Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
111s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 19:49
Static task
static1
Behavioral task
behavioral1
Sample
RAT_Builder.jar
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
RAT_Builder.jar
Resource
win10v2004-20240709-en
General
-
Target
RAT_Builder.jar
-
Size
23KB
-
MD5
000f24e4692a1d706d40466be85f4464
-
SHA1
7ba74d133bb4dd0260ef0332b740dfe266aa2b48
-
SHA256
4b6d030fd9b8eea5f00ff03dbb7a7330f25b95a17dae0fd635ebdb315b6a9268
-
SHA512
85778e3317c37501aaa80366884e566221f0de25e124d0c1f33bbcabfbe3bea70c29c969ab22890a7f293856b1324a9d84a99e091dfa064f8424131762fb3f35
-
SSDEEP
384:f9snDdeDfNfiQm7o8Qob9XTD6CCjRi5bayqI9oM+CB8U5l8GlLEEEKUHUO2OVj:f9snxeTNfUknW2CCFsbH9Z+UkxK9+j
Malware Config
Signatures
-
Class file contains resources related to AdWind 2 IoCs
resource yara_rule sample family_adwind4 sample family_adwind4 -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sqlite-jdbc-9.31.3.jar java.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1722109834201.tmp" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 67 discord.com 68 discord.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3680 java.exe 744 java.exe 2404 java.exe 3680 java.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3680 wrote to memory of 744 3680 java.exe 92 PID 3680 wrote to memory of 744 3680 java.exe 92 PID 3680 wrote to memory of 2404 3680 java.exe 94 PID 3680 wrote to memory of 2404 3680 java.exe 94 PID 744 wrote to memory of 3512 744 java.exe 99 PID 744 wrote to memory of 3512 744 java.exe 99 PID 3512 wrote to memory of 232 3512 cmd.exe 101 PID 3512 wrote to memory of 232 3512 cmd.exe 101 PID 3680 wrote to memory of 4564 3680 java.exe 106 PID 3680 wrote to memory of 4564 3680 java.exe 106 PID 4564 wrote to memory of 3212 4564 msedge.exe 107 PID 4564 wrote to memory of 3212 4564 msedge.exe 107 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 544 4564 msedge.exe 108 PID 4564 wrote to memory of 4812 4564 msedge.exe 109 PID 4564 wrote to memory of 4812 4564 msedge.exe 109 PID 4564 wrote to memory of 720 4564 msedge.exe 110 PID 4564 wrote to memory of 720 4564 msedge.exe 110 PID 4564 wrote to memory of 720 4564 msedge.exe 110 PID 4564 wrote to memory of 720 4564 msedge.exe 110 PID 4564 wrote to memory of 720 4564 msedge.exe 110 PID 4564 wrote to memory of 720 4564 msedge.exe 110 PID 4564 wrote to memory of 720 4564 msedge.exe 110 PID 4564 wrote to memory of 720 4564 msedge.exe 110 PID 4564 wrote to memory of 720 4564 msedge.exe 110 PID 4564 wrote to memory of 720 4564 msedge.exe 110
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\RAT_Builder.jar1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Roaming\sqlite-jdbc-9.33.3.jar"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1722109834201.tmp" /f"3⤵
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1722109834201.tmp" /f4⤵
- Adds Run key to start application
PID:232
-
-
-
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sqlite-jdbc-9.31.3.jar"2⤵
- Suspicious use of SetWindowsHookEx
PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/Vx2HfVhzK82⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffeeb746f8,0x7fffeeb74708,0x7fffeeb747183⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,13900007089362394247,10838890670077591042,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:23⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,13900007089362394247,10838890670077591042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,13900007089362394247,10838890670077591042,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:83⤵PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,13900007089362394247,10838890670077591042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:13⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,13900007089362394247,10838890670077591042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:13⤵PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,13900007089362394247,10838890670077591042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:13⤵PID:2572
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3196
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5e8e3dffe2a5ed4cb42692c7fc1e06dd2
SHA1ea15d302b728d113fed06bf9d759fee83d1200d9
SHA2568ae38ba9192286e691183d85c380945cd2a028522bf34e76c647a008f5c4b2de
SHA512796a82807a847a3062a49e5178f2cd023b18cb9cfd0a365b92868c5c7e4a63b72f3853b3ce191410c8d3785c74aa762b7785bdf81a5d8b26fd72db73aab340f8
-
Filesize
46B
MD5f67a6c1e8bca79c5d2d938b1c27b5994
SHA1e55d312aa87d416098419af92f505649ad02b11d
SHA256438418b46a226501d4e813c55b2f315f7a4ad96d012568dd7a482c8ed85ca8d2
SHA512202d89adf9313df2204b24830c1b12bbbd558729659ecf2a2895c1b81c1135541f7cf9291a82372c2dd1b5e3d13f0527b475913372e879c0618da290404c3d22
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
247B
MD594bd83393ee4e3c749f28c3414160cbc
SHA168effb04ecc392f2ae4ad7bdc1e99b9116da474c
SHA256e1dbf44fca250f32925910fcd7f59276e46d0d916eff30fdf9f85ef91bcd3d4b
SHA512203109a405cd685a195e6cdae5d0a624abcd6c6a9333b88f312e50f96bafa03057366bd78bf62df8784ec97f14677d56f8b78b472000044618a784bcf7af3e8a
-
Filesize
5KB
MD5a74a290fa56c4d41b7c501aee59faa22
SHA196e298ce29b066d3472c9dcbcafcc18ba1727110
SHA25669752e91e18db88469cfd9ee75a06c10401a90393b2add56137f72983d5d1dab
SHA51203279e85cde07c8ba3a203b9a02508a7efea9ffd52003c1e77fc090e7bec1c7f099df16e7c9272e942f87966fb4c07b18c54918de76c11c5f863c0b1132741b9
-
Filesize
6KB
MD509172d36ac69210230a7d59ca96af7b1
SHA18f56d4d7cc1d53b731818c57e4584f2f9048b98e
SHA256add72de5a0f82112012da03fb8ee01308e667d0bc8f55e91ac087e90c2ac67d6
SHA5128f12a12ff3e8b02d0cd4bb99014aab36ed2cfe2701834ffbd9a9138c9c823232ec8f232c20c58a4e6868676e8548eda2f47bf1e9e60eb4e7c09eadb3bfa378d1
-
Filesize
10KB
MD50a38c5390dece51c0913b1eff11c2ea0
SHA1a3ab6a8cf20df0bb75457d4331ae309efe8b972d
SHA2567033a7f7b7645f50ed97c9b12744a81555bfaf9baecb07c8eb44126cb33b5c4f
SHA512c6507766b343ac5df9580e6eddd32ccfb470c78bd3b207f76eae71484ff9c37d545c7b1dfa37e6e647bc63baaf1953da2d832e4d47162fb5adc7ec89d749254f
-
Filesize
639KB
MD5d8be150e354464e3f586d5a6e5c6820e
SHA1f26d1a563b26339b640552dee3eea1ae88457587
SHA25624c7db0fc83c03fe028bbe1c8b6df2bd26a658e2488365baf9c1f9c9c93c5d95
SHA5123a9af4e2d11a65088b5b299c178402c76a72c864cae817fda33fecda860a9e1a7f8b1954c5624d79a3ae41ee7976c00346165abfc4523864f2c480fd87cd4277
-
Filesize
639KB
MD556c6fe91588936bc8e492451f63b627c
SHA11ccc81781f582882cd9076d9c5205fa18492e2c1
SHA256a1f840398219c5e8e8ead07198ce9ed5a72c60f4f4805b2ed04abbdef6e28e28
SHA51280b9392a78435b6ac5cd7590ae7a6d2ef283f3e890ac5b33f596f87596e1ee3c38e280a6425ee2e56f3811a034e094ddc38921000aaeaed9e5860d2326c868b9