Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 06:04
Static task
static1
Behavioral task
behavioral1
Sample
10a1f5b288189c02be76ba20486ea53a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
10a1f5b288189c02be76ba20486ea53a.exe
Resource
win10v2004-20231215-en
General
-
Target
10a1f5b288189c02be76ba20486ea53a.exe
-
Size
1000KB
-
MD5
10a1f5b288189c02be76ba20486ea53a
-
SHA1
02a2d5f9f366dc58503778e2482537974a34b63d
-
SHA256
57786fa75417cfe0a9207d69f60e377a694c045503ac62ff4c3dcc67594588be
-
SHA512
14c965111868e2169a4f5f3ff94bf523da9484d6703bf4c7e5c96e9b68596c0e9de196ab9cc0f3c232ef46ed1c8f68e1ccde9fbe8f878a8944effbeeba5e402c
-
SSDEEP
12288:meGsBtZRiuau1B2mrIwJyEBsJ8gc2H4qVyyJw5TL7Sfv5L5ghUQY3ECaBwQ2tb5g:meGsBhT/BBngnU1B+5vMiqt0gj2ed
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4564 10a1f5b288189c02be76ba20486ea53a.exe -
Executes dropped EXE 1 IoCs
pid Process 4564 10a1f5b288189c02be76ba20486ea53a.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4564 10a1f5b288189c02be76ba20486ea53a.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4960 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4564 10a1f5b288189c02be76ba20486ea53a.exe 4564 10a1f5b288189c02be76ba20486ea53a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4732 10a1f5b288189c02be76ba20486ea53a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4732 10a1f5b288189c02be76ba20486ea53a.exe 4564 10a1f5b288189c02be76ba20486ea53a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4732 wrote to memory of 4564 4732 10a1f5b288189c02be76ba20486ea53a.exe 32 PID 4732 wrote to memory of 4564 4732 10a1f5b288189c02be76ba20486ea53a.exe 32 PID 4732 wrote to memory of 4564 4732 10a1f5b288189c02be76ba20486ea53a.exe 32 PID 4564 wrote to memory of 4960 4564 10a1f5b288189c02be76ba20486ea53a.exe 39 PID 4564 wrote to memory of 4960 4564 10a1f5b288189c02be76ba20486ea53a.exe 39 PID 4564 wrote to memory of 4960 4564 10a1f5b288189c02be76ba20486ea53a.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\10a1f5b288189c02be76ba20486ea53a.exe"C:\Users\Admin\AppData\Local\Temp\10a1f5b288189c02be76ba20486ea53a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\10a1f5b288189c02be76ba20486ea53a.exeC:\Users\Admin\AppData\Local\Temp\10a1f5b288189c02be76ba20486ea53a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\10a1f5b288189c02be76ba20486ea53a.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:4960
-
-