Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16/12/2024, 19:11
Behavioral task
behavioral1
Sample
c-users-vince-appdata-roaming-microsoft-windows-start-menu-programs-startup-jre-8u231-windows-x64-jar.jar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c-users-vince-appdata-roaming-microsoft-windows-start-menu-programs-startup-jre-8u231-windows-x64-jar.jar
Resource
win10v2004-20241007-en
General
-
Target
c-users-vince-appdata-roaming-microsoft-windows-start-menu-programs-startup-jre-8u231-windows-x64-jar.jar
-
Size
23.4MB
-
MD5
9ffc1ded1643d2f1c0127f23ac3bd00f
-
SHA1
1e97894773bcf63adeba8d282d3921fe1224587d
-
SHA256
bb59ec29778a45324d437c67a0d18165b59823a01e78261a1c41c6a8069993fd
-
SHA512
9ad49f22d0f90a1e4604ca2fa09fd330b63c9f5035274f103875cdb153e914551d271bb31cadaaf719209492421f19a7695947b2bc54e542d49459f74d164462
-
SSDEEP
393216:FDq5bsW3WNInfzPbLu/xK0SghqfKvX95oELYirysSibdRD/Y/RsmeVeQXWl+FJ:hUwPNIrW5KpCqyXpLAsSixK/iRmUz
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jre-8u231-windows-x64.jar javaw.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jre-8u231-windows-x64.jar javaw.exe -
Loads dropped DLL 4 IoCs
pid Process 1072 java.exe 2372 javaw.exe 2372 javaw.exe 2372 javaw.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2372 javaw.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1072 java.exe 1072 java.exe 2372 javaw.exe 2372 javaw.exe 2372 javaw.exe 2372 javaw.exe 2372 javaw.exe 2372 javaw.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1072 wrote to memory of 2372 1072 java.exe 83 PID 1072 wrote to memory of 2372 1072 java.exe 83 PID 2372 wrote to memory of 1888 2372 javaw.exe 84 PID 2372 wrote to memory of 1888 2372 javaw.exe 84 PID 2372 wrote to memory of 628 2372 javaw.exe 86 PID 2372 wrote to memory of 628 2372 javaw.exe 86
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\c-users-vince-appdata-roaming-microsoft-windows-start-menu-programs-startup-jre-8u231-windows-x64-jar.jar1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw" -jar "C:\Users\Admin\AppData\Local\Temp\c-users-vince-appdata-roaming-microsoft-windows-start-menu-programs-startup-jre-8u231-windows-x64-jar.jar" DELAY:32⤵
- Drops startup file
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SYSTEM32\netsh.exenetsh wlan show networks mode=bssid3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1888
-
-
C:\Windows\SYSTEM32\netsh.exenetsh wlan show networks mode=bssid3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:628
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5c961ba3d317b0b9d1ac05c6b7c0841a7
SHA1c2a8318103946e75e7b183df33031624b2c5e2ba
SHA25684dc5c4c5dd9c7d7bab4d81e2ed24056194766e48cbcc04a4914876c58d480af
SHA512d33fa8238122f0f070275dd9d7f06e6a7e649a47bc6399f7b6498b134ec0d67cc05be0c0cbcbcddd172aa6cec2f00dbd162d92e013b062c367759ad04fa9cd9c
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
80KB
MD5e9a449971b9efb0a2e12b9cfdd95c076
SHA1385777659fa84e94a3812eb9a8afad27ae3ceed4
SHA256b8c331c9f915960201da9af9c9dc8309e95e7d533741e71f4a5d13ca007d3e18
SHA512bbcaf66b316cb60c63bb190099bee36a0059f13fa35fdf3a9a3e7e9a5304abe57acd71d644cde554427825249b460d58f0aba79f599f0c6fa40d23ea21aa941d
-
Filesize
248KB
MD54de85f9679c3a75f6d7d3e56094aa106
SHA1052f62fb2ebec89fbe412db480865910eab693ad
SHA2563d1b2427b45ff5178bbb4db395758bedd3a1e91121ebb3e3640b5c4e20eb22cc
SHA512e8357eabd548ffeba42715d891b9e1ed22b7bf720f48b1888407b9ebe7a796719c60a38f4fb8bb1cf32d3c9bed210a07cc227424ef991d356ec3acef9e6223ab
-
C:\Users\Admin\AppData\Local\Temp\sqlite-3.36.0.3-2ec81444-988d-4448-88ef-9c3342c7eeb6-sqlitejdbc.dll
Filesize847KB
MD571eb6b5dbae2f9266a876be1af8dc00c
SHA1364b79fe0a21c9f9827b298d187b493f5f14ce71
SHA256b0c53ebfcddc4031daad36aac9a2967921703431deba5e51234da5008ae45b2a
SHA5120a27205fcc33f482f59aea22de02ba3a9a1981bd28adee97ba3702026f27c760350f5df34e5982f763b608867892d5d4cebb1e13efb159fc3eef431772e37b12
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3442511616-637977696-3186306149-1000\83aa4cc77f591dfc2374580bbd95f6ba_5ab270f5-f3a9-47d1-97d7-bbd50acf9955
Filesize45B
MD5c8366ae350e7019aefc9d1e6e6a498c6
SHA15731d8a3e6568a5f2dfbbc87e3db9637df280b61
SHA25611e6aca8e682c046c83b721eeb5c72c5ef03cb5936c60df6f4993511ddc61238
SHA51233c980d5a638bfc791de291ebf4b6d263b384247ab27f261a54025108f2f85374b579a026e545f81395736dd40fa4696f2163ca17640dd47f1c42bc9971b18cd