Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
6asset_pack.jar
windows10-1703-x64
7com.vector...ay.apk
windows10-1703-x64
3config.arm64_v8a.jar
windows10-1703-x64
7config.bn.jar
windows10-1703-x64
7config.en.jar
windows10-1703-x64
7config.gu.jar
windows10-1703-x64
7config.hi.jar
windows10-1703-x64
7config.kn.jar
windows10-1703-x64
7config.mdpi.jar
windows10-1703-x64
7config.mr.jar
windows10-1703-x64
7config.ta.jar
windows10-1703-x64
7config.te.jar
windows10-1703-x64
7BlueStacks..._0.exe
windows10-1703-x64
4BlueStacks..._0.exe
windows10-1703-x64
4Analysis
-
max time kernel
22s -
max time network
17s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
08/09/2024, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
asset_pack.jar
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
com.vectorunit.cobalt.googleplay.apk
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
config.arm64_v8a.jar
Resource
win10-20240611-en
Behavioral task
behavioral4
Sample
config.bn.jar
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
config.en.jar
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
config.gu.jar
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
config.hi.jar
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
config.kn.jar
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
config.mdpi.jar
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
config.mr.jar
Resource
win10-20240611-en
Behavioral task
behavioral11
Sample
config.ta.jar
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
config.te.jar
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
BlueStacks10Installer_0.17.10.6_native_1ad3425415ee2f3e264a6d79df856ea0_0.exe
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
BlueStacksInstaller_5.9.0.1061_native_24ebeaaa739760b7c03556153d168771_0.exe
Resource
win10-20240404-en
General
-
Target
config.ta.jar
-
Size
32KB
-
MD5
213bfaaffc4cbefdbb866ca3890eef0f
-
SHA1
8b688fa7cf9d7785653cb72f37372376684ab246
-
SHA256
71b82b101a10393c403bce88703d276f42a685bb255f64589166bfeb6c00b9c4
-
SHA512
37633f93dc3b18c050b555cc1161db7149a3f14d700f1c36c60e08c99bfbae9e3ef7f8d9fb264b86b0d33736914c1327c3a07c1ac3a8feea86cc819da87d4f5f
-
SSDEEP
384:YP5OIgzCeQoEBrFshdhJ1e1T7w55SjE1H9yOby81ii1381iiMgC1OVW:YP72ko6rFshdhJ1e1TdK4ia4bgCR
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1808 icacls.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4788 wrote to memory of 1808 4788 java.exe 76 PID 4788 wrote to memory of 1808 4788 java.exe 76
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\config.ta.jar1⤵
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:1808
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5d8ce6d06d4f32122f5a7a509f84b6d01
SHA1ec3f5efd8b10f94e0aa0900ef2aa942e27b004cb
SHA256be6335d8d9d11e898a53f08718e1efd6feff07b54e39357c29369bceca4bd45e
SHA512447709f9e941ed6bbbec133cde19656b16eae046556e3090bfbe7ef7b65235c27391f1be5ee6a2d2c3f06ab8b61d7ec5ac7d62002b82f5f943db7838dd7d3e7c