Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
161s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 01:04
Static task
static1
Behavioral task
behavioral1
Sample
4f2c2da292e7013106f39f96d4d4f89c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4f2c2da292e7013106f39f96d4d4f89c.exe
Resource
win10v2004-20231215-en
General
-
Target
4f2c2da292e7013106f39f96d4d4f89c.exe
-
Size
1000KB
-
MD5
4f2c2da292e7013106f39f96d4d4f89c
-
SHA1
0fda2e001c048b6a0cbd90c89303f562e6cf5423
-
SHA256
80f72712514c4e6b864778ce5a5c2b50563836049564cb7ba903cf5bc10f6ed9
-
SHA512
666dbee32665b5256b7b74e7e12980dcd6dcf8b997fa05b8cbe658cb4dcfb0a20f4f14e2f012f7f7d3d547225001a445f334c22d18fe7763b0222d6f1695cf5f
-
SSDEEP
24576:krnJW94MrS6tRcdZeBF1B+5vMiqt0gj2ed:kI94MrS6tReeHqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2784 4f2c2da292e7013106f39f96d4d4f89c.exe -
Executes dropped EXE 1 IoCs
pid Process 2784 4f2c2da292e7013106f39f96d4d4f89c.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2784 4f2c2da292e7013106f39f96d4d4f89c.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4088 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2784 4f2c2da292e7013106f39f96d4d4f89c.exe 2784 4f2c2da292e7013106f39f96d4d4f89c.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2980 4f2c2da292e7013106f39f96d4d4f89c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2980 4f2c2da292e7013106f39f96d4d4f89c.exe 2784 4f2c2da292e7013106f39f96d4d4f89c.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2784 2980 4f2c2da292e7013106f39f96d4d4f89c.exe 91 PID 2980 wrote to memory of 2784 2980 4f2c2da292e7013106f39f96d4d4f89c.exe 91 PID 2980 wrote to memory of 2784 2980 4f2c2da292e7013106f39f96d4d4f89c.exe 91 PID 2784 wrote to memory of 4088 2784 4f2c2da292e7013106f39f96d4d4f89c.exe 94 PID 2784 wrote to memory of 4088 2784 4f2c2da292e7013106f39f96d4d4f89c.exe 94 PID 2784 wrote to memory of 4088 2784 4f2c2da292e7013106f39f96d4d4f89c.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f2c2da292e7013106f39f96d4d4f89c.exe"C:\Users\Admin\AppData\Local\Temp\4f2c2da292e7013106f39f96d4d4f89c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\4f2c2da292e7013106f39f96d4d4f89c.exeC:\Users\Admin\AppData\Local\Temp\4f2c2da292e7013106f39f96d4d4f89c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\4f2c2da292e7013106f39f96d4d4f89c.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:4088
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD53001d25cf940e59352736e0f7cb49695
SHA124b5020873e9138d13da264cec9c675ef1e2caad
SHA256d6a97e9d0bed5008d487971cd11046618e009f0ed2af6f38b3639ff2ee94fd2e
SHA512504d30351495f781fbe4936cf8707c6065bc4f369ea1176b29958d9ea3596c2e3f04672fefb9bbd85cfcbaa2856e5a3ece787bb7bb0b62531f474eb98394e213