Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
86s -
max time network
78s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 10:07 UTC
Static task
static1
Behavioral task
behavioral1
Sample
MavenBuilder.jar
Resource
win7-20240704-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
MavenBuilder.jar
Resource
win10v2004-20240802-en
2 signatures
150 seconds
General
-
Target
MavenBuilder.jar
-
Size
2.1MB
-
MD5
376394c56d388e58e9f7829fc7f322e4
-
SHA1
7b86c4ad2b608c8b9f96151de343c7a81f94a607
-
SHA256
5d7976bf99be502e7be886efc49e856c18a1044f8f07f04e126a1ca6c4d859db
-
SHA512
408f0c1df8ed54c957b017bff7ffb6be2ad85908558587bab2e368d09e30f157e88c465c98b5f41e6e3aaccfaf46dba0d09f5ceeec64d309bcde582cef1ac54e
-
SSDEEP
24576:X75bTEtGYmz21748pVEpHiaSvITYU+D8fgOxh/lC44TXnUpOmIZUrm1vIGIZU1y4:X75VxKnoHiF5U/fL3wX7msUrm1v23yoA
Score
6/10
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 58 discord.com 59 discord.com 60 discord.com 62 discord.com -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1888 java.exe 1888 java.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\MavenBuilder.jar1⤵
- Suspicious use of SetWindowsHookEx
PID:1888
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4128,i,13995403245988825027,7033610968827661507,262144 --variations-seed-version --mojo-platform-channel-handle=4104 /prefetch:81⤵PID:3168
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request209.205.72.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request81.144.22.2.in-addr.arpaIN PTRResponse81.144.22.2.in-addr.arpaIN PTRa2-22-144-81deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request14.160.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request43.58.199.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.165.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request48.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request73.144.22.2.in-addr.arpaIN PTRResponse73.144.22.2.in-addr.arpaIN PTRa2-22-144-73deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestdiscord.comIN AResponsediscord.comIN A162.159.135.232discord.comIN A162.159.128.233discord.comIN A162.159.136.232discord.comIN A162.159.138.232discord.comIN A162.159.137.232
-
Remote address:8.8.8.8:53Request232.135.159.162.in-addr.arpaIN PTRResponse
-
1.1kB 5.0kB 9 10
-
1.7kB 2.1kB 8 6
-
1.3kB 2.1kB 7 6
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
209.205.72.20.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
81.144.22.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
14.160.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
43.58.199.20.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
26.165.165.52.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.214.232.199.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
48.229.111.52.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
73.144.22.2.in-addr.arpa
-
57 B 137 B 1 1
DNS Request
discord.com
DNS Response
162.159.135.232162.159.128.233162.159.136.232162.159.138.232162.159.137.232
-
74 B 136 B 1 1
DNS Request
232.135.159.162.in-addr.arpa