Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/10/2024, 19:40

General

  • Target

    7a11f106c159e995601f6acf7cb5bf9a78f9e766a97eb63502cb9666febc7a6e.jar

  • Size

    23.4MB

  • MD5

    f476422a60511cd61f6754728580ce34

  • SHA1

    370946c72b96148d33fb436a527becc9ab291b03

  • SHA256

    7a11f106c159e995601f6acf7cb5bf9a78f9e766a97eb63502cb9666febc7a6e

  • SHA512

    8fae7bc1a0a568b0dd4a30c21be8d8d9da1fcdc6dcc3fd5ee1c5dab940ecf2539b9fadc2e5a597d0177c19a6cad27e7619ed7174f54e0d390e5fb419b7d49d48

  • SSDEEP

    393216:Uj2fnuMWx2Y+fTS66Na4CUid5EYa9fL8kE/Yiuyw6iPhRD/IBRsme1eZrWl+9p:CquP2Y/fDCdfElCV/tw6i5qBioKUP

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\7a11f106c159e995601f6acf7cb5bf9a78f9e766a97eb63502cb9666febc7a6e.jar
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4944
    • C:\Program Files\Java\jre-1.8\bin\javaw.exe
      "C:\Program Files\Java\jre-1.8\bin\javaw" -jar "C:\Users\Admin\AppData\Local\Temp\7a11f106c159e995601f6acf7cb5bf9a78f9e766a97eb63502cb9666febc7a6e.jar" DELAY:3
      2⤵
      • Drops startup file
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3296
      • C:\Windows\SYSTEM32\netsh.exe
        netsh wlan show networks mode=bssid
        3⤵
        • Event Triggered Execution: Netsh Helper DLL
        PID:4784
      • C:\Windows\SYSTEM32\netsh.exe
        netsh wlan show networks mode=bssid
        3⤵
        • Event Triggered Execution: Netsh Helper DLL
        PID:5028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    e3ff088837a6eade013aaec01f4990e0

    SHA1

    806006cf83af4c1578dd07b848cb3e5b1bcf3bdf

    SHA256

    8912abe545adf6bd42aad43d0cb841ac04f6428f6ffd23d950c814367295813d

    SHA512

    d6ce3f416cc123f1309896efabe7ae149ed5453dde6fbbaab4c97dfe5807cf36185afc828e8a2f5f7a6247687c8bc69056bf18d12c9d88df08061bb09d61f104

  • C:\Users\Admin\AppData\Local\Temp\6E72000F92.sql

    Filesize

    40KB

    MD5

    a182561a527f929489bf4b8f74f65cd7

    SHA1

    8cd6866594759711ea1836e86a5b7ca64ee8911f

    SHA256

    42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

    SHA512

    9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

  • C:\Users\Admin\AppData\Local\Temp\JNativeHook-385777659FA84E94A3812EB9A8AFAD27AE3CEED4.x86_64.dll

    Filesize

    80KB

    MD5

    e9a449971b9efb0a2e12b9cfdd95c076

    SHA1

    385777659fa84e94a3812eb9a8afad27ae3ceed4

    SHA256

    b8c331c9f915960201da9af9c9dc8309e95e7d533741e71f4a5d13ca007d3e18

    SHA512

    bbcaf66b316cb60c63bb190099bee36a0059f13fa35fdf3a9a3e7e9a5304abe57acd71d644cde554427825249b460d58f0aba79f599f0c6fa40d23ea21aa941d

  • C:\Users\Admin\AppData\Local\Temp\jna-63116079\jna7658798194763917857.dll

    Filesize

    248KB

    MD5

    4de85f9679c3a75f6d7d3e56094aa106

    SHA1

    052f62fb2ebec89fbe412db480865910eab693ad

    SHA256

    3d1b2427b45ff5178bbb4db395758bedd3a1e91121ebb3e3640b5c4e20eb22cc

    SHA512

    e8357eabd548ffeba42715d891b9e1ed22b7bf720f48b1888407b9ebe7a796719c60a38f4fb8bb1cf32d3c9bed210a07cc227424ef991d356ec3acef9e6223ab

  • C:\Users\Admin\AppData\Local\Temp\sqlite-3.36.0.3-aa7ad762-fba3-4a10-bc50-0b3a1fe92958-sqlitejdbc.dll

    Filesize

    847KB

    MD5

    71eb6b5dbae2f9266a876be1af8dc00c

    SHA1

    364b79fe0a21c9f9827b298d187b493f5f14ce71

    SHA256

    b0c53ebfcddc4031daad36aac9a2967921703431deba5e51234da5008ae45b2a

    SHA512

    0a27205fcc33f482f59aea22de02ba3a9a1981bd28adee97ba3702026f27c760350f5df34e5982f763b608867892d5d4cebb1e13efb159fc3eef431772e37b12

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2878641211-696417878-3864914810-1000\83aa4cc77f591dfc2374580bbd95f6ba_4fc725d8-4f7d-4884-b878-08bb0ce6c800

