Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
12s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 06:42
Static task
static1
Behavioral task
behavioral1
Sample
1151de818776c906cf7e06cc24c91f5f.jar
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1151de818776c906cf7e06cc24c91f5f.jar
Resource
win10v2004-20231215-en
General
-
Target
1151de818776c906cf7e06cc24c91f5f.jar
-
Size
128KB
-
MD5
1151de818776c906cf7e06cc24c91f5f
-
SHA1
6cd199b2909eea9731de0dfcaa73a1370d7bfdd7
-
SHA256
e4310114f26e15fa07e71124920ed389f53e21ee57aad649e912ea15ef4e5ebf
-
SHA512
d452b51448d38337141a8f6b6d7f6d2941042493baa8e30e91f187f6d4b22e7cc6da14543e7fa141ae1a4dadb5bcbe0f70d0912eb0d63195d1c72cbb493b1e59
-
SSDEEP
3072:tlf2sc96eDRPXOIGdZ5XNKgfTuoTnA8pUfJ9Ifs20mBtHux/:/WdvGdNVLuoTnRpOUkEBtHw
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation wscript.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1948 icacls.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings wscript.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4420 wrote to memory of 1948 4420 java.exe 90 PID 4420 wrote to memory of 1948 4420 java.exe 90 PID 4420 wrote to memory of 2268 4420 java.exe 92 PID 4420 wrote to memory of 2268 4420 java.exe 92 PID 2268 wrote to memory of 2204 2268 wscript.exe 93 PID 2268 wrote to memory of 2204 2268 wscript.exe 93
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\1151de818776c906cf7e06cc24c91f5f.jar1⤵
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:1948
-
-
C:\Windows\SYSTEM32\wscript.exewscript C:\Users\Admin\[output].js2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\ruYArSxXtj.js"3⤵PID:2204
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\eebiyguog.txt"3⤵PID:1200
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5e1a38d118b349221d8cde35d1b9ee63e
SHA1d3eeb1499e73088ed1ca5d47a1ef3c7736671933
SHA256072443cf33c7ac2b9fed574d3478ed08182df765bf1e1ebc8e1731f54adfcc21
SHA5126fbb4be5c06d06ea9cfe3b3d79a119eef12736eef4ae0b59bd07fae7c60c7ea7b9a30ac6958ed2e185c5710df6768e7385afa916d990319403524e7dd4897567
-
Filesize
92KB
MD5ae4f924072e8dd90687607e7becdde2e
SHA1225d2c7cf6506bf59d865fe3dba1b6c1736d492b
SHA256915de15ccb287c58270e6bc23523b0cde9ce077dbc0fef517faca1a1a0313286
SHA51214da1de2af981af4390e3bb95e29f968f0ef67af011202ce9f598e9f553f822e37013301c965f871ad2660cc451fb7c1ad619bf9533405e7424ad88f199803f0
-
Filesize
9KB
MD5ca4e11b0bbf70a587e0d653bfceded8c
SHA1c70eeac3273988740e937e21e11948b003295582
SHA256d0a3dc9322f9f6f9028f437d45757560de849fd0a0a6dcf8c92beed012b61e0d
SHA512291bbeb73d3ecacfe5c50aa9fd59f0542eea4950a82d0def79318017d5a0c9bcd3792a49c17309414c7678235ffeae284f29643e2be4b4a368592c0f5f64bdf0
-
Filesize
201KB
MD5235c68f406aa41b7e1a87e35d83add4c
SHA1dadb5bd81a34b437863e3d744ea0a06c48533b39
SHA2569285fa6ba7f6cb35a4371d51a11f7c5c7aa582cb1deec294aff20ec5060b0a2d
SHA512158661fdbd3c48fb3f3dba455833553e0c3c1c64d4007262515a689f755f5b752b34f7ead147834852445f60328e3d66b0ea44bfa79372f1667ea14297fa7d1a