Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 11:38
Static task
static1
Behavioral task
behavioral1
Sample
175354093d091b749e92fea3d7e0c413.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
175354093d091b749e92fea3d7e0c413.exe
Resource
win10v2004-20231222-en
General
-
Target
175354093d091b749e92fea3d7e0c413.exe
-
Size
506KB
-
MD5
175354093d091b749e92fea3d7e0c413
-
SHA1
4044aa2ab5546341e60fe9dcebc5dc251935572e
-
SHA256
d88692d091030e7806a28279dade0318f7320b729e1b8f218e589e9fea86630d
-
SHA512
b9b69293100f2d8edbc8bb2b1d828d65587ffb5c6a27a200dfa030b40b11dc7459d0ca585271c4e2b18ad3b750b01e4a6f1a593e7b5cf1a39e9ebb14e2ca5e40
-
SSDEEP
12288:Ofw+Rfhb8Cy97SkFkJgotJwcvIln4waOXA+9t:NKfl8V9FpqWlnmelP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3180 175354093d091b749e92fea3d7e0c413.exe -
Executes dropped EXE 1 IoCs
pid Process 3180 175354093d091b749e92fea3d7e0c413.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3180 175354093d091b749e92fea3d7e0c413.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3472 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3180 175354093d091b749e92fea3d7e0c413.exe 3180 175354093d091b749e92fea3d7e0c413.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5008 175354093d091b749e92fea3d7e0c413.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5008 175354093d091b749e92fea3d7e0c413.exe 3180 175354093d091b749e92fea3d7e0c413.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5008 wrote to memory of 3180 5008 175354093d091b749e92fea3d7e0c413.exe 25 PID 5008 wrote to memory of 3180 5008 175354093d091b749e92fea3d7e0c413.exe 25 PID 5008 wrote to memory of 3180 5008 175354093d091b749e92fea3d7e0c413.exe 25 PID 3180 wrote to memory of 3472 3180 175354093d091b749e92fea3d7e0c413.exe 72 PID 3180 wrote to memory of 3472 3180 175354093d091b749e92fea3d7e0c413.exe 72 PID 3180 wrote to memory of 3472 3180 175354093d091b749e92fea3d7e0c413.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\175354093d091b749e92fea3d7e0c413.exe"C:\Users\Admin\AppData\Local\Temp\175354093d091b749e92fea3d7e0c413.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\175354093d091b749e92fea3d7e0c413.exeC:\Users\Admin\AppData\Local\Temp\175354093d091b749e92fea3d7e0c413.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\175354093d091b749e92fea3d7e0c413.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:3472
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD5a125c6dfbe4ec89eac453a23030e2062
SHA1987a048ba7ea0573fd0c0345a7a76cbd98ca0792
SHA2562a670d0176457d2498f2ec593693e4227bf53fc66e703d1bf98c2e15d3498208
SHA5127277b2782aa7bd014f893cd676bfc654fef8d60964993563b87ac97dda9a178895370082eff29675a54c8ab2413974c28a3e5d89a35b61302e14f8f5f32e344a