Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
3s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
413c800774c2169d9764c4b71fe0b6a6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
413c800774c2169d9764c4b71fe0b6a6.exe
Resource
win10v2004-20231222-en
General
-
Target
413c800774c2169d9764c4b71fe0b6a6.exe
-
Size
506KB
-
MD5
413c800774c2169d9764c4b71fe0b6a6
-
SHA1
27c17fdd878f512e3953ecb1258083866dcd2bc4
-
SHA256
1606a4e0484b9da96b2eb49c639afc88f461144a8e62777b0ff05f4f41c265c9
-
SHA512
b30773f1a6b9dfb53c9324eca7719746d7d1b30303c8a0678640b1460df60cbefcaf84bde3ee7a393fbb00b974f6ba81c5e5cbcbce3bbe3f7e403f636d5b1120
-
SSDEEP
12288:aEotgFF8tuho2cHQn/AY5SSTjhqt/ZyWn:4tcF8t6cH0I2lTwjn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2888 413c800774c2169d9764c4b71fe0b6a6.exe -
Executes dropped EXE 1 IoCs
pid Process 2888 413c800774c2169d9764c4b71fe0b6a6.exe -
Loads dropped DLL 1 IoCs
pid Process 1992 413c800774c2169d9764c4b71fe0b6a6.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2888 413c800774c2169d9764c4b71fe0b6a6.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2968 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2888 413c800774c2169d9764c4b71fe0b6a6.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1992 413c800774c2169d9764c4b71fe0b6a6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1992 413c800774c2169d9764c4b71fe0b6a6.exe 2888 413c800774c2169d9764c4b71fe0b6a6.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2888 1992 413c800774c2169d9764c4b71fe0b6a6.exe 18 PID 1992 wrote to memory of 2888 1992 413c800774c2169d9764c4b71fe0b6a6.exe 18 PID 1992 wrote to memory of 2888 1992 413c800774c2169d9764c4b71fe0b6a6.exe 18 PID 1992 wrote to memory of 2888 1992 413c800774c2169d9764c4b71fe0b6a6.exe 18 PID 2888 wrote to memory of 2968 2888 413c800774c2169d9764c4b71fe0b6a6.exe 17 PID 2888 wrote to memory of 2968 2888 413c800774c2169d9764c4b71fe0b6a6.exe 17 PID 2888 wrote to memory of 2968 2888 413c800774c2169d9764c4b71fe0b6a6.exe 17 PID 2888 wrote to memory of 2968 2888 413c800774c2169d9764c4b71fe0b6a6.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\413c800774c2169d9764c4b71fe0b6a6.exe"C:\Users\Admin\AppData\Local\Temp\413c800774c2169d9764c4b71fe0b6a6.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\413c800774c2169d9764c4b71fe0b6a6.exeC:\Users\Admin\AppData\Local\Temp\413c800774c2169d9764c4b71fe0b6a6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2888
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\413c800774c2169d9764c4b71fe0b6a6.exe" /TN Google_Trk_Updater /F1⤵
- Creates scheduled task(s)
PID:2968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5140d0271cef5b5bb7b39249ace52b1c6
SHA10df99002f7ec84668fdf887dcd66871df25b71dc
SHA256cfdf10d2916652ec41a98db7f2b6302e865258d4e0b58a8bc35fbd4ac72e5a13
SHA512218d9a4525759605140ccddb4298cffb1de5a2762b4037b1b444e2bcfb05ddb644d4167aa0ea39ef251301631465fbdefc4eec3b3c2d8460e7329d8a020d91e4
-
Filesize
25KB
MD5563485c78961ada02cb5c93a150e4ec6
SHA125b1ec284f4362bec0a2e4332dadf02c66a47ca6
SHA256ca44789fdf5a08b36699e96619e6141f2459d3d91d923b9e57ec5c2f8d360a82
SHA51288eb8a3478313440f7e941f8ef18e458599b84d92976d5be0565ca801c4f06b33186ac9e65ad2b047cefb5845911affffca3fb45defa0d02798c34d899ea9406
-
Filesize
10KB
MD5f8f0cc93de23c011c9ae38f68f5871b1
SHA15f795da1539f56550d6fc822926a88f09eaeafd1
SHA2569f8be4a47d9c4fbe6d00a1f55ed4b6e3343ded00b6bcd147f3f289078e02dace
SHA51281329438153becc0d698560fbc2ecc77ff865ecdf8da76d1978dd1832697c43517a7b55930e352afd02de61192b1994aab9e8ac9622415f534acabb15413de88