Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
116s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 12:24
Static task
static1
Behavioral task
behavioral1
Sample
6e490d794c23330c79e156e9866ff512.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6e490d794c23330c79e156e9866ff512.exe
Resource
win10v2004-20231215-en
General
-
Target
6e490d794c23330c79e156e9866ff512.exe
-
Size
506KB
-
MD5
6e490d794c23330c79e156e9866ff512
-
SHA1
49f48ce27a41f8a1bb13d184d982855e73326196
-
SHA256
439c5c29e34cd2a33a2fff53c3895aed2af8798c7be1997ce20118eeba472141
-
SHA512
746834df407e5eab6f696843ebc6a6c35c0ad053101899f363a110913bda4a5df90e8da9f4d0f7e23e313a57021f5ffe54621cc11b1abd07197500093256ba2d
-
SSDEEP
12288:33W9Ds+ddbOSFI0qhDL6vzuHSgK5Spq9mS4xaM71Ou:3G9DslSEDuLuPHq9/4xXn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1080 6e490d794c23330c79e156e9866ff512.exe -
Executes dropped EXE 1 IoCs
pid Process 1080 6e490d794c23330c79e156e9866ff512.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1080 6e490d794c23330c79e156e9866ff512.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4624 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1080 6e490d794c23330c79e156e9866ff512.exe 1080 6e490d794c23330c79e156e9866ff512.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3040 6e490d794c23330c79e156e9866ff512.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3040 6e490d794c23330c79e156e9866ff512.exe 1080 6e490d794c23330c79e156e9866ff512.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3040 wrote to memory of 1080 3040 6e490d794c23330c79e156e9866ff512.exe 20 PID 3040 wrote to memory of 1080 3040 6e490d794c23330c79e156e9866ff512.exe 20 PID 3040 wrote to memory of 1080 3040 6e490d794c23330c79e156e9866ff512.exe 20 PID 1080 wrote to memory of 4624 1080 6e490d794c23330c79e156e9866ff512.exe 19 PID 1080 wrote to memory of 4624 1080 6e490d794c23330c79e156e9866ff512.exe 19 PID 1080 wrote to memory of 4624 1080 6e490d794c23330c79e156e9866ff512.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e490d794c23330c79e156e9866ff512.exe"C:\Users\Admin\AppData\Local\Temp\6e490d794c23330c79e156e9866ff512.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\6e490d794c23330c79e156e9866ff512.exeC:\Users\Admin\AppData\Local\Temp\6e490d794c23330c79e156e9866ff512.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1080
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\6e490d794c23330c79e156e9866ff512.exe" /TN Google_Trk_Updater /F1⤵
- Creates scheduled task(s)
PID:4624