Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 20:50

General

  • Target

    pvn6ajjl8nf.jar

  • Size

    2.2MB

  • MD5

    8e48fc3bda0bc899ba7c38b5bd2ac165

  • SHA1

    bff45691858d8278b55b46af99ab0b5890564e53

  • SHA256

    648ca4f9c2964bea3e91685a32e0381c803d648cc358b39ae4071fd3be77fed6

  • SHA512

    a807a35eee990b75d85417bdddc3aabbe1275319ccd982c08b7bd929eb175992b96d7728a4615885b1368c9693550968a899b2d308fc8a0c9c3b1420ad7bc5d0

  • SSDEEP

    49152:J1dxsLIha5XhNN9gD3b+V9JqG+XFpJ7JUZRlwxBRR+IMNT58:JZJhhb+Xqd1DJmR6xHlMU

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Windows\system32\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\pvn6ajjl8nf.jar
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1632

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\6dde7932-3b5819ed.dll

    Filesize

    5KB

    MD5

    732880711c61a96f90ce86da9b6c6b02

    SHA1

    5a1506124a768c6e61c7fe2629374432f2aa4327

    SHA256

    3fac7db73b105c20465e965f0a68682166f341dfe624f7c630755e8846b8d992

    SHA512

    e6eea645106f21d90e867f2086656ab91905e4c301bca075304cc35feff9f1e5635966f5652329ebe08f880f550d2e2e0c8079beb48c96deb9438a89d1ec3954

  • memory/1632-37-0x0000000008880000-0x00000000088E6000-memory.dmp

    Filesize

    408KB

  • memory/1632-44-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/1632-21-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/1632-25-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/1632-13-0x0000000001D00000-0x0000000001D0A000-memory.dmp

    Filesize

    40KB

  • memory/1632-34-0x0000000008880000-0x00000000088E6000-memory.dmp

    Filesize

    408KB

  • memory/1632-14-0x0000000001D00000-0x0000000001D0A000-memory.dmp

    Filesize

    40KB

  • memory/1632-35-0x0000000008880000-0x00000000088E6000-memory.dmp

    Filesize

    408KB

  • memory/1632-41-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/1632-2-0x0000000002BE0000-0x0000000002E50000-memory.dmp

    Filesize

    2.4MB

  • memory/1632-47-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/1632-48-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/1632-49-0x0000000002BE0000-0x0000000002E50000-memory.dmp

    Filesize

    2.4MB

  • memory/1632-50-0x0000000001D00000-0x0000000001D0A000-memory.dmp

    Filesize

    40KB

  • memory/1632-51-0x0000000001D00000-0x0000000001D0A000-memory.dmp

    Filesize

    40KB

  • memory/1632-54-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB