Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 08:49
Behavioral task
behavioral1
Sample
0fb1d11732acd516de3da578ac8d7a4a0f51684f588898bc0621fe5424cef0eb.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0fb1d11732acd516de3da578ac8d7a4a0f51684f588898bc0621fe5424cef0eb.jar
Resource
win10v2004-20240426-en
General
-
Target
0fb1d11732acd516de3da578ac8d7a4a0f51684f588898bc0621fe5424cef0eb.jar
-
Size
64KB
-
MD5
8f32b6ad5a4b0bf593c5e8cfe8afd04b
-
SHA1
02623723f9a9af013df424336d45ada46abe9472
-
SHA256
0fb1d11732acd516de3da578ac8d7a4a0f51684f588898bc0621fe5424cef0eb
-
SHA512
185bb366786dc1a1a54dcb623341f7a727842685aa50d48dcc4bafe5135feaa1f6294a874faa55fdc91816a43bd60ab543c9284b7eec97d8cedf65dd62de282c
-
SSDEEP
1536:sFVl2U0Gg0HxEjXu28Gut9+gnzqYgMYw0Sr8awyvI0cNFl:sFv2U0GXUu28P7HZY84awyv3cNFl
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0fb1d11732acd516de3da578ac8d7a4a0f51684f588898bc0621fe5424cef0eb.jar java.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3052 icacls.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0fb1d11732acd516de3da578ac8d7a4a0f51684f588898bc0621fe5424cef0eb = "\"C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\0fb1d11732acd516de3da578ac8d7a4a0f51684f588898bc0621fe5424cef0eb.jar\"" java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0fb1d11732acd516de3da578ac8d7a4a0f51684f588898bc0621fe5424cef0eb = "\"C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\0fb1d11732acd516de3da578ac8d7a4a0f51684f588898bc0621fe5424cef0eb.jar\"" java.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1776 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 544 wrote to memory of 3052 544 java.exe 83 PID 544 wrote to memory of 3052 544 java.exe 83 PID 544 wrote to memory of 3120 544 java.exe 88 PID 544 wrote to memory of 3120 544 java.exe 88 PID 544 wrote to memory of 3544 544 java.exe 90 PID 544 wrote to memory of 3544 544 java.exe 90 PID 3120 wrote to memory of 1776 3120 cmd.exe 92 PID 3120 wrote to memory of 1776 3120 cmd.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\0fb1d11732acd516de3da578ac8d7a4a0f51684f588898bc0621fe5424cef0eb.jar1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:3052
-
-
C:\Windows\SYSTEM32\cmd.execmd /c schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\0fb1d11732acd516de3da578ac8d7a4a0f51684f588898bc0621fe5424cef0eb.jar"2⤵
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\0fb1d11732acd516de3da578ac8d7a4a0f51684f588898bc0621fe5424cef0eb.jar"3⤵
- Creates scheduled task(s)
PID:1776
-
-
-
C:\Program Files\Java\jre-1.8\bin\java.exe"C:\Program Files\Java\jre-1.8\bin\java.exe" -jar "C:\Users\Admin\AppData\Roaming\0fb1d11732acd516de3da578ac8d7a4a0f51684f588898bc0621fe5424cef0eb.jar"2⤵PID:3544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\0fb1d11732acd516de3da578ac8d7a4a0f51684f588898bc0621fe5424cef0eb.jar
Filesize64KB
MD58f32b6ad5a4b0bf593c5e8cfe8afd04b
SHA102623723f9a9af013df424336d45ada46abe9472
SHA2560fb1d11732acd516de3da578ac8d7a4a0f51684f588898bc0621fe5424cef0eb
SHA512185bb366786dc1a1a54dcb623341f7a727842685aa50d48dcc4bafe5135feaa1f6294a874faa55fdc91816a43bd60ab543c9284b7eec97d8cedf65dd62de282c
-
Filesize
46B
MD5bce748f2d4f74206f1cce8a579e35df4
SHA1b433837feaeb49cba109ea3bbeb5766caf412794
SHA2565fada20f0b23577aef5ddc0b01d34d20169bde81c1b1085aa2db5ffd52911dbe
SHA51268dfd5a8518137bdf2d43ddbc068a92690ac53fa4212ebe0589f824e799aeabbdcbc6afe68fe54f854d5a3a7d0d52da8de64995f2535134d544fd800b8734cb1