Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 14:32
Static task
static1
Behavioral task
behavioral1
Sample
75d06019796327a448641d0605ee0e74.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
75d06019796327a448641d0605ee0e74.exe
Resource
win10v2004-20231215-en
General
-
Target
75d06019796327a448641d0605ee0e74.exe
-
Size
1000KB
-
MD5
75d06019796327a448641d0605ee0e74
-
SHA1
a5186fb889c327a6b4d5a19098f5758634984955
-
SHA256
cbc8fae703eb3747070657632114f0b7e1ae64b0f9455b18b37433dcf85241b7
-
SHA512
3e8146a06714286e5fedfa02b5736261a08f3fe34ef19011a17df5f20cb51624ec0d832581491500b7308d9fb2cf1b55e1fc2c215c02154fc5109a27c1a4ef76
-
SSDEEP
24576:WW88yy3TWrZX4K/tYjsRciCW4F5NrZHiJ81B+5vMiqt0gj2ed:WjaWo3j7LDNrZHiJeqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4812 75d06019796327a448641d0605ee0e74.exe -
Executes dropped EXE 1 IoCs
pid Process 4812 75d06019796327a448641d0605ee0e74.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4812 75d06019796327a448641d0605ee0e74.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1656 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4812 75d06019796327a448641d0605ee0e74.exe 4812 75d06019796327a448641d0605ee0e74.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1844 75d06019796327a448641d0605ee0e74.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1844 75d06019796327a448641d0605ee0e74.exe 4812 75d06019796327a448641d0605ee0e74.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1844 wrote to memory of 4812 1844 75d06019796327a448641d0605ee0e74.exe 91 PID 1844 wrote to memory of 4812 1844 75d06019796327a448641d0605ee0e74.exe 91 PID 1844 wrote to memory of 4812 1844 75d06019796327a448641d0605ee0e74.exe 91 PID 4812 wrote to memory of 1656 4812 75d06019796327a448641d0605ee0e74.exe 93 PID 4812 wrote to memory of 1656 4812 75d06019796327a448641d0605ee0e74.exe 93 PID 4812 wrote to memory of 1656 4812 75d06019796327a448641d0605ee0e74.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\75d06019796327a448641d0605ee0e74.exe"C:\Users\Admin\AppData\Local\Temp\75d06019796327a448641d0605ee0e74.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\75d06019796327a448641d0605ee0e74.exeC:\Users\Admin\AppData\Local\Temp\75d06019796327a448641d0605ee0e74.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\75d06019796327a448641d0605ee0e74.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:1656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD5f68f146e00fe94ccc703c7ac49483bad
SHA129c61dbadf2ffbca92a52f9298156447f41f8a5c
SHA256b5da34a94c1155ae9203403348c36e7222b7d7bac96f2f858dd61fdabd4562e3
SHA512dfe294a0a5f9770227f87206c3c68c8163247bba080cede28c7b93212771cbd9edc8afd1339cb7be07bd10aee80a33e7d1ca60ee9844e2905c77a1e6ea5b7771