Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3rebuilder.exe
windows10-1703-x64
3tool/core.jar
windows10-1703-x64
7tool/cyggcc_s-1.dll
windows10-1703-x64
3tool/cygwin1.dll
windows10-1703-x64
3tool/cygz.dll
windows10-1703-x64
3tool/dklic...or.exe
windows10-1703-x64
1tool/klic_...er.exe
windows10-1703-x64
1tool/rap2rifkey.exe
windows10-1703-x64
3tool/scetool.exe
windows10-1703-x64
3tool/sfk.exe
windows10-1703-x64
3Analysis
-
max time kernel
315s -
max time network
1590s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
12/10/2024, 11:53
Static task
static1
Behavioral task
behavioral1
Sample
rebuilder.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
tool/core.jar
Resource
win10-20240611-en
Behavioral task
behavioral3
Sample
tool/cyggcc_s-1.dll
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
tool/cygwin1.dll
Resource
win10-20240611-en
Behavioral task
behavioral5
Sample
tool/cygz.dll
Resource
win10-20240611-en
Behavioral task
behavioral6
Sample
tool/dklic_validator.exe
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
tool/klic_bruteforcer.exe
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
tool/rap2rifkey.exe
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
tool/scetool.exe
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
tool/sfk.exe
Resource
win10-20240404-en
General
-
Target
tool/core.jar
-
Size
203KB
-
MD5
62203beef5fcee9677adfee43ad15149
-
SHA1
e6c42ec4a508222b2a386f107e7f7fe4bce3e9cf
-
SHA256
e7463c81592d4d4154bd04b14af0b30845fbc8962c8ff31f18a757005e552ca1
-
SHA512
e3f488dc31c9e4e74a99e50bc30e8d68ab50fcfaad618300cd291151649b08249ace5ed2e95357d3c632fe574e640f8f5404345b8218efe4c4cefd6fa382243a
-
SSDEEP
3072:XMd3zuBWGJC6rlGU4yW7tpwftAdOPizee6gE9H+Ehal6n2wqWey5EN9DvoN+RBXT:cR6+be2mgEMExYpxXCOY2ZAVn0PBPx
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3464 icacls.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2148 wrote to memory of 3464 2148 java.exe 71 PID 2148 wrote to memory of 3464 2148 java.exe 71
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\tool\core.jar1⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:3464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5299cf30e0e88bf7c8dd1422afbac9077
SHA1de3688c8b27d4ff02e2aa503adade2c17d66566b
SHA2565b3a1ae157cd85a2da11f942bb093dc7fe83339e47d9e06c04c56bc28aa1c46a
SHA512132d9a2836c360723da293f6f3f4dadebceebe3c116e9788d75f71dc376b8333f67b5f6e1b79ece4d73a15aa922743b5ab51f140e673f6402b9156f02de23bcb