Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 07:23
Static task
static1
Behavioral task
behavioral1
Sample
2d3e0b449cae3e594201daeaaa4fd17f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2d3e0b449cae3e594201daeaaa4fd17f.exe
Resource
win10v2004-20231215-en
General
-
Target
2d3e0b449cae3e594201daeaaa4fd17f.exe
-
Size
1000KB
-
MD5
2d3e0b449cae3e594201daeaaa4fd17f
-
SHA1
524d527458aa6544b301215f81e505d3772be7d9
-
SHA256
af65dfbeed326db3e1099c18497425e57c64fa1a3f6b1fc799baef9491357a8e
-
SHA512
3f728ee06a71f0a07e1ac125b65175fc202ec48c1ec753500e72be2ee4b52cf3ace457bdc10c337e5e37d722b664aca0351a30182eccb8a50d96b6c2060aa476
-
SSDEEP
24576:1vqAzvQ4PDZy7e1hsjZVoRVAw1B+5vMiqt0gj2ed:9jvxPtyq12jDoRCaqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4464 2d3e0b449cae3e594201daeaaa4fd17f.exe -
Executes dropped EXE 1 IoCs
pid Process 4464 2d3e0b449cae3e594201daeaaa4fd17f.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4464 2d3e0b449cae3e594201daeaaa4fd17f.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4056 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4464 2d3e0b449cae3e594201daeaaa4fd17f.exe 4464 2d3e0b449cae3e594201daeaaa4fd17f.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3408 2d3e0b449cae3e594201daeaaa4fd17f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3408 2d3e0b449cae3e594201daeaaa4fd17f.exe 4464 2d3e0b449cae3e594201daeaaa4fd17f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3408 wrote to memory of 4464 3408 2d3e0b449cae3e594201daeaaa4fd17f.exe 87 PID 3408 wrote to memory of 4464 3408 2d3e0b449cae3e594201daeaaa4fd17f.exe 87 PID 3408 wrote to memory of 4464 3408 2d3e0b449cae3e594201daeaaa4fd17f.exe 87 PID 4464 wrote to memory of 4056 4464 2d3e0b449cae3e594201daeaaa4fd17f.exe 91 PID 4464 wrote to memory of 4056 4464 2d3e0b449cae3e594201daeaaa4fd17f.exe 91 PID 4464 wrote to memory of 4056 4464 2d3e0b449cae3e594201daeaaa4fd17f.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d3e0b449cae3e594201daeaaa4fd17f.exe"C:\Users\Admin\AppData\Local\Temp\2d3e0b449cae3e594201daeaaa4fd17f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\2d3e0b449cae3e594201daeaaa4fd17f.exeC:\Users\Admin\AppData\Local\Temp\2d3e0b449cae3e594201daeaaa4fd17f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\2d3e0b449cae3e594201daeaaa4fd17f.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:4056
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD56db0d9d5af138f3c1ef7f3ea4fd2e568
SHA1fdd5b7361c3e2d9f166413f575062619139425a1
SHA256dae44d1cee2679f3a047866da99ceb338dd16cbcb12b14346ccb173cf80ab69c
SHA5128b791e9953c718d4969d52fd8c36cb0cb660e7ed39c2bf9b64f9333ea5778d03d431a9cf0b7919571d98554e3a3eb50afcc5cafb96b211fd900dff639e0274f9