Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
37s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 16:27
Static task
static1
Behavioral task
behavioral1
Sample
fabric-installer-1.0.1.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
fabric-installer-1.0.1.exe
Resource
win10v2004-20240426-en
General
-
Target
fabric-installer-1.0.1.exe
-
Size
449KB
-
MD5
7f0502234a4af4bb9ee0b35ee38b8711
-
SHA1
e708d55f12586a153770bafa4b7fbfa8441b1409
-
SHA256
d90987a8f7a56cd9c09f69585de0ee6241c326f5b41399b2a8319d03fe6ce64e
-
SHA512
4dc60b1c4da89d3f40456ca54665c797816e42fa1e44e9b2873f799ccf2a4f834732b2854e3f8491e1ab1be562e7d7528fef19acb49d072a63a668e7e5468320
-
SSDEEP
6144:nI+0wPnAFavZtK9qEgsdjMpgmo6KlspZpP5OLhmsGpAiXx74syabpA+J:BPnAFSS36lKmPpemsGmiXxVfnJ
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 228 javaw.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4848 icacls.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 228 javaw.exe 228 javaw.exe 228 javaw.exe 228 javaw.exe 228 javaw.exe 228 javaw.exe 228 javaw.exe 228 javaw.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4300 wrote to memory of 2712 4300 fabric-installer-1.0.1.exe 82 PID 4300 wrote to memory of 2712 4300 fabric-installer-1.0.1.exe 82 PID 2712 wrote to memory of 4848 2712 javaw.exe 84 PID 2712 wrote to memory of 4848 2712 javaw.exe 84 PID 4300 wrote to memory of 228 4300 fabric-installer-1.0.1.exe 86 PID 4300 wrote to memory of 228 4300 fabric-installer-1.0.1.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\fabric-installer-1.0.1.exe"C:\Users\Admin\AppData\Local\Temp\fabric-installer-1.0.1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe"javaw.exe" "-version"2⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:4848
-
-
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe"javaw.exe" "-jar" "C:\Users\Admin\AppData\Local\Temp\fabric-installer-1.0.1.exe" "-fabricInstallerBootstrap" "true"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5728b120ce8c45106cc7ef897a06d9ed8
SHA112c515d928acce84797adae797104e0135ae9615
SHA25635463a280c8a359f864c6fb205fad6f8e6d42355e45c51f3350b2c086c06f730
SHA51220cc1741f521c4668681c5d2f29f084c35902acac8af2ed2271d9c7d5115e040d4938bd06b1e6caa7484e20446534a7fa3af4b68490bfed01f898b774f0410d7
-
Filesize
9KB
MD52a4edd64e186969b56c571c6889b450b
SHA16dffeccb4f7f65d0fedc965bea8e1494375a3d9f
SHA25632a9cbd598dfd72ee53e60c79c195306afd19acc65c8fc1db6d33833d1550f25
SHA512e3ff5a86dccba08caff1ee17bdf9a33a1e0a43e0ab669a23e0eb8f9d8f85d1383ec959d7cde6ef6b40fe58ae02a795761fdd36769aaf202c0ff5d2eda1d1510a