Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/03/2025, 10:48

General

  • Target

    SHIPPING DOCS#04765342CHU.PDF.jar

  • Size

    211KB

  • MD5

    1d85e90da37068b469c780fc7a48e39d

  • SHA1

    fd8c444b811ed76f1f21656db03fc4488cc07309

  • SHA256

    5f254a78f046f08ddd45e1c1dfcdb3fe0be8258b207f874bc95bf269fe0713fa

  • SHA512

    f65fae46e5a6320e052a52b5535e2c0a84b569abd4d1ea314499ec6791172492a3e4f36462bd88a22638fa75cdf2bc1049a313a7389097e66b87cbe435878e23

  • SSDEEP

    3072:szR7A2Y0gUMxGZrrOVCobiBTr7zVTL8mPfiswap2OGr64BH4eyfJuoXvIFLB+yTz:4RLtMxyOVHiF75Tok7p2hNkIF1+yTbYQ

Malware Config

Signatures

  • STRRAT

    STRRAT is a remote access tool than can steal credentials and log keystrokes.

  • Strrat family
  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar "C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCS#04765342CHU.PDF.jar"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Network Configuration Discovery: Internet Connection Discovery
    • Suspicious use of WriteProcessMemory
    PID:4816
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\SHIPPING DOCS#04765342CHU.PDF.jar"
      2⤵
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:3972
      • C:\Windows\system32\schtasks.exe
        schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\SHIPPING DOCS#04765342CHU.PDF.jar"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2944
    • C:\Program Files\Java\jre-1.8\bin\java.exe
      "C:\Program Files\Java\jre-1.8\bin\java.exe" -jar "C:\Users\Admin\AppData\Roaming\SHIPPING DOCS#04765342CHU.PDF.jar"
      2⤵
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:2392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\SHIPPING DOCS#04765342CHU.PDF.jar

    Filesize

    211KB

    MD5

    1d85e90da37068b469c780fc7a48e39d

    SHA1

    fd8c444b811ed76f1f21656db03fc4488cc07309

    SHA256

    5f254a78f046f08ddd45e1c1dfcdb3fe0be8258b207f874bc95bf269fe0713fa

    SHA512

    f65fae46e5a6320e052a52b5535e2c0a84b569abd4d1ea314499ec6791172492a3e4f36462bd88a22638fa75cdf2bc1049a313a7389097e66b87cbe435878e23

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    188288f340b4887ed238615725c1f6b3

    SHA1

    18292992155341874d3227abd8e1e74eae31b86b

    SHA256

    88a5b89b2f105b9000be26d939d638beb35851434b36cd2484768047bdea7b59

    SHA512

    80fa6e2dde47154b4b354bd5bf7541ca559e71b617756564d06ff2ec6af451b7c6a47c5147a58857b623fdf1c16711d380beea9794bde2653a97e02d3ff8f589

