Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
19s -
max time network
17s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-es -
resource tags
arch:x64arch:x86image:win10v2004-20240802-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
21/08/2024, 22:25
Static task
static1
Behavioral task
behavioral1
Sample
Fire-Editor-Awakening.jar
Resource
win10v2004-20240802-es
4 signatures
1800 seconds
General
-
Target
Fire-Editor-Awakening.jar
-
Size
15.4MB
-
MD5
134a6d900c78e7432767cb9c5bd3c09a
-
SHA1
0d7150540853c9e22fd3c66981a7d882ee7966f2
-
SHA256
46c46e45d2ccd2c2660cd01c0e8350b33f44c45241125b00bd6b78e0ba7a9142
-
SHA512
e68f90fe29a3bf774354f6e687dea8ef1bcbc4d86acc1080a6b099a0acfbb97cb6433bcdcca7871133f748da66bd99c1d75997c153921cb838c64bbd84859069
-
SSDEEP
393216:ONrH4fHtQIrs/qc8ze4lUjMKG6lW0F3ka5n/MfSn9i0KcGj:O5we7/q8R/+GVHGj
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00001.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.jfm svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jcp svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.log svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jtx svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSStmp.log svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00002.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings mspaint.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 736 mspaint.exe 736 mspaint.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 736 mspaint.exe 660 OpenWith.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\Fire-Editor-Awakening.jar1⤵PID:3160
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\OptimizeAssert.jfif" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:736
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc1⤵
- Drops file in System32 directory
PID:2588
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:660