Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/03/2025, 14:23

General

  • Target

    SHIPPING DOCS#04765342CHU.PDF.jar

  • Size

    211KB

  • MD5

    1d85e90da37068b469c780fc7a48e39d

  • SHA1

    fd8c444b811ed76f1f21656db03fc4488cc07309

  • SHA256

    5f254a78f046f08ddd45e1c1dfcdb3fe0be8258b207f874bc95bf269fe0713fa

  • SHA512

    f65fae46e5a6320e052a52b5535e2c0a84b569abd4d1ea314499ec6791172492a3e4f36462bd88a22638fa75cdf2bc1049a313a7389097e66b87cbe435878e23

  • SSDEEP

    3072:szR7A2Y0gUMxGZrrOVCobiBTr7zVTL8mPfiswap2OGr64BH4eyfJuoXvIFLB+yTz:4RLtMxyOVHiF75Tok7p2hNkIF1+yTbYQ

Malware Config

Signatures

  • STRRAT

    STRRAT is a remote access tool than can steal credentials and log keystrokes.

  • Strrat family
  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar "C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCS#04765342CHU.PDF.jar"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Network Configuration Discovery: Internet Connection Discovery
    • Suspicious use of WriteProcessMemory
    PID:5064
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\SHIPPING DOCS#04765342CHU.PDF.jar"
      2⤵
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:4172
      • C:\Windows\system32\schtasks.exe
        schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\SHIPPING DOCS#04765342CHU.PDF.jar"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2652
    • C:\Program Files\Java\jre-1.8\bin\java.exe
      "C:\Program Files\Java\jre-1.8\bin\java.exe" -jar "C:\Users\Admin\AppData\Roaming\SHIPPING DOCS#04765342CHU.PDF.jar"
      2⤵
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:2204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\SHIPPING DOCS#04765342CHU.PDF.jar

    Filesize

    211KB

    MD5

    1d85e90da37068b469c780fc7a48e39d

    SHA1

    fd8c444b811ed76f1f21656db03fc4488cc07309

    SHA256

    5f254a78f046f08ddd45e1c1dfcdb3fe0be8258b207f874bc95bf269fe0713fa

    SHA512

    f65fae46e5a6320e052a52b5535e2c0a84b569abd4d1ea314499ec6791172492a3e4f36462bd88a22638fa75cdf2bc1049a313a7389097e66b87cbe435878e23

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    8eaaa8c86e8159b1c54dd44ace13708a

    SHA1

    80c4cb31596051e52727ba0c23a92064ea39729e

    SHA256

    72b1a83d5e8f27b3e4e3d21af7d4bafa83c8137acc74b5bd87d4d91b6d84b5cd

    SHA512

    2b256f1a09da9e6996fd0c5f25651446762559658a3dd2c6f34a70c27cfcb7cd048031c8d9d3b6e4368b677a9025777b14c739325d459e59a641d260e1f727d3