  • memory/2392-94-0x000001A1D31A0000-0x000001A1D31B0000-memory.dmp

    Filesize

    64KB

  • memory/2392-92-0x000001A1D3180000-0x000001A1D3190000-memory.dmp

    Filesize

    64KB

  • memory/2392-96-0x000001A1D31B0000-0x000001A1D31C0000-memory.dmp

    Filesize

    64KB

  • memory/2392-95-0x000001A1D31C0000-0x000001A1D31D0000-memory.dmp

    Filesize

    64KB

  • memory/2392-99-0x000001A1D31D0000-0x000001A1D31E0000-memory.dmp

    Filesize

    64KB

  • memory/2392-93-0x000001A1D3190000-0x000001A1D31A0000-memory.dmp

    Filesize

    64KB

  • memory/2392-86-0x000001A1D3140000-0x000001A1D3150000-memory.dmp

    Filesize

    64KB

  • memory/2392-91-0x000001A1D3170000-0x000001A1D3180000-memory.dmp

    Filesize

    64KB

  • memory/2392-89-0x000001A1D3160000-0x000001A1D3170000-memory.dmp

    Filesize

    64KB

  • memory/2392-87-0x000001A1D3150000-0x000001A1D3160000-memory.dmp

    Filesize

    64KB

  • memory/2392-98-0x000001A1D31D0000-0x000001A1D31E0000-memory.dmp

    Filesize

    64KB

  • memory/2392-100-0x000001A1D31E0000-0x000001A1D31F0000-memory.dmp

    Filesize

    64KB

  • memory/2392-78-0x000001A1D31A0000-0x000001A1D31B0000-memory.dmp

    Filesize

    64KB

  • memory/2392-84-0x000001A1D15B0000-0x000001A1D15B1000-memory.dmp

    Filesize

    4KB

  • memory/2392-82-0x000001A1D31C0000-0x000001A1D31D0000-memory.dmp

    Filesize

    64KB

  • memory/2392-83-0x000001A1D31B0000-0x000001A1D31C0000-memory.dmp

    Filesize

    64KB

  • memory/2392-85-0x000001A1D2ED0000-0x000001A1D3140000-memory.dmp

    Filesize

    2.4MB

  • memory/2392-75-0x000001A1D3190000-0x000001A1D31A0000-memory.dmp

    Filesize

    64KB

  • memory/2392-74-0x000001A1D3180000-0x000001A1D3190000-memory.dmp

    Filesize

    64KB

  • memory/2392-71-0x000001A1D3170000-0x000001A1D3180000-memory.dmp

    Filesize

    64KB

  • memory/2392-69-0x000001A1D3160000-0x000001A1D3170000-memory.dmp

    Filesize

    64KB

  • memory/2392-67-0x000001A1D3150000-0x000001A1D3160000-memory.dmp

    Filesize

    64KB

  • memory/2392-65-0x000001A1D3140000-0x000001A1D3150000-memory.dmp

    Filesize

    64KB

  • memory/2392-54-0x000001A1D2ED0000-0x000001A1D3140000-memory.dmp

    Filesize

    2.4MB

  • memory/4816-31-0x0000017000300000-0x0000017000310000-memory.dmp

    Filesize

    64KB

  • memory/4816-40-0x0000017000000000-0x0000017000270000-memory.dmp

    Filesize

    2.4MB

  • memory/4816-41-0x0000017000270000-0x0000017000280000-memory.dmp

    Filesize

    64KB

  • memory/4816-42-0x0000017000280000-0x0000017000290000-memory.dmp

    Filesize

    64KB

  • memory/4816-44-0x00000170002A0000-0x00000170002B0000-memory.dmp

    Filesize

    64KB

  • memory/4816-45-0x00000170002B0000-0x00000170002C0000-memory.dmp

    Filesize

    64KB

  • memory/4816-46-0x00000170002C0000-0x00000170002D0000-memory.dmp

    Filesize

    64KB

  • memory/4816-47-0x00000170002D0000-0x00000170002E0000-memory.dmp

    Filesize

    64KB

  • memory/4816-48-0x00000170002E0000-0x00000170002F0000-memory.dmp

    Filesize

    64KB

  • memory/4816-49-0x00000170002F0000-0x0000017000300000-memory.dmp

    Filesize

    64KB

  • memory/4816-50-0x0000017000300000-0x0000017000310000-memory.dmp

    Filesize

    64KB

  • memory/4816-43-0x0000017000290000-0x00000170002A0000-memory.dmp

    Filesize

    64KB

  • memory/4816-37-0x000001707C460000-0x000001707C461000-memory.dmp

    Filesize

    4KB

  • memory/4816-2-0x0000017000000000-0x0000017000270000-memory.dmp

    Filesize

    2.4MB

  • memory/4816-30-0x0000017000000000-0x0000017000270000-memory.dmp

    Filesize

    2.4MB

  • memory/4816-28-0x00000170002F0000-0x0000017000300000-memory.dmp

    Filesize

    64KB

  • memory/4816-26-0x00000170002E0000-0x00000170002F0000-memory.dmp

    Filesize

    64KB

  • memory/4816-24-0x00000170002D0000-0x00000170002E0000-memory.dmp

    Filesize

    64KB

  • memory/4816-21-0x00000170002B0000-0x00000170002C0000-memory.dmp

    Filesize

    64KB

  • memory/4816-22-0x00000170002C0000-0x00000170002D0000-memory.dmp

    Filesize

    64KB

  • memory/4816-18-0x00000170002A0000-0x00000170002B0000-memory.dmp

    Filesize

    64KB

  • memory/4816-16-0x0000017000290000-0x00000170002A0000-memory.dmp

    Filesize

    64KB

  • memory/4816-13-0x0000017000270000-0x0000017000280000-memory.dmp

    Filesize

    64KB

  • memory/4816-14-0x0000017000280000-0x0000017000290000-memory.dmp

    Filesize

    64KB