Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    41s
  • max time network
    36s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/02/2024, 02:53

General

  • Target

    DTC.jar

  • Size

    24.8MB

  • MD5

    d8b6cf8e382e00af53a10da9ce454cd6

  • SHA1

    13d3f5a27b8d164c21007ca8c1945fc6e0b17975

  • SHA256

    8412f47737b767738877f745bf59c991c2bd44a8579daa05f396791e455f490a

  • SHA512

    66887928923f88573f8fc9c79cd4f1637e70143d426b8507d0701e19fe47cc2887f7198c57c1693ecf4109753ef8583b422265e3adeb08516717761aea10fca6

  • SSDEEP

    393216:Lx1f3OT0o28resQk98DVxK15F5amSVBnFwE9WbTx1oTgvkZYhPoA6i2dk5rny:9Vk0Z8BhaVxOYnuE9kTIZ2o5i2dX

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\DTC.jar
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:540
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:4744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    e395412b7c319c22498fa63f09b9555e

    SHA1

    af69fe7d6e5f6bbb94f36b68111c54e5570d607e

    SHA256

    5a64313705881779bc406c830effe280f11f1ce90e80df68ae79078082a149bb

    SHA512

    2fb5a11cb4dd0474dcb8608ec58de4e7579e3bf3f0117fc90d18786c713a62c0a4a0f3e55b910e6b87f5c5c7e1daaf499f2da510ac76fcf654b4f93bb2a024eb

  • memory/540-4-0x000001A000000000-0x000001A001000000-memory.dmp

    Filesize

    16.0MB

  • memory/540-11-0x000001A075AB0000-0x000001A075AB1000-memory.dmp

    Filesize

    4KB

  • memory/540-20-0x000001A075AB0000-0x000001A075AB1000-memory.dmp

    Filesize

    4KB

  • memory/540-27-0x000001A000280000-0x000001A000290000-memory.dmp

    Filesize

    64KB

  • memory/540-26-0x000001A000000000-0x000001A001000000-memory.dmp

    Filesize

    16.0MB

  • memory/540-28-0x000001A000000000-0x000001A001000000-memory.dmp

    Filesize

    16.0MB