Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 00:53
Static task
static1
Behavioral task
behavioral1
Sample
092aafb4417cee9b9e2d14fb3455c882.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
092aafb4417cee9b9e2d14fb3455c882.exe
Resource
win10v2004-20231215-en
General
-
Target
092aafb4417cee9b9e2d14fb3455c882.exe
-
Size
1000KB
-
MD5
092aafb4417cee9b9e2d14fb3455c882
-
SHA1
ed7864784a189d228312f4066eacaea1160e3eca
-
SHA256
26de7a3edd3f9c64cea3d019ca0f142b7be05c7f46f3642e1233e26e9d068d63
-
SHA512
00cf4ed953cfa9313c55c79c9efd28c236ad7b5c86dd23a8f62e8cf1565df4982141c9c51b87014db727835d2425a0498ca9d2a404f2cd5fa7b14d953157d074
-
SSDEEP
24576:czWtxWOr8POVvnqzqZpCrUo1B+5vMiqt0gj2ed:OWGWvymmqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1696 092aafb4417cee9b9e2d14fb3455c882.exe -
Executes dropped EXE 1 IoCs
pid Process 1696 092aafb4417cee9b9e2d14fb3455c882.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1696 092aafb4417cee9b9e2d14fb3455c882.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4628 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1696 092aafb4417cee9b9e2d14fb3455c882.exe 1696 092aafb4417cee9b9e2d14fb3455c882.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 716 092aafb4417cee9b9e2d14fb3455c882.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 716 092aafb4417cee9b9e2d14fb3455c882.exe 1696 092aafb4417cee9b9e2d14fb3455c882.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 716 wrote to memory of 1696 716 092aafb4417cee9b9e2d14fb3455c882.exe 89 PID 716 wrote to memory of 1696 716 092aafb4417cee9b9e2d14fb3455c882.exe 89 PID 716 wrote to memory of 1696 716 092aafb4417cee9b9e2d14fb3455c882.exe 89 PID 1696 wrote to memory of 4628 1696 092aafb4417cee9b9e2d14fb3455c882.exe 90 PID 1696 wrote to memory of 4628 1696 092aafb4417cee9b9e2d14fb3455c882.exe 90 PID 1696 wrote to memory of 4628 1696 092aafb4417cee9b9e2d14fb3455c882.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\092aafb4417cee9b9e2d14fb3455c882.exe"C:\Users\Admin\AppData\Local\Temp\092aafb4417cee9b9e2d14fb3455c882.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Users\Admin\AppData\Local\Temp\092aafb4417cee9b9e2d14fb3455c882.exeC:\Users\Admin\AppData\Local\Temp\092aafb4417cee9b9e2d14fb3455c882.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\092aafb4417cee9b9e2d14fb3455c882.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:4628
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD5c4a238d5826d23324f914ef69beed2ce
SHA1b3cacb748371e0405de294ff9cb63d59b0081fb8
SHA256f0e52cfce1f7f99ae2c0433fe9047b954150becdc4e02687b1731380bff5b1dc
SHA512b300945e5f21dc32b1fb860ff4450bf01ec7080e11e9694095d0eb78237e757ecade3e2ad13d71d6eed7fc673e327e177b58b1bfc108d0d394eb20da021bcd53