Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    600s
  • max time network
    619s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2024, 15:08

General

  • Target

    Nurik/client_1_16_5/libraries/commons-lang3-3.5.jar

  • Size

    468KB

  • MD5

    780b5a8b72eebe6d0dbff1c11b5658fa

  • SHA1

    6c6c702c89bfff3cd9e80b04d668c5e190d588c6

  • SHA256

    8ac96fc686512d777fca85e144f196cd7cfe0c0aec23127229497d1a38ff651c

  • SHA512

    9e6ff20e891b6835d5926c90f237d55931e75723c8b88d6417926393e077e71013dab006372d34a6b5801e6ca3ce080a00f202cba700cab5aabfc17bbbdcab36

  • SSDEEP

    12288:RXWoN+vjrk1GDSZSYPv46XEfJtBaR7QDbC2:RXj0vk1qASSzs22

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\Nurik\client_1_16_5\libraries\commons-lang3-3.5.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1136
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:5072
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb4b62ab58,0x7ffb4b62ab68,0x7ffb4b62ab78
      2⤵
        PID:3000
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1912,i,11859353254999073254,8922229971364239490,131072 /prefetch:2
        2⤵
          PID:376
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=1912,i,11859353254999073254,8922229971364239490,131072 /prefetch:8
          2⤵
            PID:632
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2264 --field-trial-handle=1912,i,11859353254999073254,8922229971364239490,131072 /prefetch:8
            2⤵
              PID:224
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3084 --field-trial-handle=1912,i,11859353254999073254,8922229971364239490,131072 /prefetch:1
              2⤵
                PID:3604
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3128 --field-trial-handle=1912,i,11859353254999073254,8922229971364239490,131072 /prefetch:1
                2⤵
                  PID:3120
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4364 --field-trial-handle=1912,i,11859353254999073254,8922229971364239490,131072 /prefetch:1
                  2⤵
                    PID:2432
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4108 --field-trial-handle=1912,i,11859353254999073254,8922229971364239490,131072 /prefetch:8
                    2⤵
                      PID:4044
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4636 --field-trial-handle=1912,i,11859353254999073254,8922229971364239490,131072 /prefetch:8
                      2⤵
                        PID:1736
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4596 --field-trial-handle=1912,i,11859353254999073254,8922229971364239490,131072 /prefetch:8
                        2⤵
                          PID:3008
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4836 --field-trial-handle=1912,i,11859353254999073254,8922229971364239490,131072 /prefetch:8
                          2⤵
                            PID:1524
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4876 --field-trial-handle=1912,i,11859353254999073254,8922229971364239490,131072 /prefetch:8
                            2⤵
                              PID:1420
                          • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                            1⤵
                              PID:4448

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

                              Filesize

                              46B

                              MD5

                              610a7315e81856da164342815a77b1cb

                              SHA1

                              34e507cba17182918b9aee19e6330a812dab9cd3

                              SHA256

                              a0f084ad4d3b19c972dc62f9b99b0f3dd666bcd41fe81f1ec62c0c528719aa7f

                              SHA512

                              dc5174c952705420aa764295ebbae426463783ebc412d8a68cbc1f03eb2b7caa0a1be726dd68cd678bdcd477eb004f9acaabad966eb23971f008f501981624cc

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              1KB

                              MD5

                              cdedc3fe7dbd1c4c41d62813dcb0ac79

                              SHA1

                              46010b77c2a4952180823b9a1671bd5f43a24d80

                              SHA256

                              2b687adb611427a2e4c513517d3ee742d7ab3fc8e53f42d9336183a312529de2

                              SHA512

                              8cde88bd7ee8438a31b336e781418903565592055dc70eedddca1f5aef45b2235fc49c39f4ebd2d6e638d42c07431b12740a007f5ef25930b9e05eaf280aa071

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              356B

                              MD5

                              6e7cd0ce547814c6519333e431276c9e

                              SHA1

                              50762c01c2e81cbb9f398cab61d33e835be3fc9d

                              SHA256

                              6a8b8854a1c011c43d3efbd219116a61bd8d4384a5e1437910876839ced984d0

                              SHA512

                              9d3cacc2939fd59df3b22cb399df40c792d29e069c62f9001e7071c96be60e716e0c086ab036559e919149d90aae9b36b4abc5eddb5d947b0ba0942de4f6981d

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              2dd19f5ff971256bae4c67791424d96a

                              SHA1

                              99f46db68a155ee79b9b1ed6fef7c735646b82bd

                              SHA256

                              9df522c3cf0e0c30b88b85ab50ffd69e118bfd9af5591245a074295839dd111b

                              SHA512

                              0b80197329574525a05443fbcd3309de2ace2315d1b1d31eae42bb5f665a35bade835f5ba4455da8d6678fd4bbb3e3013080b4fe49f528e8fd9fe3fbfc7f53ba

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                              Filesize

                              16KB

                              MD5

                              0371894abe25ef3f244426dec61c26ca

                              SHA1

                              e8d06ab40ca3f779f16d9e049768c9890e7934a4

                              SHA256

                              74ad4dc3daed3cb45148bdf47a98ac62d5fd0d592d17f5e000955220bf6c316d

                              SHA512

                              143270f74ad0ecfdb59a1ae6306dc9bd0030fc0c0c295c76037f299119bb1ff6da1769b11cab662dd19391fa44ad35d8baf7fc62036260b8de1b58f6efa37549

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              251KB

                              MD5

                              deddc70433706f9b5b6a590a5b67a2d1

                              SHA1

                              adfb85435fd9a287db988a22244c04e3e806d809

                              SHA256

                              97f2ea3defde48ac4ae2178cf1eaf4a5d185d6526074f993c731a3360316b70d

                              SHA512

                              795a246ca6e48f84918eab276ff47176a80d359d0bbc5bad8682559b5ad10c37f94a50bc578708e31694cc9b5e0e557ecbfa5579595ba5126799ce9ed7206c75

                            • memory/1136-5-0x0000017B670B0000-0x0000017B680B0000-memory.dmp

                              Filesize

                              16.0MB

                            • memory/1136-11-0x0000017B65660000-0x0000017B65661000-memory.dmp

                              Filesize

                              4KB

                            • memory/1136-13-0x0000017B670B0000-0x0000017B680B0000-memory.dmp

                              Filesize

                              16.0MB