Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    600s
  • max time network
    664s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2024, 15:08

General

  • Target

    Nurik/client_1_16_5/libraries/commons-logging-1.1.3.jar

  • Size

    60KB

  • MD5

    92eb5aabc1b47287de53d45c086a435c

  • SHA1

    f6f66e966c70a83ffbdb6f17a0919eaf7c8aca7f

  • SHA256

    70903f6fc82e9908c8da9f20443f61d90f0870a312642991fe8462a0b9391784

  • SHA512

    e5d1fc8ec4544e1fa0f7c4aae8dbcca466c4987bc92fbbc430b054b10d646b745add4a754b1be9d50edd64330c798c53173a97289db57a966312e16f934e9d1f

  • SSDEEP

    768:Oirgim03eHcOSlWmuvjpNToHSQfWZy2VDfEXsHtprlPox2u+nA5q5ddrSxw3qKrg:Xtmjc+TbT4SKQ5VD7Zi2u+niSddrtvrg

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\Nurik\client_1_16_5\libraries\commons-logging-1.1.3.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:432
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:5048
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3704
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffbbffeab58,0x7ffbbffeab68,0x7ffbbffeab78
      2⤵
        PID:1732
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=2020,i,16255912396422767932,3632788659302513174,131072 /prefetch:2
        2⤵
          PID:3512
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 --field-trial-handle=2020,i,16255912396422767932,3632788659302513174,131072 /prefetch:8
          2⤵
            PID:2248
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2268 --field-trial-handle=2020,i,16255912396422767932,3632788659302513174,131072 /prefetch:8
            2⤵
              PID:4344
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3140 --field-trial-handle=2020,i,16255912396422767932,3632788659302513174,131072 /prefetch:1
              2⤵
                PID:3812
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3188 --field-trial-handle=2020,i,16255912396422767932,3632788659302513174,131072 /prefetch:1
                2⤵
                  PID:412
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4320 --field-trial-handle=2020,i,16255912396422767932,3632788659302513174,131072 /prefetch:1
                  2⤵
                    PID:1864
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4400 --field-trial-handle=2020,i,16255912396422767932,3632788659302513174,131072 /prefetch:8
                    2⤵
                      PID:1688
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4660 --field-trial-handle=2020,i,16255912396422767932,3632788659302513174,131072 /prefetch:8
                      2⤵
                        PID:432
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4584 --field-trial-handle=2020,i,16255912396422767932,3632788659302513174,131072 /prefetch:8
                        2⤵
                          PID:4984
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4520 --field-trial-handle=2020,i,16255912396422767932,3632788659302513174,131072 /prefetch:8
                          2⤵
                            PID:2084
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4520 --field-trial-handle=2020,i,16255912396422767932,3632788659302513174,131072 /prefetch:8
                            2⤵
                              PID:4780
                          • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                            1⤵
                              PID:4020

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

                              Filesize

                              46B

                              MD5

                              5fe7313b61ef0174aacd3e2474794176

                              SHA1

                              c1858564a865d2651bbd3d5cbaba0e271f3d52b4

                              SHA256

                              a3fd8dabe238048dc58fdc394bc3ad7302bdaada17a39a91044e75c0975df1e5

                              SHA512

                              206a3c74d07d263d3c6c76d293d5416fa623675b691138a64e48a5409ef1f222254cbd13296cd175dc91c95fb5f770560f81a03344cae13378361ff8c3f59ae3

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              1KB

                              MD5

                              bcc19567741fab5484f9a395bd67d0da

                              SHA1

                              d14fd35eb7246f26ed4e01399e4e1616dd6adef7

                              SHA256

                              e692998e07e66b6230757b8410098741a40a05aee4d7020c810d011dd3829bf8

                              SHA512

                              ef4f50b0bbbb4c406434cedca18b9106148e2e7b7f6b6f1e20209acbeb4f8c87d4dc1fe8c06c0a9544404372c0fabe37a3d948fe90d293377dcb3ee730f5b78f

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              354B

                              MD5

                              cca797eedea17043909b608895b77f5c

                              SHA1

                              dcc23f50e27ffaa9b1b3409b4d0f5c723218d6b7

                              SHA256

                              d7cbfb26f631df4e74c855da29632a0f0857e0fc78f0531e77e601b7eae672a8

                              SHA512

                              24e0c24e3f9bde6af900a2f9713372a57e3c909f385d9ccc3e1b64c8486e898598fd861bbe73c0c5f4f8b8078a1d1128747d8253869e9cdf5b53a3cacdc8461e

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              0aa4c2ca97aa86026dc8bda2bd620906

                              SHA1

                              35ef036909734dba5133e1512d10dbd6287b4fe5

                              SHA256

                              0c986ff13618c9cc4367412492ca56c97eb9b81feed12726d6034cb3abef6b64

                              SHA512

                              0761fcb455e6a7323dfda6db148e05e56e9ff7ed3054f7e47ed30dc59a79df358ac599572834abf473c0e64eebe69b3e187a17456c54e13722165c658d524f41

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                              Filesize

                              16KB

                              MD5

                              d56025dc47439456a861b91fbb6564c1

                              SHA1

                              4cf01dbe49340fd664b3851dd69e7bb7d7545c4e

                              SHA256

                              e56c270c3c991a9f4ec7a5812c74369ac646336241b0361252d92af4e2f651e6

                              SHA512

                              be44661cf9d2e0f3bdb1f373cabd734d1831730172eafd53dae565adcd2d979af3e618df71853f1d309979df13d05b2e4a6e398e203eef99e93d0ab39e7363c3

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              251KB

                              MD5

                              f659386d6d0a23bd26e033de275960cc

                              SHA1

                              f048a329dcd4f1d9d8f1f44aaab53a4bb79ea8b9

                              SHA256

                              c1664645b4b3d201fca2def1a69ebf0980a1a331eb9029f449946feba3e14d37

                              SHA512

                              f66c21604411f7409696df7719fd028fdeb211075ecae8c53b72420abc98db1d5efff77d4d1989cda49fa3ad44c940bc2944b8121aec85983dd11f2603658e0f

                            • memory/432-8-0x00000278B9050000-0x00000278BA050000-memory.dmp

                              Filesize

                              16.0MB

                            • memory/432-11-0x00000278B7750000-0x00000278B7751000-memory.dmp

                              Filesize

                              4KB

                            • memory/432-13-0x00000278B9050000-0x00000278BA050000-memory.dmp

                              Filesize

                              16.0MB