Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
4bf1ddc71a4272901704783138d5447c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4bf1ddc71a4272901704783138d5447c.exe
Resource
win10v2004-20231215-en
General
-
Target
4bf1ddc71a4272901704783138d5447c.exe
-
Size
771KB
-
MD5
4bf1ddc71a4272901704783138d5447c
-
SHA1
01db75c5ba23c369fa93a29c95a93e9564dad8ca
-
SHA256
a93102ee94ebf425dc428660d6825a21febeb0358b7573397bf2df3f23364a96
-
SHA512
f17e6061427b48b76e1f4013bb74db03138a1c7f2ad3e14ee2da67015ff570c7feaf27d5e6592be0f316336facc3d42adc804418276bbc2bb6d1a65bee51ef0e
-
SSDEEP
12288:YqnEcF8COQSp8sW3DpAFuyyGD1g26Em3az2ECaBwQ2tb5JLrnyl0:DpAp8sWzpAnyGpgT34F1B+5vM0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2316 4bf1ddc71a4272901704783138d5447c.exe -
Executes dropped EXE 1 IoCs
pid Process 2316 4bf1ddc71a4272901704783138d5447c.exe -
Loads dropped DLL 1 IoCs
pid Process 2188 4bf1ddc71a4272901704783138d5447c.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2316 4bf1ddc71a4272901704783138d5447c.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1384 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2316 4bf1ddc71a4272901704783138d5447c.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2188 4bf1ddc71a4272901704783138d5447c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2188 4bf1ddc71a4272901704783138d5447c.exe 2316 4bf1ddc71a4272901704783138d5447c.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2316 2188 4bf1ddc71a4272901704783138d5447c.exe 28 PID 2188 wrote to memory of 2316 2188 4bf1ddc71a4272901704783138d5447c.exe 28 PID 2188 wrote to memory of 2316 2188 4bf1ddc71a4272901704783138d5447c.exe 28 PID 2188 wrote to memory of 2316 2188 4bf1ddc71a4272901704783138d5447c.exe 28 PID 2316 wrote to memory of 1384 2316 4bf1ddc71a4272901704783138d5447c.exe 29 PID 2316 wrote to memory of 1384 2316 4bf1ddc71a4272901704783138d5447c.exe 29 PID 2316 wrote to memory of 1384 2316 4bf1ddc71a4272901704783138d5447c.exe 29 PID 2316 wrote to memory of 1384 2316 4bf1ddc71a4272901704783138d5447c.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bf1ddc71a4272901704783138d5447c.exe"C:\Users\Admin\AppData\Local\Temp\4bf1ddc71a4272901704783138d5447c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\4bf1ddc71a4272901704783138d5447c.exeC:\Users\Admin\AppData\Local\Temp\4bf1ddc71a4272901704783138d5447c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\4bf1ddc71a4272901704783138d5447c.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:1384
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
771KB
MD54f22f42a95cb1fe9edea0f67a423d798
SHA133c620329e024bd93a137c2f36e41f0b35efc08c
SHA256d94cd673839257b173669ce29366abbe3ead6a608206c0e87a8a341bc53be739
SHA5129f38e93715324cfc25dc386c12e58dcea6f7c4e43000b0250a485a9858ae453ce1676b43d0a7bc9a775098841a0750b9c7408cb209fa7872a6ec8c4b0e8e66ea