Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
129s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 03:08
Static task
static1
Behavioral task
behavioral1
Sample
0c8416f3423f623fbe5317b25ddc60e2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c8416f3423f623fbe5317b25ddc60e2.exe
Resource
win10v2004-20231215-en
General
-
Target
0c8416f3423f623fbe5317b25ddc60e2.exe
-
Size
2.0MB
-
MD5
0c8416f3423f623fbe5317b25ddc60e2
-
SHA1
2a51e7cbe931aa3a1ca7c2434b49f0657b2fb0d2
-
SHA256
b7579986622800d11139c017fc5473a41acb98db7a88a96c65cc2238812e17eb
-
SHA512
f8f4111977feafe541d67eb739c0a660e4ce376e04d259be9ec9ee39e31c80ef6bcdad716bcdb7b51feea481f44663496846c611566a6c50bf85c68e3673e337
-
SSDEEP
24576:Y8IEiMDkTO73dbXjjWjrhEDljZG21B+5vMiqt0gj2e/Lp1hshx+s6z6eaA3g1B+Q:Y8IEiMDkTOTVzjWg60qO1pO9UaqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4648 0c8416f3423f623fbe5317b25ddc60e2.exe -
Executes dropped EXE 1 IoCs
pid Process 4648 0c8416f3423f623fbe5317b25ddc60e2.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4648 0c8416f3423f623fbe5317b25ddc60e2.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 844 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4648 0c8416f3423f623fbe5317b25ddc60e2.exe 4648 0c8416f3423f623fbe5317b25ddc60e2.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5040 0c8416f3423f623fbe5317b25ddc60e2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5040 0c8416f3423f623fbe5317b25ddc60e2.exe 4648 0c8416f3423f623fbe5317b25ddc60e2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5040 wrote to memory of 4648 5040 0c8416f3423f623fbe5317b25ddc60e2.exe 90 PID 5040 wrote to memory of 4648 5040 0c8416f3423f623fbe5317b25ddc60e2.exe 90 PID 5040 wrote to memory of 4648 5040 0c8416f3423f623fbe5317b25ddc60e2.exe 90 PID 4648 wrote to memory of 844 4648 0c8416f3423f623fbe5317b25ddc60e2.exe 93 PID 4648 wrote to memory of 844 4648 0c8416f3423f623fbe5317b25ddc60e2.exe 93 PID 4648 wrote to memory of 844 4648 0c8416f3423f623fbe5317b25ddc60e2.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c8416f3423f623fbe5317b25ddc60e2.exe"C:\Users\Admin\AppData\Local\Temp\0c8416f3423f623fbe5317b25ddc60e2.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\0c8416f3423f623fbe5317b25ddc60e2.exeC:\Users\Admin\AppData\Local\Temp\0c8416f3423f623fbe5317b25ddc60e2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\0c8416f3423f623fbe5317b25ddc60e2.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:844
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD592a79dd65e6756916849e86db91513b9
SHA16ea8d5fa978ad46df804752cf8b48d2314b8c3f1
SHA256553a5fe13ae8e28186928062240f8f69479239fca7656f32307ae1bd69210789
SHA51289256f815ad1ac56c8646e68634ddc1176ac3c660d9472503c8d9c9dbc0535c7411afd3a02375bcf842425c418b0e6166638a240f2a705ab44d85a24758affd1