Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    111s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/07/2024, 19:49

General

  • Target

    RAT_Builder.jar

  • Size

    23KB

  • MD5

    000f24e4692a1d706d40466be85f4464

  • SHA1

    7ba74d133bb4dd0260ef0332b740dfe266aa2b48

  • SHA256

    4b6d030fd9b8eea5f00ff03dbb7a7330f25b95a17dae0fd635ebdb315b6a9268

  • SHA512

    85778e3317c37501aaa80366884e566221f0de25e124d0c1f33bbcabfbe3bea70c29c969ab22890a7f293856b1324a9d84a99e091dfa064f8424131762fb3f35

  • SSDEEP

    384:f9snDdeDfNfiQm7o8Qob9XTD6CCjRi5bayqI9oM+CB8U5l8GlLEEEKUHUO2OVj:f9snxeTNfUknW2CCFsbH9Z+UkxK9+j

Malware Config

Signatures

  • AdWind

    A Java-based RAT family operated as malware-as-a-service.

  • Class file contains resources related to AdWind 2 IoCs
  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\RAT_Builder.jar
    1⤵
    • Drops startup file
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3680
    • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
      java -jar "C:\Users\Admin\AppData\Roaming\sqlite-jdbc-9.33.3.jar"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:744
      • C:\Windows\SYSTEM32\cmd.exe
        cmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1722109834201.tmp" /f"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3512
        • C:\Windows\system32\reg.exe
          REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1722109834201.tmp" /f
          4⤵
          • Adds Run key to start application
          PID:232
    • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
      java -jar "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sqlite-jdbc-9.31.3.jar"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:2404
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/Vx2HfVhzK8
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4564
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffeeb746f8,0x7fffeeb74708,0x7fffeeb74718
        3⤵
          PID:3212
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,13900007089362394247,10838890670077591042,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:2
          3⤵
            PID:544
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,13900007089362394247,10838890670077591042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4812
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,13900007089362394247,10838890670077591042,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:8
            3⤵
              PID:720
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,13900007089362394247,10838890670077591042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:1
              3⤵
                PID:5092
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,13900007089362394247,10838890670077591042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:1
                3⤵
                  PID:824
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,13900007089362394247,10838890670077591042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:1
                  3⤵
                    PID:2572
              • C:\Windows\System32\CompPkgSrv.exe
                C:\Windows\System32\CompPkgSrv.exe -Embedding
                1⤵
                  PID:3196
                • C:\Windows\System32\CompPkgSrv.exe
                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                  1⤵
                    PID:1712

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

                    Filesize

                    46B

                    MD5

                    e8e3dffe2a5ed4cb42692c7fc1e06dd2

                    SHA1

                    ea15d302b728d113fed06bf9d759fee83d1200d9

                    SHA256

                    8ae38ba9192286e691183d85c380945cd2a028522bf34e76c647a008f5c4b2de

                    SHA512

                    796a82807a847a3062a49e5178f2cd023b18cb9cfd0a365b92868c5c7e4a63b72f3853b3ce191410c8d3785c74aa762b7785bdf81a5d8b26fd72db73aab340f8

                  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

                    Filesize

                    46B

                    MD5

                    f67a6c1e8bca79c5d2d938b1c27b5994

                    SHA1

                    e55d312aa87d416098419af92f505649ad02b11d

                    SHA256

                    438418b46a226501d4e813c55b2f315f7a4ad96d012568dd7a482c8ed85ca8d2

                    SHA512

                    202d89adf9313df2204b24830c1b12bbbd558729659ecf2a2895c1b81c1135541f7cf9291a82372c2dd1b5e3d13f0527b475913372e879c0618da290404c3d22

                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                    Filesize

                    152B

                    MD5

                    10fa19df148444a77ceec60cabd2ce21

                    SHA1

                    685b599c497668166ede4945d8885d204fd8d70f

                    SHA256

                    c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b

                    SHA512

                    3518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef

                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                    Filesize

                    152B

                    MD5

                    75c9f57baeefeecd6c184627de951c1e

                    SHA1

                    52e0468e13cbfc9f15fc62cc27ce14367a996cff

                    SHA256

                    648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f

                    SHA512

                    c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15

                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                    Filesize

                    247B

                    MD5

                    94bd83393ee4e3c749f28c3414160cbc

                    SHA1

                    68effb04ecc392f2ae4ad7bdc1e99b9116da474c

                    SHA256

                    e1dbf44fca250f32925910fcd7f59276e46d0d916eff30fdf9f85ef91bcd3d4b

                    SHA512

                    203109a405cd685a195e6cdae5d0a624abcd6c6a9333b88f312e50f96bafa03057366bd78bf62df8784ec97f14677d56f8b78b472000044618a784bcf7af3e8a

                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                    Filesize

                    5KB

                    MD5

                    a74a290fa56c4d41b7c501aee59faa22

                    SHA1

                    96e298ce29b066d3472c9dcbcafcc18ba1727110

                    SHA256

                    69752e91e18db88469cfd9ee75a06c10401a90393b2add56137f72983d5d1dab

                    SHA512

                    03279e85cde07c8ba3a203b9a02508a7efea9ffd52003c1e77fc090e7bec1c7f099df16e7c9272e942f87966fb4c07b18c54918de76c11c5f863c0b1132741b9

                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                    Filesize