    Filesize

    45B

    MD5

    c8366ae350e7019aefc9d1e6e6a498c6

    SHA1

    5731d8a3e6568a5f2dfbbc87e3db9637df280b61

    SHA256

    11e6aca8e682c046c83b721eeb5c72c5ef03cb5936c60df6f4993511ddc61238

    SHA512

    33c980d5a638bfc791de291ebf4b6d263b384247ab27f261a54025108f2f85374b579a026e545f81395736dd40fa4696f2163ca17640dd47f1c42bc9971b18cd

  • memory/3296-101-0x00000104E18D0000-0x00000104E18E0000-memory.dmp

    Filesize

    64KB

  • memory/3296-104-0x00000104E18E0000-0x00000104E18F0000-memory.dmp

    Filesize

    64KB

  • memory/3296-288-0x00000104E1970000-0x00000104E1980000-memory.dmp

    Filesize

    64KB

  • memory/3296-282-0x00000104E1960000-0x00000104E1970000-memory.dmp

    Filesize

    64KB

  • memory/3296-36-0x00000104E15C0000-0x00000104E1830000-memory.dmp

    Filesize

    2.4MB

  • memory/3296-281-0x00000104E1950000-0x00000104E1960000-memory.dmp

    Filesize

    64KB

  • memory/3296-46-0x00000104E15A0000-0x00000104E15A1000-memory.dmp

    Filesize

    4KB

  • memory/3296-279-0x00000104E1940000-0x00000104E1950000-memory.dmp

    Filesize

    64KB

  • memory/3296-276-0x00000104E1930000-0x00000104E1940000-memory.dmp

    Filesize

    64KB

  • memory/3296-58-0x00000104E1830000-0x00000104E1840000-memory.dmp

    Filesize

    64KB

  • memory/3296-271-0x00000104E1920000-0x00000104E1930000-memory.dmp

    Filesize

    64KB

  • memory/3296-270-0x00000104E1910000-0x00000104E1920000-memory.dmp

    Filesize

    64KB

  • memory/3296-67-0x00000104E1860000-0x00000104E1870000-memory.dmp

    Filesize

    64KB

  • memory/3296-267-0x00000104E1900000-0x00000104E1910000-memory.dmp

    Filesize

    64KB

  • memory/3296-64-0x00000104E1850000-0x00000104E1860000-memory.dmp

    Filesize

    64KB

  • memory/3296-63-0x00000104E1840000-0x00000104E1850000-memory.dmp

    Filesize

    64KB

  • memory/3296-71-0x00000104E1870000-0x00000104E1880000-memory.dmp

    Filesize

    64KB

  • memory/3296-263-0x00000104E18F0000-0x00000104E1900000-memory.dmp

    Filesize

    64KB

  • memory/3296-103-0x00000104E1870000-0x00000104E1880000-memory.dmp

    Filesize

    64KB

  • memory/3296-73-0x00000104E1880000-0x00000104E1890000-memory.dmp

    Filesize

    64KB

  • memory/3296-214-0x00000104E18E0000-0x00000104E18F0000-memory.dmp

    Filesize

    64KB

  • memory/3296-191-0x00000104E15A0000-0x00000104E15A1000-memory.dmp

    Filesize

    4KB

  • memory/3296-182-0x00000104E15A0000-0x00000104E15A1000-memory.dmp

    Filesize

    4KB

  • memory/3296-184-0x00000104E15A0000-0x00000104E15A1000-memory.dmp

    Filesize

    4KB

  • memory/3296-187-0x00000104E15A0000-0x00000104E15A1000-memory.dmp

    Filesize

    4KB

  • memory/3296-83-0x00000104E15C0000-0x00000104E1830000-memory.dmp

    Filesize

    2.4MB

  • memory/3296-84-0x00000104E1890000-0x00000104E18A0000-memory.dmp

    Filesize

    64KB

  • memory/3296-163-0x00000104E15A0000-0x00000104E15A1000-memory.dmp

    Filesize

    4KB

  • memory/3296-93-0x00000104E18A0000-0x00000104E18B0000-memory.dmp

    Filesize

    64KB

  • memory/3296-92-0x00000104E1830000-0x00000104E1840000-memory.dmp

    Filesize

    64KB

  • memory/3296-95-0x00000104E1840000-0x00000104E1850000-memory.dmp

    Filesize

    64KB

  • memory/3296-98-0x00000104E1850000-0x00000104E1860000-memory.dmp

    Filesize

    64KB

  • memory/3296-97-0x00000104E18C0000-0x00000104E18D0000-memory.dmp

    Filesize

    64KB

  • memory/3296-96-0x00000104E18B0000-0x00000104E18C0000-memory.dmp

    Filesize

    64KB

  • memory/3296-177-0x00000104E15A0000-0x00000104E15A1000-memory.dmp

    Filesize

    4KB

  • memory/3296-100-0x00000104E1860000-0x00000104E1870000-memory.dmp

