Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 18:57
Static task
static1
Behavioral task
behavioral1
Sample
41a83a730b9ced8a7ee2d1144b23a7d7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
41a83a730b9ced8a7ee2d1144b23a7d7.exe
Resource
win10v2004-20231222-en
General
-
Target
41a83a730b9ced8a7ee2d1144b23a7d7.exe
-
Size
506KB
-
MD5
41a83a730b9ced8a7ee2d1144b23a7d7
-
SHA1
da786d4cfed1585b35b366d85c5b436fcb1d7464
-
SHA256
7da3e295f44b0e9a5c81ca11a0f408d460c7bff56e3bf72f8fdd36af558fa8b4
-
SHA512
33597ad83291d1797f4f7bac72d2e90bcf028bc549082de9f68ab1124bc7a34ce8df7dec3dc7ff86d94b2106f27e40d1c4ddc05401fea2aa23b9029044bc2226
-
SSDEEP
12288:+PgX44XAvmF1UYn23AyZRhn0Q4GYIqARtY/yB4:+Pg1XHFOq23JZfEG5m/64
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3676 41a83a730b9ced8a7ee2d1144b23a7d7.exe -
Executes dropped EXE 1 IoCs
pid Process 3676 41a83a730b9ced8a7ee2d1144b23a7d7.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3676 41a83a730b9ced8a7ee2d1144b23a7d7.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3512 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3676 41a83a730b9ced8a7ee2d1144b23a7d7.exe 3676 41a83a730b9ced8a7ee2d1144b23a7d7.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 540 41a83a730b9ced8a7ee2d1144b23a7d7.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 540 41a83a730b9ced8a7ee2d1144b23a7d7.exe 3676 41a83a730b9ced8a7ee2d1144b23a7d7.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 540 wrote to memory of 3676 540 41a83a730b9ced8a7ee2d1144b23a7d7.exe 27 PID 540 wrote to memory of 3676 540 41a83a730b9ced8a7ee2d1144b23a7d7.exe 27 PID 540 wrote to memory of 3676 540 41a83a730b9ced8a7ee2d1144b23a7d7.exe 27 PID 3676 wrote to memory of 3512 3676 41a83a730b9ced8a7ee2d1144b23a7d7.exe 26 PID 3676 wrote to memory of 3512 3676 41a83a730b9ced8a7ee2d1144b23a7d7.exe 26 PID 3676 wrote to memory of 3512 3676 41a83a730b9ced8a7ee2d1144b23a7d7.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\41a83a730b9ced8a7ee2d1144b23a7d7.exe"C:\Users\Admin\AppData\Local\Temp\41a83a730b9ced8a7ee2d1144b23a7d7.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\41a83a730b9ced8a7ee2d1144b23a7d7.exeC:\Users\Admin\AppData\Local\Temp\41a83a730b9ced8a7ee2d1144b23a7d7.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3676
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\41a83a730b9ced8a7ee2d1144b23a7d7.exe" /TN Google_Trk_Updater /F1⤵
- Creates scheduled task(s)
PID:3512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD52a5814a1903dd0b0b637ee359052f7ec
SHA165652bfa49b97f4aa743e31ede6acb19bd9f2c75
SHA2564c7a0a75c1a8a60ccf75ae8b37295c8f8d6084f3495ed86f5f5b07da94bbca14
SHA512cfb378601acb613923688c43be9e3b408dde8dc884792a7576703277af5a4954608cd90277e105e4ed44b4fbbfe3f1fc81b1a0c74636364785b7f61d240d131c