Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
4a3a9b54a5895aeaa117252ae2a3df21.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4a3a9b54a5895aeaa117252ae2a3df21.exe
Resource
win10v2004-20231215-en
General
-
Target
4a3a9b54a5895aeaa117252ae2a3df21.exe
-
Size
506KB
-
MD5
4a3a9b54a5895aeaa117252ae2a3df21
-
SHA1
5dd8146f333be7c65c8cc2fb2dbcc4a802f52dea
-
SHA256
60b5ed542d573723ef3191aa2f157eef1a031d2a53e2609bc6d96e99dcd14f32
-
SHA512
2bcc89341d85cd1f9626d108509253fbc5622979c538a58b45370311ad45da475c8009d1e042860be7895bcb6c6aa4ab2c066b000254adae6ba1eb2914821405
-
SSDEEP
6144:XsB43ExsIxAEe9wY+z2l865hJ7VqQk7aNZVKSX4ugE87/WEvgocuPT1+gcaaOE62:XVGYd+/65UQBZet7/Tvgoyd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2320 4a3a9b54a5895aeaa117252ae2a3df21.exe -
Executes dropped EXE 1 IoCs
pid Process 2320 4a3a9b54a5895aeaa117252ae2a3df21.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2320 4a3a9b54a5895aeaa117252ae2a3df21.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2632 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2320 4a3a9b54a5895aeaa117252ae2a3df21.exe 2320 4a3a9b54a5895aeaa117252ae2a3df21.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1600 4a3a9b54a5895aeaa117252ae2a3df21.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1600 4a3a9b54a5895aeaa117252ae2a3df21.exe 2320 4a3a9b54a5895aeaa117252ae2a3df21.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1600 wrote to memory of 2320 1600 4a3a9b54a5895aeaa117252ae2a3df21.exe 19 PID 1600 wrote to memory of 2320 1600 4a3a9b54a5895aeaa117252ae2a3df21.exe 19 PID 1600 wrote to memory of 2320 1600 4a3a9b54a5895aeaa117252ae2a3df21.exe 19 PID 2320 wrote to memory of 2632 2320 4a3a9b54a5895aeaa117252ae2a3df21.exe 17 PID 2320 wrote to memory of 2632 2320 4a3a9b54a5895aeaa117252ae2a3df21.exe 17 PID 2320 wrote to memory of 2632 2320 4a3a9b54a5895aeaa117252ae2a3df21.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a3a9b54a5895aeaa117252ae2a3df21.exe"C:\Users\Admin\AppData\Local\Temp\4a3a9b54a5895aeaa117252ae2a3df21.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\4a3a9b54a5895aeaa117252ae2a3df21.exeC:\Users\Admin\AppData\Local\Temp\4a3a9b54a5895aeaa117252ae2a3df21.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2320
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\4a3a9b54a5895aeaa117252ae2a3df21.exe" /TN Google_Trk_Updater /F1⤵
- Creates scheduled task(s)
PID:2632