    Filesize

    64KB

  • memory/3296-175-0x00000104E15A0000-0x00000104E15A1000-memory.dmp

    Filesize

    4KB

  • memory/3296-107-0x00000104E18F0000-0x00000104E1900000-memory.dmp

    Filesize

    64KB

  • memory/3296-161-0x00000104E15A0000-0x00000104E15A1000-memory.dmp

    Filesize

    4KB

  • memory/3296-106-0x00000104E1880000-0x00000104E1890000-memory.dmp

    Filesize

    64KB

  • memory/3296-112-0x00000104E1900000-0x00000104E1910000-memory.dmp

    Filesize

    64KB

  • memory/3296-118-0x00000104E1920000-0x00000104E1930000-memory.dmp

    Filesize

    64KB

  • memory/3296-117-0x00000104E1910000-0x00000104E1920000-memory.dmp

    Filesize

    64KB

  • memory/3296-126-0x00000104E1940000-0x00000104E1950000-memory.dmp

    Filesize

    64KB

  • memory/3296-125-0x00000104E1930000-0x00000104E1940000-memory.dmp

    Filesize

    64KB

  • memory/3296-124-0x00000104E1890000-0x00000104E18A0000-memory.dmp

    Filesize

    64KB

  • memory/3296-127-0x00000104E18A0000-0x00000104E18B0000-memory.dmp

    Filesize

    64KB

  • memory/3296-121-0x00000104E15A0000-0x00000104E15A1000-memory.dmp

    Filesize

    4KB

  • memory/3296-132-0x00000104E1960000-0x00000104E1970000-memory.dmp

    Filesize

    64KB

  • memory/3296-131-0x00000104E1950000-0x00000104E1960000-memory.dmp

    Filesize

    64KB

  • memory/3296-130-0x00000104E18C0000-0x00000104E18D0000-memory.dmp

    Filesize

    64KB

  • memory/3296-129-0x00000104E18B0000-0x00000104E18C0000-memory.dmp

    Filesize

    64KB

  • memory/3296-134-0x00000104E1970000-0x00000104E1980000-memory.dmp

    Filesize

    64KB

  • memory/3296-133-0x00000104E18D0000-0x00000104E18E0000-memory.dmp

    Filesize

    64KB

  • memory/3296-141-0x00000104E15A0000-0x00000104E15A1000-memory.dmp

    Filesize

    4KB

  • memory/4944-69-0x0000025D80290000-0x0000025D802A0000-memory.dmp

    Filesize

    64KB

  • memory/4944-22-0x0000025D80270000-0x0000025D80280000-memory.dmp

    Filesize

    64KB

  • memory/4944-29-0x0000025D802B0000-0x0000025D802C0000-memory.dmp

    Filesize

    64KB

  • memory/4944-2-0x0000025D80000000-0x0000025D80270000-memory.dmp

    Filesize

    2.4MB

  • memory/4944-80-0x0000025D80000000-0x0000025D80270000-memory.dmp

    Filesize

    2.4MB

  • memory/4944-79-0x0000025D802D0000-0x0000025D802E0000-memory.dmp

    Filesize

    64KB

  • memory/4944-78-0x0000025D802C0000-0x0000025D802D0000-memory.dmp

    Filesize

    64KB

  • memory/4944-77-0x0000025DFBE50000-0x0000025DFBE51000-memory.dmp

    Filesize

    4KB

  • memory/4944-75-0x0000025D802B0000-0x0000025D802C0000-memory.dmp

    Filesize

    64KB

  • memory/4944-23-0x0000025D80280000-0x0000025D80290000-memory.dmp

    Filesize

    64KB

  • memory/4944-11-0x0000025DFBE50000-0x0000025DFBE51000-memory.dmp

    Filesize

    4KB

  • memory/4944-70-0x0000025D802A0000-0x0000025D802B0000-memory.dmp

    Filesize

    64KB

  • memory/4944-65-0x0000025D80270000-0x0000025D80280000-memory.dmp

    Filesize

    64KB

  • memory/4944-66-0x0000025D80280000-0x0000025D80290000-memory.dmp

    Filesize

    64KB

  • memory/4944-61-0x0000025D80000000-0x0000025D80270000-memory.dmp

    Filesize

    2.4MB

  • memory/4944-56-0x0000025DFBE50000-0x0000025DFBE51000-memory.dmp

    Filesize

    4KB

  • memory/4944-27-0x0000025D802A0000-0x0000025D802B0000-memory.dmp

    Filesize

    64KB

  • memory/4944-26-0x0000025D80290000-0x0000025D802A0000-memory.dmp

    Filesize

    64KB

  • memory/4944-33-0x0000025D802D0000-0x0000025D802E0000-memory.dmp

    Filesize

    64KB

  • memory/4944-31-0x0000025D802C0000-0x0000025D802D0000-memory.dmp

    Filesize

    64KB