Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2024, 14:07

General

  • Target

    6f74ddc1c5f896cb9641d19e267b9fb7d637b0d30c2c95b4254694b0326277de.jar

  • Size

    710KB

  • MD5

    0e3cb40e42e861f82c3886515d93ad0a

  • SHA1

    285f665621de2834f29a94b2a3ed748ec2521b45

  • SHA256

    6f74ddc1c5f896cb9641d19e267b9fb7d637b0d30c2c95b4254694b0326277de

  • SHA512

    cd61d6ab25bf3652513911f49e5bf2c79c0a9387dc2bc504ef6391054a1ae7a368b9b2335ad4a42cf0aabbb18e90d2274efb4874cc4f01e49b707af92b186a6f

  • SSDEEP

    12288:hEEOb65FAnQIp7TWqKgJ+p5YUdl1Y6FpAoDg/SM36N4hCfDhgDbo1Wql:hy6FATo++9l1JFpAkSSrj7aP0Wql

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\6f74ddc1c5f896cb9641d19e267b9fb7d637b0d30c2c95b4254694b0326277de.jar
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4728
    • C:\Windows\SYSTEM32\attrib.exe
      attrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1728914828209.tmp
      2⤵
      • Views/modifies file attributes
      PID:1184
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1728914828209.tmp" /f"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:764
      • C:\Windows\system32\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1728914828209.tmp" /f
        3⤵
        • Adds Run key to start application
        PID:4476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1728914828209.tmp

    Filesize

    710KB

    MD5

    0e3cb40e42e861f82c3886515d93ad0a

    SHA1

    285f665621de2834f29a94b2a3ed748ec2521b45

    SHA256

    6f74ddc1c5f896cb9641d19e267b9fb7d637b0d30c2c95b4254694b0326277de

    SHA512

    cd61d6ab25bf3652513911f49e5bf2c79c0a9387dc2bc504ef6391054a1ae7a368b9b2335ad4a42cf0aabbb18e90d2274efb4874cc4f01e49b707af92b186a6f

  • memory/4728-44-0x00000226803B0000-0x00000226803B1000-memory.dmp

    Filesize

    4KB

  • memory/4728-46-0x0000022681E70000-0x0000022681E80000-memory.dmp

    Filesize

    64KB

  • memory/4728-20-0x0000022681E70000-0x0000022681E80000-memory.dmp

    Filesize

    64KB

  • memory/4728-21-0x0000022681E80000-0x0000022681E90000-memory.dmp

    Filesize

    64KB

  • memory/4728-24-0x0000022681E90000-0x0000022681EA0000-memory.dmp

    Filesize

    64KB

  • memory/4728-25-0x0000022681EA0000-0x0000022681EB0000-memory.dmp

    Filesize

    64KB

  • memory/4728-27-0x0000022681EB0000-0x0000022681EC0000-memory.dmp

    Filesize

    64KB

  • memory/4728-15-0x0000022681E50000-0x0000022681E60000-memory.dmp

    Filesize

    64KB

  • memory/4728-31-0x0000022681EC0000-0x0000022681ED0000-memory.dmp

    Filesize

    64KB

  • memory/4728-33-0x0000022681ED0000-0x0000022681EE0000-memory.dmp

    Filesize

    64KB

  • memory/4728-47-0x0000022681E80000-0x0000022681E90000-memory.dmp

    Filesize

    64KB

  • memory/4728-39-0x0000022681EE0000-0x0000022681EF0000-memory.dmp

    Filesize

    64KB

  • memory/4728-40-0x00000226803B0000-0x00000226803B1000-memory.dmp

    Filesize

    4KB

  • memory/4728-43-0x0000022681EF0000-0x0000022681F00000-memory.dmp

    Filesize

    64KB

  • memory/4728-42-0x0000022681E50000-0x0000022681E60000-memory.dmp

    Filesize

    64KB

  • memory/4728-2-0x0000022681BE0000-0x0000022681E50000-memory.dmp

    Filesize

    2.4MB

  • memory/4728-17-0x0000022681E60000-0x0000022681E70000-memory.dmp

    Filesize

    64KB

  • memory/4728-45-0x0000022681E60000-0x0000022681E70000-memory.dmp

    Filesize

    64KB

  • memory/4728-38-0x0000022681BE0000-0x0000022681E50000-memory.dmp

    Filesize

    2.4MB

  • memory/4728-49-0x0000022681E90000-0x0000022681EA0000-memory.dmp

    Filesize

    64KB

  • memory/4728-50-0x0000022681EA0000-0x0000022681EB0000-memory.dmp

    Filesize

    64KB

  • memory/4728-51-0x0000022681EB0000-0x0000022681EC0000-memory.dmp

    Filesize

    64KB

  • memory/4728-53-0x0000022681EC0000-0x0000022681ED0000-memory.dmp

    Filesize

    64KB

  • memory/4728-54-0x0000022681ED0000-0x0000022681EE0000-memory.dmp

    Filesize

    64KB

  • memory/4728-56-0x0000022681EE0000-0x0000022681EF0000-memory.dmp

    Filesize

    64KB

  • memory/4728-57-0x0000022681EF0000-0x0000022681F00000-memory.dmp

    Filesize

    64KB

  • memory/4728-65-0x0000022681F00000-0x0000022681F10000-memory.dmp

    Filesize

    64KB

  • memory/4728-67-0x0000022681F00000-0x0000022681F10000-memory.dmp

    Filesize

    64KB

  • memory/4728-69-0x0000022681F10000-0x0000022681F20000-memory.dmp

    Filesize

    64KB

  • memory/4728-70-0x0000022681F10000-0x0000022681F20000-memory.dmp

    Filesize

    64KB

  • memory/4728-73-0x0000022681F20000-0x0000022681F30000-memory.dmp

    Filesize

    64KB

  • memory/4728-74-0x0000022681F20000-0x0000022681F30000-memory.dmp

    Filesize

    64KB

  • memory/4728-76-0x0000022681F30000-0x0000022681F40000-memory.dmp

    Filesize

    64KB

  • memory/4728-78-0x0000022681F30000-0x0000022681F40000-memory.dmp

    Filesize

    64KB