Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 22:36
Static task
static1
Behavioral task
behavioral1
Sample
1ea387a71d67ca646e24da9dcf99375d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1ea387a71d67ca646e24da9dcf99375d.exe
Resource
win10v2004-20231215-en
General
-
Target
1ea387a71d67ca646e24da9dcf99375d.exe
-
Size
506KB
-
MD5
1ea387a71d67ca646e24da9dcf99375d
-
SHA1
8fdfc8eeb77ea462a498e0ff2fe9910d626b0839
-
SHA256
8345c11d92126c11d47a4e2cb097dcc28f529c0fca0394c516476575027ece6b
-
SHA512
9f27f4b910a6ad608147b023be1f6ee7452a9bf15db1816abf8d6cca9ee761066914a63f2e7ebee35c11f0f99e7a731524a3df9400b4ccac68fd4880557de07d
-
SSDEEP
12288:b9DMkT6CEBKcHtGIo+dvo1tsF07bplYYpt1OKU8gK/1HLjBNIOljW:VMCpktG71KeLDPUqlFW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4728 1ea387a71d67ca646e24da9dcf99375d.exe -
Executes dropped EXE 1 IoCs
pid Process 4728 1ea387a71d67ca646e24da9dcf99375d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4728 1ea387a71d67ca646e24da9dcf99375d.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 924 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4728 1ea387a71d67ca646e24da9dcf99375d.exe 4728 1ea387a71d67ca646e24da9dcf99375d.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3796 1ea387a71d67ca646e24da9dcf99375d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3796 1ea387a71d67ca646e24da9dcf99375d.exe 4728 1ea387a71d67ca646e24da9dcf99375d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3796 wrote to memory of 4728 3796 1ea387a71d67ca646e24da9dcf99375d.exe 34 PID 3796 wrote to memory of 4728 3796 1ea387a71d67ca646e24da9dcf99375d.exe 34 PID 3796 wrote to memory of 4728 3796 1ea387a71d67ca646e24da9dcf99375d.exe 34 PID 4728 wrote to memory of 924 4728 1ea387a71d67ca646e24da9dcf99375d.exe 39 PID 4728 wrote to memory of 924 4728 1ea387a71d67ca646e24da9dcf99375d.exe 39 PID 4728 wrote to memory of 924 4728 1ea387a71d67ca646e24da9dcf99375d.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ea387a71d67ca646e24da9dcf99375d.exe"C:\Users\Admin\AppData\Local\Temp\1ea387a71d67ca646e24da9dcf99375d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\1ea387a71d67ca646e24da9dcf99375d.exeC:\Users\Admin\AppData\Local\Temp\1ea387a71d67ca646e24da9dcf99375d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\1ea387a71d67ca646e24da9dcf99375d.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:924
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD5dfc24c209a60a4677148104c06b794d8
SHA187a228a66cce1e4f300e721e1fe49e489c36ff1a
SHA256cbfd3ad4cb4d8db96257eba5052ef1eb308e766bf2b7fa189b3bf505e7aad1fc
SHA51294cad7d11944bf33d68c61993ae64625f11d52c8d45ac731765550c06fea369759465ec7b23a3364d507f98af33ba9dedc6da4be1d58459268816d6142115558