                    6KB

                    MD5

                    09172d36ac69210230a7d59ca96af7b1

                    SHA1

                    8f56d4d7cc1d53b731818c57e4584f2f9048b98e

                    SHA256

                    add72de5a0f82112012da03fb8ee01308e667d0bc8f55e91ac087e90c2ac67d6

                    SHA512

                    8f12a12ff3e8b02d0cd4bb99014aab36ed2cfe2701834ffbd9a9138c9c823232ec8f232c20c58a4e6868676e8548eda2f47bf1e9e60eb4e7c09eadb3bfa378d1

                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                    Filesize

                    10KB

                    MD5

                    0a38c5390dece51c0913b1eff11c2ea0

                    SHA1

                    a3ab6a8cf20df0bb75457d4331ae309efe8b972d

                    SHA256

                    7033a7f7b7645f50ed97c9b12744a81555bfaf9baecb07c8eb44126cb33b5c4f

                    SHA512

                    c6507766b343ac5df9580e6eddd32ccfb470c78bd3b207f76eae71484ff9c37d545c7b1dfa37e6e647bc63baaf1953da2d832e4d47162fb5adc7ec89d749254f

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sqlite-jdbc-9.31.3.jar

                    Filesize

                    639KB

                    MD5

                    d8be150e354464e3f586d5a6e5c6820e

                    SHA1

                    f26d1a563b26339b640552dee3eea1ae88457587

                    SHA256

                    24c7db0fc83c03fe028bbe1c8b6df2bd26a658e2488365baf9c1f9c9c93c5d95

                    SHA512

                    3a9af4e2d11a65088b5b299c178402c76a72c864cae817fda33fecda860a9e1a7f8b1954c5624d79a3ae41ee7976c00346165abfc4523864f2c480fd87cd4277

                  • C:\Users\Admin\AppData\Roaming\sqlite-jdbc-9.33.3.jar

                    Filesize

                    639KB

                    MD5

                    56c6fe91588936bc8e492451f63b627c

                    SHA1

                    1ccc81781f582882cd9076d9c5205fa18492e2c1

                    SHA256

                    a1f840398219c5e8e8ead07198ce9ed5a72c60f4f4805b2ed04abbdef6e28e28

                    SHA512

                    80b9392a78435b6ac5cd7590ae7a6d2ef283f3e890ac5b33f596f87596e1ee3c38e280a6425ee2e56f3811a034e094ddc38921000aaeaed9e5860d2326c868b9

                  • memory/744-126-0x000002BF6B220000-0x000002BF6B221000-memory.dmp

                    Filesize

                    4KB

                  • memory/744-60-0x000002BF6CA40000-0x000002BF6CCB0000-memory.dmp

                    Filesize

                    2.4MB

                  • memory/744-111-0x000002BF6B220000-0x000002BF6B221000-memory.dmp

                    Filesize

                    4KB

                  • memory/744-390-0x000002BF6CA40000-0x000002BF6CCB0000-memory.dmp

                    Filesize

                    2.4MB

                  • memory/2404-95-0x00000236391E0000-0x0000023639450000-memory.dmp

                    Filesize

                    2.4MB

                  • memory/2404-116-0x0000023637930000-0x0000023637931000-memory.dmp

                    Filesize

                    4KB

                  • memory/2404-501-0x00000236391E0000-0x0000023639450000-memory.dmp

                    Filesize

                    2.4MB

                  • memory/3680-33-0x000001C16DD20000-0x000001C16DD21000-memory.dmp

                    Filesize

                    4KB

                  • memory/3680-28-0x000001C16DD20000-0x000001C16DD21000-memory.dmp

                    Filesize

                    4KB

                  • memory/3680-118-0x000001C16DD20000-0x000001C16DD21000-memory.dmp

                    Filesize

                    4KB

                  • memory/3680-48-0x000001C16DD20000-0x000001C16DD21000-memory.dmp

                    Filesize

                    4KB

                  • memory/3680-344-0x000001C16DD40000-0x000001C16DFB0000-memory.dmp

                    Filesize

                    2.4MB

                  • memory/3680-40-0x000001C16DD20000-0x000001C16DD21000-memory.dmp

                    Filesize

                    4KB

                  • memory/3680-2-0x000001C16DD40000-0x000001C16DFB0000-memory.dmp

                    Filesize

                    2.4MB

                  • memory/3680-65-0x000001C16DD20000-0x000001C16DD21000-memory.dmp

                    Filesize

                    4KB

                  • memory/3680-25-0x000001C16DD20000-0x000001C16DD21000-memory.dmp

                    Filesize

                    4KB

                  • memory/3680-23-0x000001C16DD20000-0x000001C16DD21000-memory.dmp

                    Filesize

                    4KB

                  • memory/3680-21-0x000001C16DD20000-0x000001C16DD21000-memory.dmp

                    Filesize

                    4KB

                  • memory/3680-17-0x000001C16DD20000-0x000001C16DD21000-memory.dmp

                    Filesize

                    4KB

                  • memory/3680-11-0x000001C16DD20000-0x000001C16DD21000-memory.dmp

                    Filesize

                    4KB

                  • memory/3680-70-0x000001C16DD20000-0x000001C16DD21000-memory.dmp

                    Filesize

                    4KB

                  • memory/3680-558-0x000001C16DD40000-0x000001C16DFB0000-memory.dmp

                    Filesize

                    2.4MB