ad254d6eca757decaa7922f7a806143118b90d806de80f3c36eae5e8b8bbe64
-
SSDEEP
768:yG6uWNygZJbmjwB4HC8tyPAR8N4x3kWDuWYkfLb:yGbWNfJbmjSwNY4x9DuQf/
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2740 icacls.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb java.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4796 java.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4796 wrote to memory of 2740 4796 java.exe 85 PID 4796 wrote to memory of 2740 4796 java.exe 85 PID 4796 wrote to memory of 704 4796 java.exe 87 PID 4796 wrote to memory of 704 4796 java.exe 87
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\BurpLoaderKeygen117.jar1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:2740
-
-
C:\Program Files\Java\jre-1.8\bin\java.exe"C:\Program Files\Java\jre-1.8\bin\java.exe" -version2⤵PID:704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD54d42eb83a46bf020e725d5bd2ddd7adc
SHA1b3abf9f4aa4d6127c7708634e820c845fe77ec67
SHA256e4534e07a7ea867674a3f223439729b347bbe53e11defb58538fe792d4b50531
SHA51287b55b03092dcf58b0cad031a3273322397563336a44cf00a548d56dc9f1fffbc9cfa28ae772754b21d4bfe719c093467f8eba83b8dc511f66bd2d3d5751c37d