  • memory/2204-76-0x0000021D978E0000-0x0000021D97B50000-memory.dmp

    Filesize

    2.4MB

  • memory/2204-84-0x0000021D97BA0000-0x0000021D97BB0000-memory.dmp

    Filesize

    64KB

  • memory/2204-82-0x0000021D97B80000-0x0000021D97B90000-memory.dmp

    Filesize

    64KB

  • memory/2204-81-0x0000021D97B70000-0x0000021D97B80000-memory.dmp

    Filesize

    64KB

  • memory/2204-79-0x0000021D97B60000-0x0000021D97B70000-memory.dmp

    Filesize

    64KB

  • memory/2204-78-0x0000021D97B50000-0x0000021D97B60000-memory.dmp

    Filesize

    64KB

  • memory/2204-50-0x0000021D978E0000-0x0000021D97B50000-memory.dmp

    Filesize

    2.4MB

  • memory/2204-75-0x0000021D95FE0000-0x0000021D95FE1000-memory.dmp

    Filesize

    4KB

  • memory/2204-72-0x0000021D97BA0000-0x0000021D97BB0000-memory.dmp

    Filesize

    64KB

  • memory/2204-83-0x0000021D97B90000-0x0000021D97BA0000-memory.dmp

    Filesize

    64KB

  • memory/2204-73-0x0000021D97BB0000-0x0000021D97BC0000-memory.dmp

    Filesize

    64KB

  • memory/2204-70-0x0000021D97B90000-0x0000021D97BA0000-memory.dmp

    Filesize

    64KB

  • memory/2204-66-0x0000021D97B70000-0x0000021D97B80000-memory.dmp

    Filesize

    64KB

  • memory/2204-67-0x0000021D97B80000-0x0000021D97B90000-memory.dmp

    Filesize

    64KB

  • memory/2204-63-0x0000021D97B60000-0x0000021D97B70000-memory.dmp

    Filesize

    64KB

  • memory/2204-61-0x0000021D97B50000-0x0000021D97B60000-memory.dmp

    Filesize

    64KB

  • memory/2204-85-0x0000021D97BB0000-0x0000021D97BC0000-memory.dmp

    Filesize

    64KB

  • memory/5064-29-0x0000021726F50000-0x0000021726F60000-memory.dmp

    Filesize

    64KB

  • memory/5064-35-0x0000021725440000-0x0000021725441000-memory.dmp

    Filesize

    4KB

  • memory/5064-37-0x0000021726F40000-0x0000021726F50000-memory.dmp

    Filesize

    64KB

  • memory/5064-38-0x0000021726ED0000-0x0000021726EE0000-memory.dmp

    Filesize

    64KB

  • memory/5064-40-0x0000021726EF0000-0x0000021726F00000-memory.dmp

    Filesize

    64KB

  • memory/5064-41-0x0000021726F00000-0x0000021726F10000-memory.dmp

    Filesize

    64KB

  • memory/5064-42-0x0000021726F10000-0x0000021726F20000-memory.dmp

    Filesize

    64KB

  • memory/5064-43-0x0000021726F20000-0x0000021726F30000-memory.dmp

    Filesize

    64KB

  • memory/5064-46-0x0000021726F50000-0x0000021726F60000-memory.dmp

    Filesize

    64KB

  • memory/5064-44-0x0000021726F30000-0x0000021726F40000-memory.dmp

    Filesize

    64KB

  • memory/5064-39-0x0000021726EE0000-0x0000021726EF0000-memory.dmp

    Filesize

    64KB

  • memory/5064-45-0x0000021726C60000-0x0000021726ED0000-memory.dmp

    Filesize

    2.4MB

  • memory/5064-2-0x0000021726C60000-0x0000021726ED0000-memory.dmp

    Filesize

    2.4MB

  • memory/5064-28-0x0000021726C60000-0x0000021726ED0000-memory.dmp

    Filesize

    2.4MB

  • memory/5064-25-0x0000021726F30000-0x0000021726F40000-memory.dmp

    Filesize

    64KB

  • memory/5064-26-0x0000021726F40000-0x0000021726F50000-memory.dmp

    Filesize

    64KB

  • memory/5064-22-0x0000021726F20000-0x0000021726F30000-memory.dmp

    Filesize

    64KB

  • memory/5064-21-0x0000021726F10000-0x0000021726F20000-memory.dmp

    Filesize

    64KB

  • memory/5064-18-0x0000021726F00000-0x0000021726F10000-memory.dmp

    Filesize

    64KB

  • memory/5064-16-0x0000021726EF0000-0x0000021726F00000-memory.dmp

    Filesize

    64KB

  • memory/5064-14-0x0000021726EE0000-0x0000021726EF0000-memory.dmp

    Filesize

    64KB

  • memory/5064-12-0x0000021726ED0000-0x0000021726EE0000-memory.dmp

    Filesize

    64KB