Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
135s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
20/07/2024, 12:31
Static task
static1
Behavioral task
behavioral1
Sample
test.jar
Resource
win10-20240404-en
2 signatures
150 seconds
General
-
Target
test.jar
-
Size
1KB
-
MD5
d58f1665e3018312f03bee7d77c2e419
-
SHA1
ac0d199e2452a51143d736f1ce441d0225f624de
-
SHA256
92d5ad300307cc7b81c24b60291ebe15784d753dd316361e2d96142e50b9ae24
-
SHA512
4e52a3065493093c2e44ab440b9e8d9e62a030287d51ebcc70c379dc02fe8d8c3eab88f5e8f1c275abe6cc6af1380b60a9a85e8dcb97f75b09916aff534f470b
Score
7/10
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3872 icacls.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 3872 2084 java.exe 74 PID 2084 wrote to memory of 3872 2084 java.exe 74 PID 1100 wrote to memory of 4104 1100 cmd.exe 83 PID 1100 wrote to memory of 4104 1100 cmd.exe 83
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\test.jar1⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:3872
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:200
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar test.jar2⤵PID:4104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5c63585074bd78dc1ccd11c29046cdf14
SHA1af6a162bbd9ee0c141f0ea02c3cb7c9c11b2232a
SHA2562271cae71368c71192b150112dc5fa77bd5476f7e872d7bb21f1621a4964ed82
SHA512ee97f72c688fb0337fb3d02f9b8cd1374000a51c49fc8a11847e8475248b860296699955fb7144d1c19100ad0ad027c0127ed8130b78f7b953d67e136749ebd1