Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
76s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
17/01/2024, 18:39
Static task
static1
Behavioral task
behavioral1
Sample
63507ef5bc127d200bd48e477a5f8ab2.jar
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
63507ef5bc127d200bd48e477a5f8ab2.jar
Resource
win10v2004-20231215-en
General
-
Target
63507ef5bc127d200bd48e477a5f8ab2.jar
-
Size
627KB
-
MD5
63507ef5bc127d200bd48e477a5f8ab2
-
SHA1
4b05541814e7c1bdbb70f1cb82b3db5f8e9b5823
-
SHA256
604dc0ff16d6c026a4c322dc61ca9597a02dbc5c80bcea0c46961005204decaf
-
SHA512
645ebbff6ac01dd2d73be6db41dc9f6456a82c96b9a65f82d40151dbebd6c27623cd2fd3a6fde90651c51278e7db525b540510fb6e8f46acaa4b0f03c8a18a13
-
SSDEEP
12288:TsWeQT7dKrfL/0MqLofLrYeBurxCvORSxT8FhHD3mMkLdSIdNQ:XTBK0MqEfL1KRk+D1kZp4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vTTsXwVcli.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vTTsXwVcli.js WScript.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 528 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\vTTsXwVcli.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\Local Settings wscript.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2040 wrote to memory of 528 2040 java.exe 88 PID 2040 wrote to memory of 528 2040 java.exe 88 PID 2040 wrote to memory of 4236 2040 java.exe 90 PID 2040 wrote to memory of 4236 2040 java.exe 90 PID 4236 wrote to memory of 1420 4236 wscript.exe 92 PID 4236 wrote to memory of 1420 4236 wscript.exe 92 PID 4236 wrote to memory of 4984 4236 wscript.exe 93 PID 4236 wrote to memory of 4984 4236 wscript.exe 93 PID 4984 wrote to memory of 1808 4984 javaw.exe 95 PID 4984 wrote to memory of 1808 4984 javaw.exe 95
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\63507ef5bc127d200bd48e477a5f8ab2.jar1⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:528
-
-
C:\Windows\SYSTEM32\wscript.exewscript C:\Users\Admin\_output.js2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\vTTsXwVcli.js"3⤵
- Drops startup file
- Adds Run key to start application
PID:1420
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\lblui.txt"3⤵
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Program Files\Java\jre-1.8\bin\java.exe"C:\Program Files\Java\jre-1.8\bin\java.exe" -jar C:\Users\Admin\AppData\Local\Temp\_0.190282493822072856421509871336173189.class4⤵PID:1808
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD532ee6f06ec0146712576f11f086f50c2
SHA1da7bcf816565c1240b443a0981322e8131f27437
SHA2567f05be87fe557daec21d176af8546a00727a35cec0bd2f6c7fa19ec8235317e5
SHA5126431a4abdc6922b6cdfa3f1aa2eed179f17cf68b47265ce2e83dea2baa7d24db396ca75faf3bc3392dc6992669869b2a97b157c09eb327c86665afc5d06a159f
-
Filesize
46B
MD593519d370146701c4aafd6e26eaf2cd4
SHA114fdd82b87f6fa5c487969288694fa5429757634
SHA2566b399bcd024ccfd205e12630de8f8ec0417795936682ae4df812a8a4a4cc52d0
SHA5126121f5a2b40672c587cdeade2efae1c2be5033e454c1f86cc0b556d7974565979c7a15f775da52e701065ab5bcce31f050156759922818a2ce88ca7051c2cb01
-
Filesize
241KB
MD5781fb531354d6f291f1ccab48da6d39f
SHA19ce4518ebcb5be6d1f0b5477fa00c26860fe9a68
SHA25697d585b6aff62fb4e43e7e6a5f816dcd7a14be11a88b109a9ba9e8cd4c456eb9
SHA5123e6630f5feb4a3eb1dac7e9125ce14b1a2a45d7415cf44cea42bc51b2a9aa37169ee4a4c36c888c8f2696e7d6e298e2ad7b2f4c22868aaa5948210eb7db220d8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2398549320-3657759451-817663969-1000\83aa4cc77f591dfc2374580bbd95f6ba_4fbfcbca-5772-4263-80de-2998e1106860
Filesize45B
MD5c8366ae350e7019aefc9d1e6e6a498c6
SHA15731d8a3e6568a5f2dfbbc87e3db9637df280b61
SHA25611e6aca8e682c046c83b721eeb5c72c5ef03cb5936c60df6f4993511ddc61238
SHA51233c980d5a638bfc791de291ebf4b6d263b384247ab27f261a54025108f2f85374b579a026e545f81395736dd40fa4696f2163ca17640dd47f1c42bc9971b18cd
-
Filesize
479KB
MD5c67d02c567461d6fad607a89ac1084b8
SHA11c8af842bda12c315b7a78b4a44f3c4e8a1721a9
SHA25613510f3ee14e47e2fc457215420e795f0959e33411e4fa2e8a889a3c7fb858d9
SHA5129151cfaff17d3cd2d832ad5a4e9fbcf93e49c955a1ed0748d67d9df307d7714bff346caa4239482ca676697ee48c689759f3ef86fd360e47e8910246dce0a043
-
Filesize
9KB
MD5e068ea577e83f36e6f5a3a64bd763648
SHA183764893b98e89350c261609b76b0fd812b44630
SHA256d75a2e8e930b82f2cf2e751b298294f5594d74ff68aa65ca27ff6c1eb46730b6
SHA512ed0d2fa859b239f84d736dc138a9a7c100cececdf565ed6a2d401ef9f20b526feffee4587eaf93697d9bb7db33f8bc8eb91a66d70b08645b913d1f6edcea47c6
-
Filesize
910KB
MD5a9b85388aae2c05a662703488dc484b0
SHA1461f673f7af1f372e42fd4e8e6edbd60ddbb5dc7
SHA25639a2e082897abaaf11cc9e955d4b1dff633be28a0be463b748c3bd6dc6dfd6ec
SHA512abd01d08176c3fd6e45407f9222d5b02d60d719ea82366c4431282a1779e28cedeb4923f0c897e8d9df3b3ee3f05d10c509c0e3861119f8a712b9cca809384a7