Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 01:34
Static task
static1
Behavioral task
behavioral1
Sample
47aee81ee795f687ac9d6e157762f149.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
47aee81ee795f687ac9d6e157762f149.exe
Resource
win10v2004-20231222-en
General
-
Target
47aee81ee795f687ac9d6e157762f149.exe
-
Size
1000KB
-
MD5
47aee81ee795f687ac9d6e157762f149
-
SHA1
310574c885f8c62e2ef8b5312518fddfc0e8117c
-
SHA256
da01ff66dc97bc1d38a92ab88537889597389b036065cbd1bc624126ec16729e
-
SHA512
837f02a8ec3f2c47e9419e0601be476a3566ff38b6e7f862e350a35cbaf4c3b3141899fc2e0b3c60af661fcb2c722c49da3eae649f5bd77127475eccaa6f8a83
-
SSDEEP
24576:FCfx8bgnUi+k/21ezOw7u64OpAzM1B+5vMiqt0gj2ed:UNv+MOezDt9qOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2220 47aee81ee795f687ac9d6e157762f149.exe -
Executes dropped EXE 1 IoCs
pid Process 2220 47aee81ee795f687ac9d6e157762f149.exe -
Loads dropped DLL 1 IoCs
pid Process 2932 47aee81ee795f687ac9d6e157762f149.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2220 47aee81ee795f687ac9d6e157762f149.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2888 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2220 47aee81ee795f687ac9d6e157762f149.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2932 47aee81ee795f687ac9d6e157762f149.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2932 47aee81ee795f687ac9d6e157762f149.exe 2220 47aee81ee795f687ac9d6e157762f149.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2220 2932 47aee81ee795f687ac9d6e157762f149.exe 18 PID 2932 wrote to memory of 2220 2932 47aee81ee795f687ac9d6e157762f149.exe 18 PID 2932 wrote to memory of 2220 2932 47aee81ee795f687ac9d6e157762f149.exe 18 PID 2932 wrote to memory of 2220 2932 47aee81ee795f687ac9d6e157762f149.exe 18 PID 2220 wrote to memory of 2888 2220 47aee81ee795f687ac9d6e157762f149.exe 17 PID 2220 wrote to memory of 2888 2220 47aee81ee795f687ac9d6e157762f149.exe 17 PID 2220 wrote to memory of 2888 2220 47aee81ee795f687ac9d6e157762f149.exe 17 PID 2220 wrote to memory of 2888 2220 47aee81ee795f687ac9d6e157762f149.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\47aee81ee795f687ac9d6e157762f149.exe"C:\Users\Admin\AppData\Local\Temp\47aee81ee795f687ac9d6e157762f149.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\47aee81ee795f687ac9d6e157762f149.exeC:\Users\Admin\AppData\Local\Temp\47aee81ee795f687ac9d6e157762f149.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2220
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\47aee81ee795f687ac9d6e157762f149.exe" /TN Google_Trk_Updater /F1⤵
- Creates scheduled task(s)
PID:2888