Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 23:38
Static task
static1
Behavioral task
behavioral1
Sample
072a4b58d204e7b03d6b6bae9d6af4e3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
072a4b58d204e7b03d6b6bae9d6af4e3.exe
Resource
win10v2004-20231215-en
General
-
Target
072a4b58d204e7b03d6b6bae9d6af4e3.exe
-
Size
506KB
-
MD5
072a4b58d204e7b03d6b6bae9d6af4e3
-
SHA1
2a0c67754f64ba3216bdeae8a1ddc93e1b8e9ff1
-
SHA256
c7c729221d9808f87af4cca1613d2c682f9930ce8eb9f116869c4a0ca31a13d2
-
SHA512
af55f08e14ac473805d3691815d0829fdf6c16398b1a6f65cde854380ddfc37ddf15b99e7827dc6ed88362aca444bcc65cdbfa8bd9f16cb2e7afb95de8923d23
-
SSDEEP
12288:8p7i23KKTgRAhbFsHMMyivzuh4+FizWDo3cH+t5:se2FuMMa0WSE+t5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2208 072a4b58d204e7b03d6b6bae9d6af4e3.exe -
Executes dropped EXE 1 IoCs
pid Process 2208 072a4b58d204e7b03d6b6bae9d6af4e3.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2208 072a4b58d204e7b03d6b6bae9d6af4e3.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3740 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2208 072a4b58d204e7b03d6b6bae9d6af4e3.exe 2208 072a4b58d204e7b03d6b6bae9d6af4e3.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5016 072a4b58d204e7b03d6b6bae9d6af4e3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5016 072a4b58d204e7b03d6b6bae9d6af4e3.exe 2208 072a4b58d204e7b03d6b6bae9d6af4e3.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5016 wrote to memory of 2208 5016 072a4b58d204e7b03d6b6bae9d6af4e3.exe 94 PID 5016 wrote to memory of 2208 5016 072a4b58d204e7b03d6b6bae9d6af4e3.exe 94 PID 5016 wrote to memory of 2208 5016 072a4b58d204e7b03d6b6bae9d6af4e3.exe 94 PID 2208 wrote to memory of 3740 2208 072a4b58d204e7b03d6b6bae9d6af4e3.exe 93 PID 2208 wrote to memory of 3740 2208 072a4b58d204e7b03d6b6bae9d6af4e3.exe 93 PID 2208 wrote to memory of 3740 2208 072a4b58d204e7b03d6b6bae9d6af4e3.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\072a4b58d204e7b03d6b6bae9d6af4e3.exe"C:\Users\Admin\AppData\Local\Temp\072a4b58d204e7b03d6b6bae9d6af4e3.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\072a4b58d204e7b03d6b6bae9d6af4e3.exeC:\Users\Admin\AppData\Local\Temp\072a4b58d204e7b03d6b6bae9d6af4e3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2208
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\072a4b58d204e7b03d6b6bae9d6af4e3.exe" /TN Google_Trk_Updater /F1⤵
- Creates scheduled task(s)
PID:3740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD52dc8b5b9f04fc7809510ccd893f67ff6
SHA1480abb014110b3d282da54069b635cc588c5f4a5
SHA2565a28b79bdef32c69827453945ac046eb87da2c49db60b43258abcae3b891c6e5
SHA5124ea4ad8815561f56338902db7401b1239f0febd60f5c94ad59a197102e3a273a0b5f656e6a4fa1f2a7292b93480832521645e89c020fdac0310576d2fe8500ef