Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 06:54
Static task
static1
Behavioral task
behavioral1
Sample
0cfc61c1ed000e0120ecfc5fc5e62eea.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0cfc61c1ed000e0120ecfc5fc5e62eea.exe
Resource
win10v2004-20231215-en
General
-
Target
0cfc61c1ed000e0120ecfc5fc5e62eea.exe
-
Size
506KB
-
MD5
0cfc61c1ed000e0120ecfc5fc5e62eea
-
SHA1
e70e0e8ad71514e0edc2be6e5a28076c9cc5286e
-
SHA256
78e3e353c2bec57df7fcb893e759e853a13bc53190bdc560cbbccb371937aec8
-
SHA512
53613ea1a71ca22fc2f5f4de81b044b29db1c46901fe42f673cf84d10829dc103e451766afdf9942afa96a8f07c86f6a3e2b9ef7e7d02eacbedc25c6865e3446
-
SSDEEP
12288:sPkz9/h1wzcaVVjzR+afAzAyKE8LRR+j+vpoyC:1L1zS5zCcJEcfe4FC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1104 0cfc61c1ed000e0120ecfc5fc5e62eea.exe -
Executes dropped EXE 1 IoCs
pid Process 1104 0cfc61c1ed000e0120ecfc5fc5e62eea.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1104 0cfc61c1ed000e0120ecfc5fc5e62eea.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1628 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1104 0cfc61c1ed000e0120ecfc5fc5e62eea.exe 1104 0cfc61c1ed000e0120ecfc5fc5e62eea.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5052 0cfc61c1ed000e0120ecfc5fc5e62eea.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5052 0cfc61c1ed000e0120ecfc5fc5e62eea.exe 1104 0cfc61c1ed000e0120ecfc5fc5e62eea.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5052 wrote to memory of 1104 5052 0cfc61c1ed000e0120ecfc5fc5e62eea.exe 91 PID 5052 wrote to memory of 1104 5052 0cfc61c1ed000e0120ecfc5fc5e62eea.exe 91 PID 5052 wrote to memory of 1104 5052 0cfc61c1ed000e0120ecfc5fc5e62eea.exe 91 PID 1104 wrote to memory of 1628 1104 0cfc61c1ed000e0120ecfc5fc5e62eea.exe 92 PID 1104 wrote to memory of 1628 1104 0cfc61c1ed000e0120ecfc5fc5e62eea.exe 92 PID 1104 wrote to memory of 1628 1104 0cfc61c1ed000e0120ecfc5fc5e62eea.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cfc61c1ed000e0120ecfc5fc5e62eea.exe"C:\Users\Admin\AppData\Local\Temp\0cfc61c1ed000e0120ecfc5fc5e62eea.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\0cfc61c1ed000e0120ecfc5fc5e62eea.exeC:\Users\Admin\AppData\Local\Temp\0cfc61c1ed000e0120ecfc5fc5e62eea.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\0cfc61c1ed000e0120ecfc5fc5e62eea.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:1628
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
330KB
MD56f473c40eaaacfce95d196b9c6232cac
SHA1679ed81cc5bc290ad096638fd98b9a711e20b63f
SHA2566d40e299142b2ae4fb3833735661cc9177267f554cb736488c9b90b8773cd214
SHA512adb248ff8e794d683c08fb297d7932f766cf7bae686884690f95ffed510097c25fa06dff82ac1a4747994923b8194b6dc916e5fe9275ebbd0ede2e4f3d197474