Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 11:13
Static task
static1
Behavioral task
behavioral1
Sample
16e615643e0e87126909c54d23407594.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
16e615643e0e87126909c54d23407594.exe
Resource
win10v2004-20231215-en
General
-
Target
16e615643e0e87126909c54d23407594.exe
-
Size
1000KB
-
MD5
16e615643e0e87126909c54d23407594
-
SHA1
1ac7255b514d1fac4b57df781eb9a9c924a87aa9
-
SHA256
db8b1a9bd5d6611cafd62313e19645b862a03a1c96c38af2e2065d834806984e
-
SHA512
67e56e349fc79d94993aa268adb0d5c21d4adc0a2cb9c55b624ebf07b7a1095845e0ef6b47a24e31dd21972ea642b81eb97ed018e4873472bb239cf99b57ff91
-
SSDEEP
24576:EeVhXbCgR4zgCnTMPIQ1owcDa1B+5vMiqt0gj2ed:Bhuy4kPKxwqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1912 16e615643e0e87126909c54d23407594.exe -
Executes dropped EXE 1 IoCs
pid Process 1912 16e615643e0e87126909c54d23407594.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1912 16e615643e0e87126909c54d23407594.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1700 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1912 16e615643e0e87126909c54d23407594.exe 1912 16e615643e0e87126909c54d23407594.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5052 16e615643e0e87126909c54d23407594.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5052 16e615643e0e87126909c54d23407594.exe 1912 16e615643e0e87126909c54d23407594.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5052 wrote to memory of 1912 5052 16e615643e0e87126909c54d23407594.exe 90 PID 5052 wrote to memory of 1912 5052 16e615643e0e87126909c54d23407594.exe 90 PID 5052 wrote to memory of 1912 5052 16e615643e0e87126909c54d23407594.exe 90 PID 1912 wrote to memory of 1700 1912 16e615643e0e87126909c54d23407594.exe 92 PID 1912 wrote to memory of 1700 1912 16e615643e0e87126909c54d23407594.exe 92 PID 1912 wrote to memory of 1700 1912 16e615643e0e87126909c54d23407594.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\16e615643e0e87126909c54d23407594.exe"C:\Users\Admin\AppData\Local\Temp\16e615643e0e87126909c54d23407594.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\16e615643e0e87126909c54d23407594.exeC:\Users\Admin\AppData\Local\Temp\16e615643e0e87126909c54d23407594.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\16e615643e0e87126909c54d23407594.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:1700
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD58d9506eb7bc091300844229e42fb5115
SHA141c261879a39255819da52b6529f02ff777e91ba
SHA256a900f30610f7b749a8cf4d771b2dbc0d567a08821f4d748891caf0226a65529f
SHA512abc9f4a95aa1fbe35e8813cb9218dc1b5d3dfe98a108b7351fe6011ff24cb8bf4d67527095e28cea0934af463dfe7f7f5dae8b8d90e92a8912a46a8a0da2d03d