Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    154s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2024, 17:39

General

  • Target

    h2.jar

  • Size

    1.6MB

  • MD5

    86de8952f48764286c83e1ec6e9679bc

  • SHA1

    e5c635f2a87b601382ba9e071d2df857f106a929

  • SHA256

    c32dafd1e713c467e4635a5b1896631f11af7d427be1b141b359e203afe3bce1

  • SHA512

    5920daf00fa9303fb865c54520f17adff3a939dc5477ffc028f2432202a3fa51efbf9d094b1a4ac23ecd52e4db87a260285552243547055d1cfa732c276cf31c

  • SSDEEP

    49152:YBVVmtubLiaGifD9xXobnvc+cKoynE7jiCg:YDAubL9G2Ybv1cK3FCg

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\h2.jar
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3940
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:2580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    988cc8e3dc5dd71dc63015c5aef2bd63

    SHA1

    e3ce645ead818ece5a997eb4298356a4bf81d247

    SHA256

    c58df2ad14f6d7d897a69c1136ec08339c9ea6208fa6d3e4e3b8c1a77882b1ec

    SHA512

    a62064ea37a1e7b8cc6c77a7ec698563e131855c6d060f9d38a4ae245f68209a3511f9966ddd06f48eeb2f33eef7d9dcf6aa7776975451c8fba1856c7ae447d5

  • memory/3940-47-0x00000206FEAD0000-0x00000206FEAD1000-memory.dmp

    Filesize

    4KB

  • memory/3940-62-0x0000020681410000-0x0000020682410000-memory.dmp

    Filesize

    16.0MB

  • memory/3940-18-0x00000206FEAD0000-0x00000206FEAD1000-memory.dmp

    Filesize

    4KB

  • memory/3940-22-0x00000206FEAD0000-0x00000206FEAD1000-memory.dmp

    Filesize

    4KB

  • memory/3940-36-0x00000206FEAD0000-0x00000206FEAD1000-memory.dmp

    Filesize

    4KB

  • memory/3940-4-0x0000020681410000-0x0000020682410000-memory.dmp

    Filesize

    16.0MB

  • memory/3940-53-0x00000206FEAD0000-0x00000206FEAD1000-memory.dmp

    Filesize

    4KB

  • memory/3940-11-0x00000206FEAD0000-0x00000206FEAD1000-memory.dmp

    Filesize

    4KB

  • memory/3940-69-0x0000020681410000-0x0000020682410000-memory.dmp

    Filesize

    16.0MB

  • memory/3940-71-0x00000206FEAD0000-0x00000206FEAD1000-memory.dmp

    Filesize

    4KB

  • memory/3940-72-0x00000206FEAD0000-0x00000206FEAD1000-memory.dmp

    Filesize

    4KB

  • memory/3940-80-0x00000206FEAD0000-0x00000206FEAD1000-memory.dmp

    Filesize

    4KB

  • memory/3940-82-0x00000206FEAD0000-0x00000206FEAD1000-memory.dmp

    Filesize

    4KB

  • memory/3940-87-0x0000020681410000-0x0000020682410000-memory.dmp

    Filesize

    16.0MB