Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
181s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 23:55
Static task
static1
Behavioral task
behavioral1
Sample
e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe
Resource
win10v2004-20221111-en
General
-
Target
e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe
-
Size
29KB
-
MD5
37aeff0ba7162b6a69e33022de46b83e
-
SHA1
6459c98e1e41f1d9d331d4f4e06a6579ab6bcc95
-
SHA256
e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d
-
SHA512
4278913fa037683dff64aa34edaa08cdf1958415c3ef77cc8ee0d91872c3df7a87cdb62b515861912e0c63de1c1bbd913629d827827b827429410c5c0ae1cebc
-
SSDEEP
384:7Xb1JAZw7jtigdih7alQylk1Q//YYJLW7wycJbgz:31JAZw/rdihelQjQntLhb8
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1324 Googlenr.EXE 584 Googlenr.EXE -
Deletes itself 1 IoCs
pid Process 584 Googlenr.EXE -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Debugs.inf e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe File created C:\Windows\Googlenr.EXE e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe File opened for modification C:\Windows\Googlenr.EXE e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe File created C:\Windows\Debugs.inf Googlenr.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1876 e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe 1484 e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe 1324 Googlenr.EXE 584 Googlenr.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1876 wrote to memory of 1484 1876 e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe 28 PID 1876 wrote to memory of 1484 1876 e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe 28 PID 1876 wrote to memory of 1484 1876 e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe 28 PID 1876 wrote to memory of 1484 1876 e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe 28 PID 1876 wrote to memory of 1484 1876 e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe 28 PID 1876 wrote to memory of 1484 1876 e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe 28 PID 1876 wrote to memory of 1484 1876 e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe 28 PID 1484 wrote to memory of 1324 1484 e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe 29 PID 1484 wrote to memory of 1324 1484 e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe 29 PID 1484 wrote to memory of 1324 1484 e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe 29 PID 1484 wrote to memory of 1324 1484 e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe 29 PID 1484 wrote to memory of 1324 1484 e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe 29 PID 1484 wrote to memory of 1324 1484 e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe 29 PID 1484 wrote to memory of 1324 1484 e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe 29 PID 1324 wrote to memory of 584 1324 Googlenr.EXE 30 PID 1324 wrote to memory of 584 1324 Googlenr.EXE 30 PID 1324 wrote to memory of 584 1324 Googlenr.EXE 30 PID 1324 wrote to memory of 584 1324 Googlenr.EXE 30 PID 1324 wrote to memory of 584 1324 Googlenr.EXE 30 PID 1324 wrote to memory of 584 1324 Googlenr.EXE 30 PID 1324 wrote to memory of 584 1324 Googlenr.EXE 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe"C:\Users\Admin\AppData\Local\Temp\e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe"C:\Users\Admin\AppData\Local\Temp\e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\Googlenr.EXE"C:\Windows\Googlenr.EXE"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\Googlenr.EXE"C:\Windows\Googlenr.EXE"4⤵
- Executes dropped EXE
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
PID:584
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102B
MD5d0fd4c396b889492fb6055176a30b06c
SHA1cd1edb7468b94e6abd6fbafd75d3fb5530bef037
SHA256e8889ea8e42678bcbdb1d0302083326fd58f7641a68217e272350b05fa6b248a
SHA5126645b46caddfd23efe8bfcecdf5a526c1b229d46b3de23e8b5cd9b0a5bd2bbfce8c2e2ab92307353a0ef2ca9d028ad758ba553d3da37ce9e9ed6fb0ee270e9e7
-
Filesize
14.9MB
MD5ebd3e4fd5d1ea16e1e19335cf1d12754
SHA1c5f6773329bb1e704bbd820a4233dd1be01dae25
SHA256d03ef4ada1cfe10fc983b2bc13b06cf42880256f5e392190d585bd7b6cb69dc9
SHA5129cb8bbc432bbe1fd3073c36ac2dee29a2cbe150b2a7c71b8fce1fed733c9f06e68563543b47ea29df5aff861159a183178521c751f0f77bf79c38aecdeb2b5d4
-
Filesize
14.9MB
MD5ebd3e4fd5d1ea16e1e19335cf1d12754
SHA1c5f6773329bb1e704bbd820a4233dd1be01dae25
SHA256d03ef4ada1cfe10fc983b2bc13b06cf42880256f5e392190d585bd7b6cb69dc9
SHA5129cb8bbc432bbe1fd3073c36ac2dee29a2cbe150b2a7c71b8fce1fed733c9f06e68563543b47ea29df5aff861159a183178521c751f0f77bf79c38aecdeb2b5d4
-
Filesize
14.9MB
MD5ebd3e4fd5d1ea16e1e19335cf1d12754
SHA1c5f6773329bb1e704bbd820a4233dd1be01dae25
SHA256d03ef4ada1cfe10fc983b2bc13b06cf42880256f5e392190d585bd7b6cb69dc9
SHA5129cb8bbc432bbe1fd3073c36ac2dee29a2cbe150b2a7c71b8fce1fed733c9f06e68563543b47ea29df5aff861159a183178521c751f0f77bf79c38aecdeb2b5d4