Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
86s -
max time network
89s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
06/04/2024, 13:01
Static task
static1
Behavioral task
behavioral1
Sample
WuahwaLapexReach.jar
Resource
win11-20240214-en
General
-
Target
WuahwaLapexReach.jar
-
Size
719KB
-
MD5
68f7e21a492a33ea1bfede9a8c9d2895
-
SHA1
a42bdbd553bbb33aea2aa04cb3ea28121af423b4
-
SHA256
36d1db97a916122c967d7c0724301263a53a1e8343fa1bea61ffd9936200b207
-
SHA512
510e88e8c15cba65000393351a1e8d8278f9776e484bb73f6ea399f076837b1eeea4430f837b62390e432c02a3adbebe3f3f455148ea3222c343a8ae0db7fd06
-
SSDEEP
12288:4sGS/1vKFmWXUv+jWYvfeKZv+jSomNBjCeY+rus3/+803:HdWEbue3Gom3jCmu13
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2272 icacls.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 4796 7zFM.exe Token: 35 4796 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4796 7zFM.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4916 wrote to memory of 2272 4916 java.exe 77 PID 4916 wrote to memory of 2272 4916 java.exe 77
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\WuahwaLapexReach.jar1⤵
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:2272
-
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Desktop\UnregisterExport.7z"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5e0190970e1efc10f88f069da8dfaf217
SHA12516de8b7407c7c53404d736eee4b14df08f03e2
SHA2565960c6f0a41083f93331cbd65575fb98e724b5714bdcef2b11b0558bb59b161d
SHA512146150238e25e328a866ab0b6ce747cb491f1b8f0696c229d38ed356aeea9efef05607237628551253c3c71262706b57748daafbaa01ed353a6cdedae4aded3b