Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 09:14
Static task
static1
Behavioral task
behavioral1
Sample
502d5a8ea213fa5e8b3220608069dc99.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
502d5a8ea213fa5e8b3220608069dc99.exe
Resource
win10v2004-20231215-en
General
-
Target
502d5a8ea213fa5e8b3220608069dc99.exe
-
Size
506KB
-
MD5
502d5a8ea213fa5e8b3220608069dc99
-
SHA1
e06ac2805a83943f3cf07e035017aeff60577e98
-
SHA256
fc78b0f70bc1f75ba095fec002d434bc5045b5e0b5d780757bd6e43b3ebe9095
-
SHA512
1f273c7a2e48c047413ff6c9dbbd2eb359d0035f0f1d5166dc5e1eb4617bab52c029351ece5357c9677f602d67958f53dc694b379df0fac943ae0fbc4b1aca4a
-
SSDEEP
12288:x4W5Vte2Gd0QFZeiPsPzYRomUqPkCzSZ/jC:xV5WWQFZeiUPzYRvg/+
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5056 502d5a8ea213fa5e8b3220608069dc99.exe -
Executes dropped EXE 1 IoCs
pid Process 5056 502d5a8ea213fa5e8b3220608069dc99.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5056 502d5a8ea213fa5e8b3220608069dc99.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3340 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5056 502d5a8ea213fa5e8b3220608069dc99.exe 5056 502d5a8ea213fa5e8b3220608069dc99.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2000 502d5a8ea213fa5e8b3220608069dc99.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2000 502d5a8ea213fa5e8b3220608069dc99.exe 5056 502d5a8ea213fa5e8b3220608069dc99.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2000 wrote to memory of 5056 2000 502d5a8ea213fa5e8b3220608069dc99.exe 91 PID 2000 wrote to memory of 5056 2000 502d5a8ea213fa5e8b3220608069dc99.exe 91 PID 2000 wrote to memory of 5056 2000 502d5a8ea213fa5e8b3220608069dc99.exe 91 PID 5056 wrote to memory of 3340 5056 502d5a8ea213fa5e8b3220608069dc99.exe 93 PID 5056 wrote to memory of 3340 5056 502d5a8ea213fa5e8b3220608069dc99.exe 93 PID 5056 wrote to memory of 3340 5056 502d5a8ea213fa5e8b3220608069dc99.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\502d5a8ea213fa5e8b3220608069dc99.exe"C:\Users\Admin\AppData\Local\Temp\502d5a8ea213fa5e8b3220608069dc99.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\502d5a8ea213fa5e8b3220608069dc99.exeC:\Users\Admin\AppData\Local\Temp\502d5a8ea213fa5e8b3220608069dc99.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\502d5a8ea213fa5e8b3220608069dc99.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:3340
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD5db92efb8ddb3aca9051eea646b0d3d03
SHA1dee355f51703f27a861edaef715e8be85791985d
SHA25616b6aa431893ef8c2100654a4026e6074a6fb54d1b1cb932c5465bd4ff38dad1
SHA5125743d073942cacd57e9958ecbee89db6c18b07fd1aa9f286188f31ef887d7bae73135b0202dce4aa13298721da6b56b47298810e46d7c89660e93781ca4fd67e