Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
1NoxusMod.jar
windows10-1703-x64
7NoxusMod.jar
windows10-2004-x64
7NoxusMod.jar
windows11-21h2-x64
7NoxusMod.jar
android-13-x64
NoxusMod.jar
macos-10.15-amd64
4NoxusMod.jar
ubuntu-18.04-amd64
NoxusMod.jar
debian-9-armhf
NoxusMod.jar
debian-9-mips
NoxusMod.jar
debian-9-mipsel
Analysis
-
max time kernel
193s -
max time network
197s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
27/05/2024, 11:33
Static task
static1
Behavioral task
behavioral1
Sample
NoxusMod.jar
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
NoxusMod.jar
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
NoxusMod.jar
Resource
win11-20240508-en
Behavioral task
behavioral4
Sample
NoxusMod.jar
Resource
android-33-x64-arm64-20240514-en
Behavioral task
behavioral5
Sample
NoxusMod.jar
Resource
macos-20240410-en
Behavioral task
behavioral6
Sample
NoxusMod.jar
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral7
Sample
NoxusMod.jar
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral8
Sample
NoxusMod.jar
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral9
Sample
NoxusMod.jar
Resource
debian9-mipsel-20240418-en
General
-
Target
NoxusMod.jar
-
Size
1.4MB
-
MD5
462734450a265e297b3a3e8ebad04f25
-
SHA1
da384ae6cf08f161f7ec2bbfbd1e8598c88a7de6
-
SHA256
1179aeeafbdaeb7b6ffbc070551c440eb7dfe9786d50dc5beb415bb2f17eded4
-
SHA512
7494ee564de93139b90a4a909a3cfbf8229683f54799698b616ac9fb192f45a1667b7832eef71fb7af87fb490900c7796c2d18e1c242ce4ba10de780b4270d3f
-
SSDEEP
24576:VO+tNLEsGPiCnvnbIcDWsBCTh0z1xwRIRyzVVo719mthe5cW2RegoH9ru0:VO+wpLbbWslfZ2EXmtheyMbK0
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1032 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1716809704588.tmp" reg.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3940 java.exe 3940 java.exe 3940 java.exe 3940 java.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3940 wrote to memory of 1032 3940 java.exe 81 PID 3940 wrote to memory of 1032 3940 java.exe 81 PID 3940 wrote to memory of 340 3940 java.exe 84 PID 3940 wrote to memory of 340 3940 java.exe 84 PID 3940 wrote to memory of 712 3940 java.exe 86 PID 3940 wrote to memory of 712 3940 java.exe 86 PID 712 wrote to memory of 2624 712 cmd.exe 88 PID 712 wrote to memory of 2624 712 cmd.exe 88 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 340 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\NoxusMod.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:1032
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1716809704588.tmp2⤵
- Views/modifies file attributes
PID:340
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1716809704588.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1716809704588.tmp" /f3⤵
- Adds Run key to start application
PID:2624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD59dd440cbcbee8bf92906793389f287b4
SHA1278ad0ff1b4d8fa5842f6ae4b60b83a377915b5c
SHA256194e9988ec59c88dd6275a318cd61d14cc6ae6fc0c54ca2833f2bea66e6773b6
SHA5126e3549911eea92cb9fef7b729c925d1db762a1a6a770815c4a524c00c5d43fdbb921bf247e0ebbe56d5d726366fe8681aec9553a06805155f0c78c74124581eb
-
Filesize
1.4MB
MD5462734450a265e297b3a3e8ebad04f25
SHA1da384ae6cf08f161f7ec2bbfbd1e8598c88a7de6
SHA2561179aeeafbdaeb7b6ffbc070551c440eb7dfe9786d50dc5beb415bb2f17eded4
SHA5127494ee564de93139b90a4a909a3cfbf8229683f54799698b616ac9fb192f45a1667b7832eef71fb7af87fb490900c7796c2d18e1c242ce4ba10de780b4270d3f