Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 09:57
Static task
static1
Behavioral task
behavioral1
Sample
BurpLoaderKeygen117.jar
Resource
win7-20240708-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
BurpLoaderKeygen117.jar
Resource
win10v2004-20240802-en
8 signatures
150 seconds
General
-
Target
BurpLoaderKeygen117.jar
-
Size
36KB
-
MD5
a3b1b3be59e6d3d374a2d3344213e6c7
-
SHA1
3d0e27962c83c8db2955fa79c27256442c0bcb55
-
SHA256
dcdf28acf360554a5a98d78f403c96ccea500be24b27d02b020e142820637c0a
-
SHA512
6cb93d2af6aa1c62bd8f94c0a7e192cc08ad092724753999c92e8569c9bd76bf8ad254d6eca757decaa7922f7a806143118b90d806de80f3c36eae5e8b8bbe64
-
SSDEEP
768:yG6uWNygZJbmjwB4HC8tyPAR8N4x3kWDuWYkfLb:yGbWNfJbmjSwNY4x9DuQf/
Score
1/10
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2700 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2700 taskmgr.exe Token: SeSystemProfilePrivilege 2700 taskmgr.exe Token: SeCreateGlobalPrivilege 2700 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3960 java.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe 2700 taskmgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3960 java.exe 3960 java.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3960 wrote to memory of 4424 3960 java.exe 93 PID 3960 wrote to memory of 4424 3960 java.exe 93 PID 3960 wrote to memory of 3964 3960 java.exe 102 PID 3960 wrote to memory of 3964 3960 java.exe 102
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\BurpLoaderKeygen117.jar1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Program Files\Java\jre-1.8\bin\java.exe"C:\Program Files\Java\jre-1.8\bin\java.exe" -version2⤵PID:4424
-
-
C:\Program Files\Java\jre-1.8\bin\java.exe"C:\Program Files\Java\jre-1.8\bin\java.exe" -version2⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3364,i,8293235976513689021,7261015831736501466,262144 --variations-seed-version --mojo-platform-channel-handle=4112 /prefetch:81⤵PID:4608
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2700